lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5d9df128-78cf-9e8f-1918-9e1b52d35b78@iogearbox.net>
Date:   Sat, 20 Oct 2018 21:40:28 +0200
From:   Daniel Borkmann <daniel@...earbox.net>
To:     John Fastabend <john.fastabend@...il.com>, ast@...nel.org
Cc:     netdev@...r.kernel.org
Subject: Re: [bpf-next v2 0/3] sockmap, bpf_msg_push_data helper

On 10/20/2018 04:56 AM, John Fastabend wrote:
> This series adds a new helper bpf_msg_push_data to be used by
> sk_msg programs. The helper can be used to insert extra bytes into
> the message that can then be used by the program as metadata tags
> among other things.
> 
> The first patch adds the helper, second patch the libbpf support,
> and last patch updates test_sockmap to run msg_push_data tests.
> 
> v2: rebase after queue map and in filter.c convert int -> u32
> 
> John Fastabend (3):
>   bpf: sk_msg program helper bpf_msg_push_data
>   bpf: libbpf support for msg_push_data
>   bpf: test_sockmap add options to use msg_push_data
> 
>  include/linux/skmsg.h                           |   5 +
>  include/uapi/linux/bpf.h                        |  20 +++-
>  net/core/filter.c                               | 134 ++++++++++++++++++++++++
>  tools/include/uapi/linux/bpf.h                  |  20 +++-
>  tools/testing/selftests/bpf/bpf_helpers.h       |   2 +
>  tools/testing/selftests/bpf/test_sockmap.c      |  58 +++++++++-
>  tools/testing/selftests/bpf/test_sockmap_kern.h |  97 +++++++++++++----
>  7 files changed, 308 insertions(+), 28 deletions(-)
> 

Applied, thanks!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ