lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4dc3a8d5-17e1-81bc-49f3-db40ae67aa4c@iogearbox.net>
Date:   Tue, 15 Jan 2019 21:53:37 +0100
From:   Daniel Borkmann <daniel@...earbox.net>
To:     Lorenz Bauer <lmb@...udflare.com>, ast@...nel.org,
        netdev@...r.kernel.org
Subject: Re: [PATCH 1/1] bpf: libbpf: retry loading program on EAGAIN

On 01/08/2019 02:58 PM, Lorenz Bauer wrote:
> Commit c3494801cd1785e2 ("bpf: check pending signals while
> verifying programs") makes it possible for the BPF_PROG_LOAD
> to fail with EAGAIN. Retry unconditionally in this case.
> 
> Signed-off-by: Lorenz Bauer <lmb@...udflare.com>

Bit back and forth whether libbpf should actually do this and not
the application itself, otoh, until this point there was nothing
returning EAGAIN either during load so it avoids potential breakage,
anyway, applied, thanks!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ