lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20190201.152824.1059041459854543789.davem@davemloft.net> Date: Fri, 01 Feb 2019 15:28:24 -0800 (PST) From: David Miller <davem@...emloft.net> To: ast@...nel.org Cc: daniel@...earbox.net, netdev@...r.kernel.org, kernel-team@...com Subject: Re: pull-request: bpf 2019-01-31 From: Alexei Starovoitov <ast@...nel.org> Date: Thu, 31 Jan 2019 14:50:40 -0800 > The following pull-request contains BPF updates for your *net* tree. > > The main changes are: > > 1) disable preemption in sender side of socket filters, from Alexei. > > 2) fix two potential deadlocks in syscall bpf lookup and prog_register, > from Martin and Alexei. > > 3) fix BTF to allow typedef on func_proto, from Yonghong. > > 4) two bpftool fixes, from Jiri and Paolo. > > Please consider pulling these changes from: > > git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git Pulled, thanks Alexei.
Powered by blists - more mailing lists