lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 23 Apr 2019 00:06:55 +0000 From: Alexei Starovoitov <ast@...com> To: Daniel Borkmann <daniel@...earbox.net>, Alexei Starovoitov <ast@...nel.org>, "davem@...emloft.net" <davem@...emloft.net> CC: "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "bpf@...r.kernel.org" <bpf@...r.kernel.org>, Kernel Team <Kernel-team@...com> Subject: Re: [PATCH bpf-next 0/2] bpf: parallel verification On 4/22/19 4:58 PM, Daniel Borkmann wrote: > On 04/19/2019 04:44 PM, Alexei Starovoitov wrote: >> Allow the bpf verifier to run in parallel for root. >> >> Alexei Starovoitov (2): >> bpf: remove global variables >> bpf: drop bpf_verifier_lock >> >> include/linux/bpf_verifier.h | 5 +++++ >> kernel/bpf/verifier.c | 33 ++++++++++++++++++--------------- >> 2 files changed, 23 insertions(+), 15 deletions(-) >> > > Too bad we still need to keep it around for unpriv. Anyway, applied, thanks! I'm planing to add memcg accounting and teach oom_badness about the memory used during verification. Then we can drop the mutex for unpriv as well.
Powered by blists - more mailing lists