lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 09 Oct 2019 10:03:43 +0200 From: Toke Høiland-Jørgensen <toke@...hat.com> To: Alexei Starovoitov <alexei.starovoitov@...il.com> Cc: Daniel Borkmann <daniel@...earbox.net>, Alexei Starovoitov <ast@...nel.org>, Martin KaFai Lau <kafai@...com>, Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>, Marek Majkowski <marek@...udflare.com>, Lorenz Bauer <lmb@...udflare.com>, Alan Maguire <alan.maguire@...cle.com>, Jesper Dangaard Brouer <brouer@...hat.com>, David Miller <davem@...emloft.net>, netdev@...r.kernel.org, bpf@...r.kernel.org Subject: Re: [PATCH bpf-next v3 1/5] bpf: Support chain calling multiple BPF programs after each other Alexei Starovoitov <alexei.starovoitov@...il.com> writes: > Please implement proper indirect calls and jumps. I am still not convinced this will actually solve our problem; but OK, I can give it a shot. However, I don't actually have a clear picture of what exactly is missing to add this support. Could you please provide a pointer or two? -Toke
Powered by blists - more mailing lists