lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 28 Jun 2020 10:15:30 -0700 From: Alexei Starovoitov <alexei.starovoitov@...il.com> To: Martin KaFai Lau <kafai@...com> Cc: Andrii Nakryiko <andriin@...com>, bpf <bpf@...r.kernel.org>, Network Development <netdev@...r.kernel.org>, Alexei Starovoitov <ast@...com>, Daniel Borkmann <daniel@...earbox.net>, Andrii Nakryiko <andrii.nakryiko@...il.com>, Kernel Team <kernel-team@...com> Subject: Re: [Potential Spoof] [PATCH bpf-next 0/2] Support disabling auto-loading of BPF programs On Fri, Jun 26, 2020 at 1:16 PM Martin KaFai Lau <kafai@...com> wrote: > > On Thu, Jun 25, 2020 at 04:26:27PM -0700, Andrii Nakryiko wrote: > > Add ability to turn off default auto-loading of each BPF program by libbpf on > > BPF object load. This is the feature that allows BPF applications to have > > optional functionality, which is only excercised on kernel that support > > necessary features, while falling back to reduced/less performant > > functionality, if kernel is outdated. > Acked-by: Martin KaFai Lau <kafai@...com> Applied. Thanks
Powered by blists - more mailing lists