lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 03 Dec 2020 20:10:06 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Stanislav Fomichev <sdf@...gle.com> Cc: netdev@...r.kernel.org, bpf@...r.kernel.org, davem@...emloft.net, ast@...nel.org, daniel@...earbox.net, andrii@...nel.org Subject: Re: [PATCH bpf-next] libbpf: cap retries in sys_bpf_prog_load Hello: This patch was applied to bpf/bpf-next.git (refs/heads/master): On Wed, 2 Dec 2020 15:13:32 -0800 you wrote: > I've seen a situation, where a process that's under pprof constantly > generates SIGPROF which prevents program loading indefinitely. > The right thing to do probably is to disable signals in the upper > layers while loading, but it still would be nice to get some error from > libbpf instead of an endless loop. > > Let's add some small retry limit to the program loading: > try loading the program 5 (arbitrary) times and give up. > > [...] Here is the summary with links: - [bpf-next] libbpf: cap retries in sys_bpf_prog_load https://git.kernel.org/bpf/bpf-next/c/d6d418bd8f92 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists