lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 14 Dec 2020 18:10:39 -0800 From: Jakub Kicinski <kuba@...nel.org> To: Daniel Borkmann <daniel@...earbox.net> Cc: davem@...emloft.net, ast@...nel.org, netdev@...r.kernel.org, bpf@...r.kernel.org Subject: Re: pull-request: bpf-next 2020-12-14 On Mon, 14 Dec 2020 22:43:16 +0100 Daniel Borkmann wrote: > 1) Expose bpf_sk_storage_*() helpers to iterator programs, from Florent Revest. > > 2) Add AF_XDP selftests based on veth devs to BPF selftests, from Weqaar Janjua. > > 3) Support for finding BTF based kernel attach targets through libbpf's > bpf_program__set_attach_target() API, from Andrii Nakryiko. > > 4) Permit pointers on stack for helper calls in the verifier, from Yonghong Song. > > 5) Fix overflows in hash map elem size after rlimit removal, from Eric Dumazet. > > 6) Get rid of direct invocation of llc in BPF selftests, from Andrew Delgadillo. > > 7) Fix xsk_recvmsg() to reorder socket state check before access, from Björn Töpel. > > 8) Add new libbpf API helper to retrieve ring buffer epoll fd, from Brendan Jackman. > > 9) Batch of minor BPF selftest improvements all over the place, from Florian Lehner, > KP Singh, Jiri Olsa and various others. Looks like the reply bot is not keeping it 100.. I'll report to Konstantin after the merge window craziness is over. Pulled, thanks!
Powered by blists - more mailing lists