lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Fri, 29 Jan 2021 13:59:41 -0800
From:   Jakub Kicinski <kuba@...nel.org>
To:     Daniel Borkmann <daniel@...earbox.net>
Cc:     davem@...emloft.net, ast@...nel.org, andrii@...nel.org,
        netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: Re: pull-request: bpf 2021-01-29

On Fri, 29 Jan 2021 01:15:56 +0100 Daniel Borkmann wrote:
> 1) Fix two copy_{from,to}_user() warn_on_once splats for BPF cgroup getsockopt
>    infra when user space is trying to race against optlen, from Loris Reiff.
> 
> 2) Fix a missing fput() in BPF inode storage map update helper, from Pan Bian.
> 
> 3) Fix a build error on unresolved symbols on disabled networking / keys LSM
>    hooks, from Mikko Ylinen.
> 
> 4) Fix preload BPF prog build when the output directory from make points to a
>    relative path, from Quentin Monnet.

Pulled, thanks! 

I keep forgetting that pw bot ignores BPF PRs for some reason.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ