lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <169832942422.23002.17141975863236613572.git-patchwork-notify@kernel.org> Date: Thu, 26 Oct 2023 14:10:24 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Nikolay Aleksandrov <razor@...ckwall.org> Cc: bpf@...r.kernel.org, jiri@...nulli.us, netdev@...r.kernel.org, martin.lau@...ux.dev, ast@...nel.org, andrii@...nel.org, john.fastabend@...il.com, kuba@...nel.org, andrew@...n.ch, toke@...nel.org, toke@...hat.com, sdf@...gle.com, daniel@...earbox.net Subject: Re: [PATCH bpf-next 0/2] netkit: two minor cleanups Hello: This series was applied to bpf/bpf-next.git (master) by Daniel Borkmann <daniel@...earbox.net>: On Thu, 26 Oct 2023 12:41:04 +0300 you wrote: > Hi, > This set does two minor cleanups mentioned by Jiri. The first patch > removes explicit NULLing of primary/peer pointers and relies on the > implicit mem zeroing done at net device alloc. The second patch switches > netkit's mode and primary/peer policy netlink attributes to use > NLA_POLICY_VALIDATE_FN() type and sets the custom validate function to > return better user errors. This way netlink's policy is used to validate > the attributes and simplifies the code a bit. No functional changes are > intended. > > [...] Here is the summary with links: - [bpf-next,1/2] netkit: remove explicit active/peer ptr initialization https://git.kernel.org/bpf/bpf-next/c/ea41b880cc85 - [bpf-next,2/2] netkit: use netlink policy for mode and policy attributes validation https://git.kernel.org/bpf/bpf-next/c/3de07b963ab8 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists