lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: 
 <176059741325.1205767.12458760043676255932.git-patchwork-notify@kernel.org>
Date: Thu, 16 Oct 2025 06:50:13 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Kuniyuki Iwashima <kuniyu@...gle.com>
Cc: ast@...nel.org, andrii@...nel.org, daniel@...earbox.net,
 martin.lau@...ux.dev, john.fastabend@...il.com, sdf@...ichev.me,
 davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com,
 ncardwell@...gle.com, willemb@...gle.com, almasrymina@...gle.com,
 roman.gushchin@...ux.dev, shakeel.butt@...ux.dev, kuni1840@...il.com,
 bpf@...r.kernel.org, netdev@...r.kernel.org
Subject: Re: [PATCH v2 bpf-next/net 0/6] bpf: Allow opt-out from
 sk->sk_prot->memory_allocated.

Hello:

This series was applied to bpf/bpf-next.git (net)
by Martin KaFai Lau <martin.lau@...nel.org>:

On Tue, 14 Oct 2025 23:54:53 +0000 you wrote:
> This series allows opting out of the global per-protocol memory
> accounting if socket is configured as such by sysctl or BPF prog.
> 
> This series is the successor of the series below [0], but the changes
> now fall in net and bpf subsystems only.
> 
> I discussed with Roman Gushchin offlist, and he suggested not mixing
> two independent subsystems and it would be cleaner not to depend on
> memcg.
> 
> [...]

Here is the summary with links:
  - [v2,bpf-next/net,1/6] tcp: Save lock_sock() for memcg in inet_csk_accept().
    https://git.kernel.org/bpf/bpf-next/c/8c52ab2e9b34
  - [v2,bpf-next/net,2/6] net: Allow opt-out from global protocol memory accounting.
    https://git.kernel.org/bpf/bpf-next/c/d5728fed86f6
  - [v2,bpf-next/net,3/6] net: Introduce net.core.bypass_prot_mem sysctl.
    https://git.kernel.org/bpf/bpf-next/c/543cf9b90ce5
  - [v2,bpf-next/net,4/6] bpf: Support bpf_setsockopt() for BPF_CGROUP_INET_SOCK_CREATE.
    https://git.kernel.org/bpf/bpf-next/c/13b77b283f2b
  - [v2,bpf-next/net,5/6] bpf: Introduce SK_BPF_BYPASS_PROT_MEM.
    https://git.kernel.org/bpf/bpf-next/c/58e1d04e5e34
  - [v2,bpf-next/net,6/6] selftest: bpf: Add test for sk->sk_bypass_prot_mem.
    https://git.kernel.org/bpf/bpf-next/c/71295ac94281

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ