lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 11 Apr 2017 12:15:23 +0200 From: Daniel Borkmann <daniel@...earbox.net> To: Johannes Berg <johannes@...solutions.net>, netdev@...r.kernel.org CC: Alexei Starovoitov <alexei.starovoitov@...il.com>, Johannes Berg <johannes.berg@...el.com> Subject: Re: [PATCH] bpf: reference may_access_skb() from __bpf_prog_run() On 04/11/2017 12:10 PM, Johannes Berg wrote: > From: Johannes Berg <johannes.berg@...el.com> > > It took me quite some time to figure out how this was linked, > so in order to save the next person the effort of finding it > add a comment in __bpf_prog_run() that indicates what exactly > determines that a program can access the ctx == skb. > > Signed-off-by: Johannes Berg <johannes.berg@...el.com> Makes sense, thanks! Acked-by: Daniel Borkmann <daniel@...earbox.net>
Powered by blists - more mailing lists