lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 30 Nov 2017 16:57:30 -0800 From: Kees Cook <keescook@...omium.org> To: Shmulik Ladkani <shmulik.ladkani@...il.com>, Willem de Bruijn <willemb@...gle.com>, Daniel Borkmann <daniel@...earbox.net>, Pablo Neira Ayuso <pablo@...filter.org> Cc: Linus Torvalds <torvalds@...ux-foundation.org>, David Miller <davem@...emloft.net>, LKML <linux-kernel@...r.kernel.org>, Network Development <netdev@...r.kernel.org>, Al Viro <viro@...iv.linux.org.uk>, Christoph Hellwig <hch@...radead.org>, Thomas Garnier <thgarnie@...gle.com>, Jann Horn <jannh@...gle.com> Subject: Re: netfilter: xt_bpf: Fix XT_BPF_MODE_FD_PINNED mode of 'xt_bpf_info_v1' On Mon, Oct 9, 2017 at 4:10 PM, David Miller <davem@...emloft.net> wrote: > Shmulik Ladkani (1): > netfilter: xt_bpf: Fix XT_BPF_MODE_FD_PINNED mode of 'xt_bpf_info_v1' This adds a new user of set_fs(), which we're trying to eliminate (or at least not expand): + set_fs(KERNEL_DS); + fd = bpf_obj_get_user(path); + set_fs(oldfs); Can you please adjust this to not make set_fs() changes? Thanks! -Kees -- Kees Cook Pixel Security
Powered by blists - more mailing lists