lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 13 Nov 2020 16:33:39 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: Yonghong Song <yhs@...com>, KP Singh <kpsingh@...omium.org>, linux-kernel@...r.kernel.org, bpf@...r.kernel.org Cc: Alexei Starovoitov <ast@...nel.org>, Martin KaFai Lau <kafai@...com>, Song Liu <songliubraving@...com>, Jann Horn <jannh@...gle.com>, Hao Luo <haoluo@...gle.com>, Florent Revest <revest@...omium.org>, Brendan Jackman <jackmanb@...omium.org> Subject: Re: [PATCH bpf-next 2/2] bpf: Expose bpf_d_path helper to sleepable LSM hooks On 11/13/20 4:18 AM, Yonghong Song wrote: > > > On 11/12/20 9:19 AM, KP Singh wrote: >> From: KP Singh <kpsingh@...gle.com> >> >> Sleepable hooks are never called from an NMI/interrupt context, so it is >> safe to use the bpf_d_path helper in LSM programs attaching to these >> hooks. >> >> The helper is not restricted to sleepable programs and merely uses the >> list of sleeable hooks as the initial subset of LSM hooks where it can > > sleeable => sleepable > > probably not need to resend if no other major changes. The maintainer > can just fix it up before merging. Did while rebasing & applying, thanks everyone! >> be used. >> >> Signed-off-by: KP Singh <kpsingh@...gle.com> > > Acked-by: Yonghong Song <yhs@...com>
Powered by blists - more mailing lists