[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20170210.101208.1693704737584245625.davem@davemloft.net>
Date: Fri, 10 Feb 2017 10:12:08 -0500 (EST)
From: David Miller <davem@...emloft.net>
To: tom@...bertland.com
Cc: netdev@...r.kernel.org, kernel-team@...com
Subject: Re: [PATCH RFC v2 1/8] xdp: Infrastructure to generalize XDP
From: Tom Herbert <tom@...bertland.com>
Date: Thu, 9 Feb 2017 20:55:34 -0800
> On Thu, Feb 9, 2017 at 7:33 PM, David Miller <davem@...emloft.net> wrote:
>> From: Tom Herbert <tom@...bertland.com>
>> Date: Thu, 9 Feb 2017 18:29:54 -0800
>>
>>> So we have thousands or LOC coming into drivers every day anyway with
>>> all those properties anyway, so this "restricted" environment solves
>>> at best 1% of the problem.
>>
>> What you must understand is that no matter what someone outside of
>> upstream writes into an eBPF program, it's safe, and we can absolutely
>> prove this with the verifier and the invariants of the execution
>> environment.
>>
> This is the exact same argument the userspace stack proponents will
> use-- put your stack in userspace and you can't crash the host.
Sounds like we can therefore meet that requirement and keep them in
the kernel networking path, which supports all of our values and goals
precisely.
Powered by blists - more mailing lists