[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5j+ZCJ8rRK=DAKaeuNmGzVY7xo1o9uJyWPEijmg9gw4fKA@mail.gmail.com>
Date: Thu, 30 Nov 2017 16:57:30 -0800
From: Kees Cook <keescook@...omium.org>
To: Shmulik Ladkani <shmulik.ladkani@...il.com>,
Willem de Bruijn <willemb@...gle.com>,
Daniel Borkmann <daniel@...earbox.net>,
Pablo Neira Ayuso <pablo@...filter.org>
Cc: Linus Torvalds <torvalds@...ux-foundation.org>,
David Miller <davem@...emloft.net>,
LKML <linux-kernel@...r.kernel.org>,
Network Development <netdev@...r.kernel.org>,
Al Viro <viro@...iv.linux.org.uk>,
Christoph Hellwig <hch@...radead.org>,
Thomas Garnier <thgarnie@...gle.com>,
Jann Horn <jannh@...gle.com>
Subject: Re: netfilter: xt_bpf: Fix XT_BPF_MODE_FD_PINNED mode of 'xt_bpf_info_v1'
On Mon, Oct 9, 2017 at 4:10 PM, David Miller <davem@...emloft.net> wrote:
> Shmulik Ladkani (1):
> netfilter: xt_bpf: Fix XT_BPF_MODE_FD_PINNED mode of 'xt_bpf_info_v1'
This adds a new user of set_fs(), which we're trying to eliminate (or
at least not expand):
+ set_fs(KERNEL_DS);
+ fd = bpf_obj_get_user(path);
+ set_fs(oldfs);
Can you please adjust this to not make set_fs() changes?
Thanks!
-Kees
--
Kees Cook
Pixel Security
Powered by blists - more mailing lists