lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <c7aa00fc-409f-b896-8c81-65fa60c9d99a@iogearbox.net> Date: Wed, 23 Jan 2019 12:33:05 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: Yafang Shao <laoar.shao@...il.com>, kafai@...com, brakmo@...com, ast@...nel.org Cc: netdev@...r.kernel.org, shaoyafang@...iglobal.com Subject: Re: [PATCH v2 bpf] bpf: sock recvbuff must be limited by rmem_max in bpf_setsockopt() On 01/23/2019 05:37 AM, Yafang Shao wrote: > When sock recvbuff is set by bpf_setsockopt(), the value must by limited > by rmem_max. > It is the same with sendbuff. > > Fixes: 8c4b4c7e9ff0 ("bpf: Add setsockopt helper function to bpf") > Acked-by: Martin KaFai Lau <kafai@...com> > Acked-by: Lawrence Brakmo <brakmo@...com> > Signed-off-by: Yafang Shao <laoar.shao@...il.com> Applied, thanks!
Powered by blists - more mailing lists