lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1571788711-4397-1-git-send-email-u9012063@gmail.com>
Date:   Tue, 22 Oct 2019 16:58:31 -0700
From:   William Tu <u9012063@...il.com>
To:     netdev@...r.kernel.org
Cc:     bjorn.topel@...el.com, daniel@...earbox.net, ast@...nel.org,
        magnus.karlsson@...el.com, brouer@...hat.com
Subject: [PATCH net-next] xsk: Enable AF_XDP by default.

The patch enables XDP_SOCKETS and XDP_SOCKETS_DIAG used by AF_XDP,
and its dependency on BPF_SYSCALL.

Signed-off-by: William Tu <u9012063@...il.com>
---
 init/Kconfig    | 2 +-
 net/xdp/Kconfig | 4 ++--
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/init/Kconfig b/init/Kconfig
index b4daad2bac23..229eceeb93d4 100644
--- a/init/Kconfig
+++ b/init/Kconfig
@@ -1631,7 +1631,7 @@ config BPF_SYSCALL
 	bool "Enable bpf() system call"
 	select BPF
 	select IRQ_WORK
-	default n
+	default y
 	help
 	  Enable the bpf() system call that allows to manipulate eBPF
 	  programs and maps via file descriptors.
diff --git a/net/xdp/Kconfig b/net/xdp/Kconfig
index 71af2febe72a..77fd51d6a5d7 100644
--- a/net/xdp/Kconfig
+++ b/net/xdp/Kconfig
@@ -2,7 +2,7 @@
 config XDP_SOCKETS
 	bool "XDP sockets"
 	depends on BPF_SYSCALL
-	default n
+	default y
 	help
 	  XDP sockets allows a channel between XDP programs and
 	  userspace applications.
@@ -10,7 +10,7 @@ config XDP_SOCKETS
 config XDP_SOCKETS_DIAG
 	tristate "XDP sockets: monitoring interface"
 	depends on XDP_SOCKETS
-	default n
+	default y
 	help
 	  Support for PF_XDP sockets monitoring interface used by the ss tool.
 	  If unsure, say Y.
-- 
2.7.4

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ