lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 28 May 2020 07:12:08 +0200 From: Christoph Hellwig <hch@....de> To: "David S. Miller" <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org> Cc: Eric Dumazet <edumazet@...gle.com>, Alexey Kuznetsov <kuznet@....inr.ac.ru>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>, Jon Maloy <jmaloy@...hat.com>, Ying Xue <ying.xue@...driver.com>, drbd-dev@...ts.linbit.com, linux-kernel@...r.kernel.org, linux-rdma@...r.kernel.org, linux-nvme@...ts.infradead.org, target-devel@...r.kernel.org, linux-afs@...ts.infradead.org, linux-cifs@...r.kernel.org, cluster-devel@...hat.com, ocfs2-devel@....oracle.com, netdev@...r.kernel.org, ceph-devel@...r.kernel.org, rds-devel@....oracle.com, linux-nfs@...r.kernel.org, tipc-discussion@...ts.sourceforge.net Subject: remove most callers of kernel_setsockopt v3 Hi Dave, this series removes most callers of the kernel_setsockopt functions, and instead switches their users to small functions that implement setting a sockopt directly using a normal kernel function call with type safety and all the other benefits of not having a function call. In some cases these functions seem pretty heavy handed as they do a lock_sock even for just setting a single variable, but this mirrors the real setsockopt implementation unlike a few drivers that just set set the fields directly. Changes since v2: - drop the separately merged kernel_getopt_removal - drop the sctp patches, as there is conflicting cleanup going on - add an additional ACK for the rxrpc changes Changes since v1: - use ->getname for sctp sockets in dlm - add a new ->bind_add struct proto method for dlm/sctp - switch the ipv6 and remaining sctp helpers to inline function so that the ipv6 and sctp modules are not pulled in by any module that could potentially use ipv6 or sctp connections - remove arguments to various sock_* helpers that are always used with the same constant arguments
Powered by blists - more mailing lists