lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20220831155341.GC15107@breakpoint.cc> Date: Wed, 31 Aug 2022 17:53:41 +0200 From: Florian Westphal <fw@...len.de> To: Alexei Starovoitov <alexei.starovoitov@...il.com> Cc: Florian Westphal <fw@...len.de>, Daniel Borkmann <daniel@...earbox.net>, Andrii Nakryiko <andrii@...nel.org>, Martin KaFai Lau <martin.lau@...ux.dev>, "David S. Miller" <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, Network Development <netdev@...r.kernel.org>, Toke Høiland-Jørgensen <toke@...nel.org>, netfilter-devel <netfilter-devel@...r.kernel.org>, bpf <bpf@...r.kernel.org> Subject: Re: [PATCH nf-next] netfilter: nf_tables: add ebpf expression Alexei Starovoitov <alexei.starovoitov@...il.com> wrote: > > 1 and 2 have the upside that its easy to handle a 'file not found' > > error. > > I'm strongly against calling into bpf from the inner guts of nft. > Nack to all options discussed in this thread. > None of them make any sense. -v please. I can just rework userspace to allow going via xt_bpf but its brain damaged. This helps gradually moving towards move epbf for those that still heavily rely on the classic forwarding path. If you are open to BPF_PROG_TYPE_NETFILTER I can go that route as well, raw bpf program attachment via NF_HOOK and the bpf dispatcher, but it will take significantly longer to get there. It involves reviving https://lore.kernel.org/netfilter-devel/20211014121046.29329-1-fw@strlen.de/ as a first stage/merge goal.
Powered by blists - more mailing lists