lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CABTgHBvx62nrr2fSOFFyDaB7OUpOJ-uozOg7_Y0adbLJxJhZcA@mail.gmail.com>
Date: Wed, 9 Aug 2023 20:02:53 +0530
From: Nayan Gadre <beejoy.nayan@...il.com>
To: netdev@...r.kernel.org
Subject: Calling nlmsg_multicast and nlmsg_new in softirq context, netfilter
 hook function

Hi,

I have a netfilter hook attached at NF_NETDEV_INGRESS, very early in
the network stack. I am doing some filtering on the sk_buff and if it
matches a certain condition, I want to send a netlink event to an
application.

This will involve allocating a buffer to send using nlmsg_new, with
GFP_ATOMIC flag, as the hook will run in the bottom half and then call
nlmsg_multicast().

Is it safe to call these APIs in the softirq context / netfilter hook function?

Thanks
N Gadre.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ