lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20231219145813.GA28704@breakpoint.cc> Date: Tue, 19 Dec 2023 15:58:13 +0100 From: Florian Westphal <fw@...len.de> To: "D. Wythe" <alibuda@...ux.alibaba.com> Cc: Simon Horman <horms@...nel.org>, pablo@...filter.org, kadlec@...filter.org, fw@...len.de, bpf@...r.kernel.org, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, coreteam@...filter.org, netfilter-devel@...r.kernel.org, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, ast@...nel.org Subject: Re: [RFC nf-next v2 1/2] netfilter: bpf: support prog update D. Wythe <alibuda@...ux.alibaba.com> wrote: > net/netfilter/nf_bpf_link.c:31:22: note: in expansion of macro > ‘rcu_dereference’ > 31 | return bpf_prog_run(rcu_dereference((const struct bpf_prog __rcu > *)nf_link->link.prog), &ctx); > | ^~~~~~~~~~~~~~~ > > So, I think we might need to go back to version 1. > > @ Florian , what do you think ? Use rcu_dereference_raw().
Powered by blists - more mailing lists