lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANn89iJGffSLbmh=9_df10y680S1WRJjnLbt5ddZQM9-okpkgQ@mail.gmail.com>
Date: Mon, 10 Feb 2025 19:46:58 +0100
From: Eric Dumazet <edumazet@...gle.com>
To: Willem de Bruijn <willemdebruijn.kernel@...il.com>
Cc: "David S . Miller" <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, 
	Paolo Abeni <pabeni@...hat.com>, netdev@...r.kernel.org, 
	Willem de Bruijn <willemb@...gle.com>, Simon Horman <horms@...nel.org>, eric.dumazet@...il.com
Subject: Re: [PATCH net-next 0/4] net: add EXPORT_IPV6_MOD()

On Mon, Feb 10, 2025 at 7:33 PM Willem de Bruijn
<willemdebruijn.kernel@...il.com> wrote:
>
> Eric Dumazet wrote:
> > In this series I am adding EXPORT_IPV6_MOD and EXPORT_IPV6_MOD_GPL()
> > so that we can replace some EXPORT_SYMBOL() when IPV6 is
> > not modular.
> >
> > This is making all the selected symbols internal to core
> > linux networking.
>
> Is the goal to avoid use by external code, similar to the recent
> addition of namespacified internal network exports with
> EXPORT_SYMBOL_NS_GPL( , "NETDEV_INTERNAL")?

Goals are :

1) Documentation purpose :
     This symbol is privately exported, and might not be exported
under some conditions.
      Effectively this makes these symbols unavailable to modules.

      I thought of using _GPL even for EXPORT_IPV6_MOD() indeed.

2) Remove three lines in /proc/kallsyms per symbol, eg :

ffffffff8b94433c r __ksymtab_tcp_sockets_allocated
ffffffff8b96fa75 r __kstrtabns_tcp_sockets_allocated
ffffffff8b99adf0 r __kstrtab_tcp_sockets_allocated

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ