Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751090AbaKPVeU (ORCPT ); Sun, 16 Nov 2014 16:34:20 -0500 Received: from shards.monkeyblade.net ([149.20.54.216]:38648 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750764AbaKPVeT (ORCPT ); Sun, 16 Nov 2014 16:34:19 -0500 Date: Sun, 16 Nov 2014 16:34:15 -0500 (EST) Message-Id: <20141116.163415.1667397687779909689.davem@davemloft.net> To: ast@plumgrid.com Cc: mingo@kernel.org, luto@amacapital.net, dborkman@redhat.com, hannes@stressinduktion.org, edumazet@google.com, linux-api@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 net-next 6/7] bpf: allow eBPF programs to use maps From: David Miller In-Reply-To: References: <1415929010-9361-7-git-send-email-ast@plumgrid.com> <20141116.140422.570375628237589645.davem@davemloft.net> X-Mailer: Mew version 6.5 on Emacs 24.1 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.7 (shards.monkeyblade.net [149.20.54.216]); Sun, 16 Nov 2014 13:34:18 -0800 (PST) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexei Starovoitov Date: Sun, 16 Nov 2014 13:24:53 -0800 > The requirement that _unprivileged_ programs should > not be able to pass all these pointers back to user is > well understood and was discussed in detail several > month back. It's verifier that will prevent leaking of > kernel addresses. Ok, fair enough. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/