From: Daniel Borkmann Subject: Re: BPF hash algo (Re: [kernel-hardening] Re: [PATCH v7 3/6] random: use SipHash in place of MD5) Date: Fri, 23 Dec 2016 11:23:43 +0100 Message-ID: <585CFB2F.8010102@iogearbox.net> References: <1482425969.2673.5.camel@stressinduktion.org> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Cc: Alexei Starovoitov , "Jason A. Donenfeld" , "kernel-hardening@lists.openwall.com" , Theodore Ts'o , Netdev , LKML , Linux Crypto Mailing List , David Laight , Eric Dumazet , Linus Torvalds , Eric Biggers , Tom Herbert , Andi Kleen , "David S. Miller" , Jean-Philippe Aumasson To: Andy Lutomirski , Hannes Frederic Sowa Return-path: In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-crypto.vger.kernel.org On 12/22/2016 06:25 PM, Andy Lutomirski wrote: > On Thu, Dec 22, 2016 at 8:59 AM, Hannes Frederic Sowa [...] >> I wondered if bpf program loading should have used the module loading >> infrastructure from the beginning... > > That would be way too complicated and would be nasty for the unprivileged cases. Also, there are users be it privileged or not that don't require to have a full obj loader from user space, but are fine with just hard-coding parts or all of the insns in their application. Back then we settled with using fds based on Andy's suggestion, it has both ups and downs as we saw along the way but worked okay thus far.