Re: [PATCH v2 net-next 6/7] bpf: allow eBPF programs to use maps

From: David Miller
Date: Sun Nov 16 2014 - 16:34:39 EST


From: Alexei Starovoitov <ast@xxxxxxxxxxxx>
Date: Sun, 16 Nov 2014 13:24:53 -0800

> The requirement that _unprivileged_ programs should
> not be able to pass all these pointers back to user is
> well understood and was discussed in detail several
> month back. It's verifier that will prevent leaking of
> kernel addresses.

Ok, fair enough.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/