From mboxrd@z Thu Jan 1 00:00:00 1970 From: mgherzan@gmail.com (Mircea Gherzan) Date: Thu, 15 Mar 2012 08:23:43 +0100 Subject: [PATCH v7] ARM: net: JIT compiler for packet filters In-Reply-To: <20120213160248.GA25655@n2100.arm.linux.org.uk> References: <1325937154-2656-1-git-send-email-mgherzan@gmail.com> <4F392DFD.4070600@gmail.com> <20120213160248.GA25655@n2100.arm.linux.org.uk> Message-ID: <4F6198FF.90801@gmail.com> To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org Am 13.02.2012 17:02, schrieb Russell King - ARM Linux: > On Mon, Feb 13, 2012 at 04:36:29PM +0100, Mircea Gherzan wrote: >> Gentle ping. This patch has been in the tracking system for over a >> month. Is there any reason not to apply it in arm/for-next? > > Yes. It needs quite a review to make sure that there's absolutely no > possibility for userspace to be able to generate malicious ARM code > and then have it executed. Or put it another way: security paranoia. Are there any specific security aspects you're thinking of? Leaks to userspace, divisions by zero and invalid packet offsets are already taken care of. > I'm afraid that I've not been able to look at it at all yet, and I > haven't seen anyone looking at the code from that aspect. Thanks, Mircea