From mboxrd@z Thu Jan 1 00:00:00 1970 From: Thomas Graf Subject: Re: Netlink mmap tx security? Date: Wed, 17 Dec 2014 16:27:49 +0000 Message-ID: <20141217162749.GC28766@casper.infradead.org> References: <20141014.220908.123550384430402000.davem@davemloft.net> <543F6998.5090000@redhat.com> <20141016070753.GA16738@casper.infradead.org> <20141216.175817.576861457076632402.davem@davemloft.net> <5490C73C.8010405@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: David Miller , luto@amacapital.net, torvalds@linux-foundation.org, kaber@trash.net, netdev@vger.kernel.org To: Daniel Borkmann Return-path: Received: from casper.infradead.org ([85.118.1.10]:55996 "EHLO casper.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750954AbaLQQ1u (ORCPT ); Wed, 17 Dec 2014 11:27:50 -0500 Content-Disposition: inline In-Reply-To: <5490C73C.8010405@redhat.com> Sender: netdev-owner@vger.kernel.org List-ID: On 12/17/14 at 12:58am, Daniel Borkmann wrote: > Fixes: 5fd96123ee19 ("netlink: implement memory mapped sendmsg()") > Acked-by: Daniel Borkmann Nothing to add to Daniel's excellent feedback. Acked-by: Thomas Graf