From: | antlists <antlists@××××××××××××.uk> | ||
---|---|---|---|
To: | gentoo-user@l.g.o | ||
Subject: | Re: [gentoo-user] libbpf? BTF? blinking urxvt/fish? | ||
Date: | Thu, 15 Jul 2021 00:11:24 | ||
Message-Id: | 61502b53-fe5f-43ff-3671-01403d8ef598@youngman.org.uk | ||
In Reply to: | Re: [gentoo-user] libbpf? BTF? blinking urxvt/fish? by Michael |
1 | On 14/07/2021 17:02, Michael wrote: |
2 | > However, I'm no dev so I |
3 | > have no idea what the potential for BPF harming Linux security might be. |
4 | > Other more knowledgeable M/L contributors may chime in to explain better. |
5 | |
6 | The main thing I know is that the verifier enforces "forward progress". |
7 | If it can't *prove* that the BPF program will terminate, it fails |
8 | verification and is blocked, so it can't be used for a "denial of |
9 | service" attack. |
10 | |
11 | Cheers, |
12 | Wol |