On Wed, 2013-04-17 at 18:47 +0200, Patrick McHardy wrote: > Add support for mmap'ed sendmsg() to netlink. Since the kernel validates > received messages before processing them, the code makes sure userspace > can't modify the message contents after invoking sendmsg(). To do that > only a single mapping of the TX ring is allowed to exist and the socket > must not be shared. If either of these two conditions does not hold, it > falls back to copying. [...] Is this resistant against copy_to_process()? Ben. -- Ben Hutchings, Staff Engineer, Solarflare Not speaking for my employer; that's the marketing department's job. They asked us to note that Solarflare product names are trademarked. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html