[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5jJujrx3d+qM-50f1UCVxZopWzLCTJQpw3KWh+o4Nq9JOg@mail.gmail.com>
Date: Wed, 5 Jul 2017 15:11:26 -0700
From: Kees Cook <keescook@...omium.org>
To: Shubham Bansal <illusionist.neo@...il.com>
Cc: Daniel Borkmann <daniel@...earbox.net>,
Network Development <netdev@...r.kernel.org>,
"David S. Miller" <davem@...emloft.net>,
Alexei Starovoitov <ast@...nel.org>,
Russell King <linux@...linux.org.uk>,
"linux-arm-kernel@...ts.infradead.org"
<linux-arm-kernel@...ts.infradead.org>,
LKML <linux-kernel@...r.kernel.org>, Andrew Lunn <andrew@...n.ch>
Subject: Re: [PATCH v2] arm: eBPF JIT compiler
On Fri, Jun 23, 2017 at 3:39 PM, Shubham Bansal
<illusionist.neo@...il.com> wrote:
> Hi Russell,Daniel and Kees,
>
> I am attaching the latest patch with this mail. It included support
> for BPF_CALL | BPF_JMP tested with and without constant blinding on
> ARMv7 machine.
> Due to the limitation on my machine I can't test the tail call. It
> would be a great help if any of you could help me with this.
Is this just a matter of running test_bpf?
Have you been able to debootstrap a debian chroot for ARMv7?
> Its been a long time since this patch is in works, Russell, can you
> please help with sending this patch to ARM patch tracker?
If some other folks can Ack this, I can throw it at the patch tracker
for you. I'll report back on my findings.
-Kees
--
Kees Cook
Pixel Security
Powered by blists - more mailing lists