lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 3 Dec 2018 18:56:00 +0530 From: Sandipan Das <sandipan@...ux.ibm.com> To: Daniel Borkmann <daniel@...earbox.net> Cc: ast@...nel.org, naveen.n.rao@...ux.ibm.com, mpe@...erman.id.au, linuxppc-dev@...ts.ozlabs.org, netdev@...r.kernel.org Subject: Re: [PATCH bpf] bpf: powerpc64: optimize JIT passes for bpf function calls Hi Daniel, On 03/12/18 6:18 PM, Daniel Borkmann wrote: > > Thanks for the patch, just to clarify, it's targeted at bpf-next and > not bpf, correct? > This patch is targeted at the bpf tree. This depends on commit e2c95a61656d ("bpf, ppc64: generalize fetching subprog into bpf_jit_get_func_addr") which is already available in the bpf tree. Thanks, Sandipan
Powered by blists - more mailing lists