lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <f6e4653b-e9b8-36b8-1e02-402df8c0ebc0@iogearbox.net> Date: Fri, 1 Feb 2019 21:07:38 +0100 From: Daniel Borkmann <daniel@...earbox.net> To: Sandipan Das <sandipan@...ux.ibm.com>, ast@...com Cc: kafai@...com, naveen.n.rao@...ux.ibm.com, netdev@...r.kernel.org Subject: Re: [PATCH bpf-next] bpf: powerpc64: add JIT support for bpf line info On 02/01/2019 11:32 AM, Sandipan Das wrote: > This adds support for generating bpf line info for > JITed programs. > > Signed-off-by: Sandipan Das <sandipan@...ux.ibm.com> > --- > arch/powerpc/net/bpf_jit_comp64.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/arch/powerpc/net/bpf_jit_comp64.c b/arch/powerpc/net/bpf_jit_comp64.c > index 15bba765fa79..4194d3cfb60c 100644 > --- a/arch/powerpc/net/bpf_jit_comp64.c > +++ b/arch/powerpc/net/bpf_jit_comp64.c > @@ -1185,6 +1185,7 @@ struct bpf_prog *bpf_int_jit_compile(struct bpf_prog *fp) > > bpf_flush_icache(bpf_hdr, (u8 *)bpf_hdr + (bpf_hdr->pages * PAGE_SIZE)); > if (!fp->is_func || extra_pass) { > + bpf_prog_fill_jited_linfo(fp, addrs); > out_addrs: > kfree(addrs); > kfree(jit_data); > Applied, thanks!
Powered by blists - more mailing lists