[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190506102341.12361-1-daniel@iogearbox.net>
Date: Mon, 6 May 2019 12:23:41 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: davem@...emloft.net
Cc: daniel@...earbox.net, ast@...nel.org, netdev@...r.kernel.org,
bpf@...r.kernel.org
Subject: pull-request: bpf 2019-05-06
Hi David,
The following pull-request contains BPF updates for your *net* tree.
The main changes are:
1) Two x32 JIT fixes: one which has buggy signed comparisons in 64
bit conditional jumps and another one for 64 bit negation, both
from Wang.
Please consider pulling these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
Thanks a lot!
----------------------------------------------------------------
The following changes since commit 886b7a50100a50f1cbd08a6f8ec5884dfbe082dc:
ipv6: A few fixes on dereferencing rt->from (2019-05-01 17:17:54 -0400)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git
for you to fetch changes up to b9aa0b35d878dff9ed19f94101fe353a4de00cc4:
bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG (2019-05-01 23:40:47 +0200)
----------------------------------------------------------------
Wang YanQing (2):
bpf, x32: Fix bug for BPF_JMP | {BPF_JSGT, BPF_JSLE, BPF_JSLT, BPF_JSGE}
bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG
arch/x86/net/bpf_jit_comp32.c | 236 +++++++++++++++++++++--------
tools/testing/selftests/bpf/verifier/jit.c | 19 +++
2 files changed, 191 insertions(+), 64 deletions(-)
Powered by blists - more mailing lists