lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 23 Nov 2019 11:39:15 +0100 From: Jakub Sitnicki <jakub@...udflare.com> To: Daniel Borkmann <daniel@...earbox.net> Cc: ast@...nel.org, john.fastabend@...il.com, andrii.nakryiko@...il.com, netdev@...r.kernel.org, bpf@...r.kernel.org Subject: Re: [PATCH bpf-next v2 6/8] bpf: constant map key tracking for prog array pokes On Fri, Nov 22, 2019 at 09:07 PM CET, Daniel Borkmann wrote: [...] > @@ -9046,6 +9110,7 @@ static int fixup_call_args(struct bpf_verifier_env *env) > static int fixup_bpf_calls(struct bpf_verifier_env *env) > { > struct bpf_prog *prog = env->prog; > + bool expect_blinding = bpf_jit_blinding_enabled(prog); > struct bpf_insn *insn = prog->insnsi; > const struct bpf_func_proto *fn; > const int insn_cnt = prog->len; I noticed this is breaking the build if CONFIG_BPF_JIT is not set: kernel/bpf/verifier.c: In function ‘fixup_bpf_calls’: kernel/bpf/verifier.c:9134:25: error: implicit declaration of function ‘bpf_jit_blinding_enabled’; did you mean ‘bpf_jit_kallsyms_enabled’? [-Werror=implicit-function-declaration] bool expect_blinding = bpf_jit_blinding_enabled(prog); ^~~~~~~~~~~~~~~~~~~~~~~~ bpf_jit_kallsyms_enabled
Powered by blists - more mailing lists