lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 13 Aug 2020 17:08:21 -0700 From: Alexei Starovoitov <alexei.starovoitov@...il.com> To: Andrii Nakryiko <andriin@...com> Cc: bpf@...r.kernel.org, netdev@...r.kernel.org, ast@...com, daniel@...earbox.net, andrii.nakryiko@...il.com, kernel-team@...com Subject: Re: [PATCH v3 bpf 0/9] Fix various issues with 32-bit libbpf On Thu, Aug 13, 2020 at 01:49:36PM -0700, Andrii Nakryiko wrote: > This patch set contains fixes to libbpf, bpftool, and selftests that were > found while testing libbpf and selftests built in 32-bit mode. 64-bit nature > of BPF target and 32-bit host environment don't always mix together well > without extra care, so there were a bunch of problems discovered and fixed. > > Each individual patch contains additional explanations, where necessary. > > v2->v3: > - don't give up if failed to determine ELF class; > v1->v2: > - guess_ptr_sz -> determine_ptr_sz as per Alexei; > - added pointer size determination by ELF class. lgtm Applied, Thanks
Powered by blists - more mailing lists