[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1895b546-9ae1-48b1-a2b1-902b73e28384@huaweicloud.com>
Date: Fri, 19 Jul 2024 16:41:31 +0800
From: Xu Kuohai <xukuohai@...weicloud.com>
To: Shung-Hsi Yu <shung-hsi.yu@...e.com>
Cc: bpf@...r.kernel.org, netdev@...r.kernel.org,
linux-security-module@...r.kernel.org, Alexei Starovoitov <ast@...nel.org>,
Andrii Nakryiko <andrii@...nel.org>, Daniel Borkmann <daniel@...earbox.net>,
Eduard Zingerman <eddyz87@...il.com>, Yonghong Song
<yonghong.song@...ux.dev>, KP Singh <kpsingh@...nel.org>,
Roberto Sassu <roberto.sassu@...wei.com>,
Matt Bobrowski <mattbobrowski@...gle.com>, Yafang Shao
<laoar.shao@...il.com>, Ilya Leoshkevich <iii@...ux.ibm.com>,
"Jose E . Marchesi" <jose.marchesi@...cle.com>,
James Morris <jamorris@...ux.microsoft.com>, Kees Cook <kees@...nel.org>,
Brendan Jackman <jackmanb@...gle.com>, Florent Revest <revest@...gle.com>
Subject: Re: [PATCH bpf-next v1 5/9] bpf, verifier: improve signed ranges
inference for BPF_AND
On 7/19/2024 4:23 PM, Shung-Hsi Yu wrote:
> On Fri, Jul 19, 2024 at 04:17:45PM GMT, Xu Kuohai wrote:
>> From: Shung-Hsi Yu <shung-hsi.yu@...e.com>
>>
>> This commit teach the BPF verifier how to infer signed ranges directly
>> from signed ranges of the operands to prevent verifier rejection, which
>> is needed for the following BPF program's no-alu32 version, as shown by
>> Xu Kuohai:
>>
> [...]
>
> Ah, I just sent and updated version of this patch[1] about the same time
> as you, sorry about not communicating this clearer. Could you use the
> update version instead?
>
> Thanks,
> Shung-Hsi
>
> 0: https://lore.kernel.org/bpf/20240719081702.137173-1-shung-hsi.yu@suse.com/
>
Interesting, we've sent the patch almost at the same time. I'll post an update
with your new patch, thanks.
Powered by blists - more mailing lists