[PATCH bpf-next v1 5/9] bpf, verifier: improve signed ranges inference for BPF_AND

Xu Kuohai xukuohai at huaweicloud.com
Fri Jul 19 08:41:31 UTC 2024


On 7/19/2024 4:23 PM, Shung-Hsi Yu wrote:
> On Fri, Jul 19, 2024 at 04:17:45PM GMT, Xu Kuohai wrote:
>> From: Shung-Hsi Yu <shung-hsi.yu at suse.com>
>>
>> This commit teach the BPF verifier how to infer signed ranges directly
>> from signed ranges of the operands to prevent verifier rejection, which
>> is needed for the following BPF program's no-alu32 version, as shown by
>> Xu Kuohai:
>>
> [...]
> 
> Ah, I just sent and updated version of this patch[1] about the same time
> as you, sorry about not communicating this clearer. Could you use the
> update version instead?
> 
> Thanks,
> Shung-Hsi
> 
> 0: https://lore.kernel.org/bpf/20240719081702.137173-1-shung-hsi.yu@suse.com/
> 

Interesting, we've sent the patch almost at the same time. I'll post an update
with your new patch, thanks.




More information about the Linux-security-module-archive mailing list