Re: [PATCH v6 bpf-next 0/4] bpf: Introduce may_goto and cond_break

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello:

This series was applied to bpf/bpf-next.git (master)
by Andrii Nakryiko <andrii@xxxxxxxxxx>:

On Tue,  5 Mar 2024 19:19:25 -0800 you wrote:
> From: Alexei Starovoitov <ast@xxxxxxxxxx>
> 
> v5 -> v6:
> - Rename BPF_JMA to BPF_JCOND
> - Addressed Andrii's review comments
> 
> v4 -> v5:
> - rewrote patch 1 to avoid fake may_goto_reg and use 'u32 may_goto_cnt' instead.
>   This way may_goto handling is similar to bpf_loop() processing.
> - fixed bug in patch 2 that RANGE_WITHIN should not use
>   rold->type == NOT_INIT as a safe signal.
> - patch 3 fixed negative offset computation in cond_break macro
> - using bpf_arena and cond_break recompiled lib/glob.c as bpf prog
>   and it works! It will be added as a selftest to arena series.
> 
> [...]

Here is the summary with links:
  - [v6,bpf-next,1/4] bpf: Introduce may_goto instruction
    https://git.kernel.org/bpf/bpf-next/c/9c4cab4e6756
  - [v6,bpf-next,2/4] bpf: Recognize that two registers are safe when their ranges match
    https://git.kernel.org/bpf/bpf-next/c/cc570d85e66e
  - [v6,bpf-next,3/4] bpf: Add cond_break macro
    https://git.kernel.org/bpf/bpf-next/c/7825948e135b
  - [v6,bpf-next,4/4] selftests/bpf: Test may_goto
    https://git.kernel.org/bpf/bpf-next/c/8089b99d4649

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html






[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux