Message ID | 20230214232030.1502829-1-eddyz87@gmail.com (mailing list archive) |
---|---|
Headers | show |
Series | Improvements for BPF_ST tracking by verifier | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Wed, 15 Feb 2023 01:20:26 +0200 you wrote: > This patch-set is a part of preparation work for -mcpu=v4 option for > BPF C compiler (discussed in [1]). Among other things -mcpu=v4 should > enable generation of BPF_ST instruction by the compiler. > > - Patches #1,2 adjust verifier to track values of constants written to > stack using BPF_ST. Currently these are tracked imprecisely, unlike > the writes using BPF_STX, e.g.: > > [...] Here is the summary with links: - [bpf-next,v2,1/4] bpf: track immediate values written to stack by BPF_ST instruction https://git.kernel.org/bpf/bpf-next/c/ecdf985d7615 - [bpf-next,v2,2/4] selftests/bpf: check if verifier tracks constants spilled by BPF_ST_MEM https://git.kernel.org/bpf/bpf-next/c/1a24af65bb5f - [bpf-next,v2,3/4] bpf: BPF_ST with variable offset should preserve STACK_ZERO marks https://git.kernel.org/bpf/bpf-next/c/31ff2135121c - [bpf-next,v2,4/4] selftests/bpf: check if BPF_ST with variable offset preserves STACK_ZERO https://git.kernel.org/bpf/bpf-next/c/2a33c5a25ef4 You are awesome, thank you!