Hello:
This patch was applied to bpf/bpf-next.git (refs/heads/master):
On Mon, 1 Feb 2021 21:38:37 -0800 you wrote:
> From: Alexei Starovoitov
>
> PTR_TO_BTF_ID registers contain either kernel pointer or NULL.
> Emit the NULL check explicitly by JIT instead of going into
> do_user_addr_fault()
> On Feb 2, 2021, at 6:19 PM, Alexei Starovoitov
> wrote:
>
> On Wed, Feb 03, 2021 at 12:56:39AM +, Song Liu wrote:
>>
>>
>>> On Feb 1, 2021, at 9:38 PM, Alexei Starovoitov
>>> wrote:
>>>
>>> From: Alexei Starovoitov
>>>
>>> PTR_TO_BTF_ID registers contain either kernel pointer or
On Wed, Feb 03, 2021 at 12:56:39AM +, Song Liu wrote:
>
>
> > On Feb 1, 2021, at 9:38 PM, Alexei Starovoitov
> > wrote:
> >
> > From: Alexei Starovoitov
> >
> > PTR_TO_BTF_ID registers contain either kernel pointer or NULL.
> > Emit the NULL check explicitly by JIT instead of going into
> On Feb 1, 2021, at 9:38 PM, Alexei Starovoitov
> wrote:
>
> From: Alexei Starovoitov
>
> PTR_TO_BTF_ID registers contain either kernel pointer or NULL.
> Emit the NULL check explicitly by JIT instead of going into
> do_user_addr_fault() on NULL deference.
>
> Signed-off-by: Alexei Starov
From: Alexei Starovoitov
PTR_TO_BTF_ID registers contain either kernel pointer or NULL.
Emit the NULL check explicitly by JIT instead of going into
do_user_addr_fault() on NULL deference.
Signed-off-by: Alexei Starovoitov
---
arch/x86/net/bpf_jit_comp.c | 19 +++
1 file changed