diff options
author | Eric Dumazet <eric.dumazet@gmail.com> | 2012-03-18 02:40:48 +0000 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2012-04-02 09:53:08 -0700 |
commit | 8a9ecfa63e8113306420f60832b0b9631e26ec57 (patch) | |
tree | 5997f9972da777165a246f138551831fbd0905cb /kernel | |
parent | 0cff40794bd89b8218f64f8fe058fbf67835fc2f (diff) |
net: bpf_jit: fix BPF_S_LDX_B_MSH compilation
[ Upstream commit dc72d99dabb870ca5bd6d9fff674be853bb4a88d ]
Matt Evans spotted that x86 bpf_jit was incorrectly handling negative
constant offsets in BPF_S_LDX_B_MSH instruction.
We need to abort JIT compilation like we do in common_load so that
filter uses the interpreter code and can call __load_pointer()
Reference: http://lists.openwall.net/netdev/2011/07/19/11
Thanks to Indan Zupancic to bring back this issue.
Reported-by: Matt Evans <matt@ozlabs.org>
Reported-by: Indan Zupancic <indan@nul.nu>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions