diff options
author | Eric Dumazet <eric.dumazet@gmail.com> | 2012-03-17 22:40:48 -0400 |
---|---|---|
committer | Luis Henriques <luis.henriques@canonical.com> | 2012-04-05 11:17:33 -0400 |
commit | b87009cd51a4db7977fbb5a0fc2558c14780e517 (patch) | |
tree | c61c95c3fdeb43c696b2025d07cae19f8d0a9a42 /net/core/dev.c | |
parent | 6e076d81b4a365c80dabaf1803b204c0c667c301 (diff) |
net: bpf_jit: fix BPF_S_LDX_B_MSH compilation
BugLink: http://bugs.launchpad.net/bugs/971808
[ Upstream commit dc72d99dabb870ca5bd6d9fff674be853bb4a88d ]
Matt Evans spotted that x86 bpf_jit was incorrectly handling negative
constant offsets in BPF_S_LDX_B_MSH instruction.
We need to abort JIT compilation like we do in common_load so that
filter uses the interpreter code and can call __load_pointer()
Reference: http://lists.openwall.net/netdev/2011/07/19/11
Thanks to Indan Zupancic to bring back this issue.
Reported-by: Matt Evans <matt@ozlabs.org>
Reported-by: Indan Zupancic <indan@nul.nu>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/core/dev.c')
0 files changed, 0 insertions, 0 deletions