Re: [PATCH v2 net] x86: bpf_jit: fix two bugs in eBPF JIT compiler

2014-10-14 Thread David Miller
From: Alexei Starovoitov Date: Fri, 10 Oct 2014 20:30:23 -0700 > 1. > JIT compiler using multi-pass approach to converge to final image size, > since x86 instructions are variable length. It starts with large > gaps between instructions (so some jumps may use imm32 instead of imm8) > and

Re: [PATCH v2 net] x86: bpf_jit: fix two bugs in eBPF JIT compiler

2014-10-14 Thread David Miller
From: Alexei Starovoitov a...@plumgrid.com Date: Fri, 10 Oct 2014 20:30:23 -0700 1. JIT compiler using multi-pass approach to converge to final image size, since x86 instructions are variable length. It starts with large gaps between instructions (so some jumps may use imm32 instead of imm8)

Re: [PATCH v2 net] x86: bpf_jit: fix two bugs in eBPF JIT compiler

2014-10-13 Thread Darrick J. Wong
On Fri, Oct 10, 2014 at 08:30:23PM -0700, Alexei Starovoitov wrote: > 1. > JIT compiler using multi-pass approach to converge to final image size, > since x86 instructions are variable length. It starts with large > gaps between instructions (so some jumps may use imm32 instead of imm8) > and

Re: [PATCH v2 net] x86: bpf_jit: fix two bugs in eBPF JIT compiler

2014-10-13 Thread Darrick J. Wong
On Fri, Oct 10, 2014 at 08:30:23PM -0700, Alexei Starovoitov wrote: 1. JIT compiler using multi-pass approach to converge to final image size, since x86 instructions are variable length. It starts with large gaps between instructions (so some jumps may use imm32 instead of imm8) and iterates

[PATCH v2 net] x86: bpf_jit: fix two bugs in eBPF JIT compiler

2014-10-12 Thread Ortwin Glück
> Fixes: 622582786c9e ("net: filter: x86: internal BPF JIT") Hi, I confirm that this fixes my kernel panic when using nmap as root on 3.17. Ortwin -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info

[PATCH v2 net] x86: bpf_jit: fix two bugs in eBPF JIT compiler

2014-10-12 Thread Ortwin Glück
Fixes: 622582786c9e (net: filter: x86: internal BPF JIT) Hi, I confirm that this fixes my kernel panic when using nmap as root on 3.17. Ortwin -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at

[PATCH v2 net] x86: bpf_jit: fix two bugs in eBPF JIT compiler

2014-10-10 Thread Alexei Starovoitov
1. JIT compiler using multi-pass approach to converge to final image size, since x86 instructions are variable length. It starts with large gaps between instructions (so some jumps may use imm32 instead of imm8) and iterates until total program size is the same as in previous pass. This algorithm

[PATCH v2 net] x86: bpf_jit: fix two bugs in eBPF JIT compiler

2014-10-10 Thread Alexei Starovoitov
1. JIT compiler using multi-pass approach to converge to final image size, since x86 instructions are variable length. It starts with large gaps between instructions (so some jumps may use imm32 instead of imm8) and iterates until total program size is the same as in previous pass. This algorithm