lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20120329.044324.1881363222808734381.davem@davemloft.net> Date: Thu, 29 Mar 2012 04:43:24 -0400 (EDT) From: David Miller <davem@...emloft.net> To: jpirko@...hat.com Cc: eric.dumazet@...il.com, netdev@...r.kernel.org, bhutchings@...arflare.com, shemminger@...tta.com, matt@...abs.org Subject: Re: [Q/RFC] BPF use in broader scope From: Jiri Pirko <jpirko@...hat.com> Date: Thu, 29 Mar 2012 10:31:49 +0200 > Thu, Mar 29, 2012 at 10:02:25AM CEST, eric.dumazet@...il.com wrote: >>On Thu, 2012-03-29 at 09:54 +0200, Jiri Pirko wrote: >> >>> Yep, I'm aware. I must admit that the JIT code scares me a litte :( >>> >> >>If you add a new XOR instruction in interpreter only, JIT compiler will >>automatically aborts, so no risk. >> >>Each arch maintainer will add the support for the new instructions as >>separate patches. >> >>So you can focus on net/core/filter.c file only. >> > > Ok - I can do this for 2). But for 3) JITs need to be modified. So I > would like to kindly ask you and Matt if you can do this modification so > bpf_func takes pointer to mem (scratch store) as second parameter. I'm > sure it's very easy for you to do. The ARM JIT just went into Linus's tree as well. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists