[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210107021701.1797-1-glin@suse.com>
Date: Thu, 7 Jan 2021 10:16:58 +0800
From: Gary Lin <glin@...e.com>
To: netdev@...r.kernel.org, bpf@...r.kernel.org,
Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>
CC: Eric Dumazet <eric.dumazet@...il.com>,
Andrii Nakryiko <andrii.nakryiko@...il.com>,
andreas.taschner@...e.com
Subject: [PATCH RESEND v2 0/3] bpf,x64: implement jump padding in jit
This patch series implements jump padding to x64 jit to cover some
corner cases that used to consume more than 20 passes and caused
failure.
v2:
- Simplify the sample code in the commit description and provide the
jit code
- Check the expected padding bytes with WARN_ONCE
- Move the 'padded' flag to 'struct x64_jit_data'
- Remove the EXPECTED_FAIL flag from bpf_fill_maxinsns11() in test_bpf
- Add 2 verifier tests
Gary Lin (3):
bpf,x64: pad NOPs to make images converge more easily
test_bpf: remove EXPECTED_FAIL flag from bpf_fill_maxinsns11
selftests/bpf: Add verifier test for x64 jit jump padding
arch/x86/net/bpf_jit_comp.c | 86 +++++++++++++++------
lib/test_bpf.c | 7 +-
tools/testing/selftests/bpf/test_verifier.c | 43 +++++++++++
tools/testing/selftests/bpf/verifier/jit.c | 16 ++++
4 files changed, 122 insertions(+), 30 deletions(-)
--
2.29.2
Powered by blists - more mailing lists