diff options
author | Daniel Borkmann <dborkman@redhat.com> | 2014-03-28 18:58:18 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2014-03-31 00:45:08 -0400 |
commit | f8bbbfc3b97f4c7a6c7c23185e520b22bfc3a21d (patch) | |
tree | e5d935854be9ec9d0c3024fbe3316cfce9e68349 /net | |
parent | 64c27237a07129758e33f5f824ba5c33b7f57417 (diff) | |
download | linux-f8bbbfc3b97f4c7a6c7c23185e520b22bfc3a21d.tar.gz linux-f8bbbfc3b97f4c7a6c7c23185e520b22bfc3a21d.tar.bz2 linux-f8bbbfc3b97f4c7a6c7c23185e520b22bfc3a21d.zip |
net: filter: add jited flag to indicate jit compiled filters
This patch adds a jited flag into sk_filter struct in order to indicate
whether a filter is currently jited or not. The size of sk_filter is
not being expanded as the 32 bit 'len' member allows upper bits to be
reused since a filter can currently only grow as large as BPF_MAXINSNS.
Therefore, there's enough room also for other in future needed flags to
reuse 'len' field if necessary. The jited flag also allows for having
alternative interpreter functions running as currently, we can only
detect jit compiled filters by testing fp->bpf_func to not equal the
address of sk_run_filter().
Joint work with Alexei Starovoitov.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Cc: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/core/filter.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/net/core/filter.c b/net/core/filter.c index 65b75966e206..bb3c76458ca9 100644 --- a/net/core/filter.c +++ b/net/core/filter.c @@ -646,6 +646,7 @@ static int __sk_prepare_filter(struct sk_filter *fp) int err; fp->bpf_func = sk_run_filter; + fp->jited = 0; err = sk_chk_filter(fp->insns, fp->len); if (err) |