Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2352148imm; Mon, 28 May 2018 06:34:00 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpAJHuoFU9sjJkWC9olVqTnpyr+kSkb7oRGZmAFb9jmdQPho417X4AVcINldak2KiCgyFJJ X-Received: by 2002:a17:902:5409:: with SMTP id d9-v6mr13477963pli.1.1527514440244; Mon, 28 May 2018 06:34:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527514440; cv=none; d=google.com; s=arc-20160816; b=V8mBFLheoebvEGhBGxMIX1VLGJeB2obcd+9IBeCxWppLq6wUwSwjTj5UMazKmDSIa5 sKf809Ge4B7L/VkWPF0FT1jHBZuPqNkSVz+SBkJm72i2z1Lee6XTxeQIPf9Ymj4RSceT dPi/C+4t4rYWmce34D7upsC7orZXFguMdykZV6LXcAXE9EcDNoNbFVfRNfnexQ0Q6rZJ 9aHag3s0Niuo8NElXx8fDmpgQmXtshQpOzRnZFD/Kd3V69diCu6uNel1HTWJTf6Tg/wb 51tsiXazIjxu8IHbmVIT4u8zFrC4LRBzF91Xy+6U6hMLL+xvc7ZY4Km+I/8JEMx50M6Z bfJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=YbSANGnG/MlYN06BuKWtnEDQwTNjESz81lXRIg4nnzY=; b=0CK78/82OTiVvxOYneI81mKvDrA+caF8Tz6kYJUN9Z3+SDKK4cp9EwQy32yKE6Moyz VTpbfgO4kwP+E+mxEO+I2DHpWRhqKyao8sO6W12t+ptfU6MWg/WLm/vWj9hQS3j/wv2j qk+CwOd+Qj3lYvcOMuvUswWRuvNfgTALDFsqoaFGdhWS+LXF30eJxoIEGgy8qx6yps1J aBScWr+GqWkyeyDse6/cEljEHQN0+op8gJBbwkQ3ZF9v3DHmjyNWCwCNfh+fvyThQF/g 9xpHcCXqWpCHugp7115MY+tDcRy5SJFNAggmd4Uy0okLr6V0Jgc9GXpNHu5lHKLo5IrG RFRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PV4XPJ22; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o10-v6si24359041pgq.148.2018.05.28.06.33.45; Mon, 28 May 2018 06:34:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PV4XPJ22; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1163112AbeE1KqY (ORCPT + 99 others); Mon, 28 May 2018 06:46:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:36620 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1163049AbeE1KqS (ORCPT ); Mon, 28 May 2018 06:46:18 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 20E7E204EE; Mon, 28 May 2018 10:46:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527504377; bh=DgVzkLsaeimWmaBLBBmXtvZbp277eD1NypUm7NJ8Smc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PV4XPJ22SyBjZYNOiEyThta/WDX/twI2zxF41YmYu6rIHqkSoQjoLZ/AyT0F0Mv48 8a24VRoMIHuQj6tS4TRqdFswD+UsZh361B4eyGvn6oR9iGXEi4FVTgpW3RKjYUG/d2 Uo85uCeBLxzT3XIRb8k+XTuISUzmtMADDr+WTlhw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mark Lord , "Naveen N. Rao" , Michael Ellerman , Sasha Levin Subject: [PATCH 4.14 117/496] powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access Date: Mon, 28 May 2018 11:58:22 +0200 Message-Id: <20180528100324.865556860@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100319.498712256@linuxfoundation.org> References: <20180528100319.498712256@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Mark Lord [ Upstream commit 083b20907185b076f21c265b30fe5b5f24c03d8c ] I am using SECCOMP to filter syscalls on a ppc32 platform, and noticed that the JIT compiler was failing on the BPF even though the interpreter was working fine. The issue was that the compiler was missing one of the instructions used by SECCOMP, so here is a patch to enable JIT for that instruction. Fixes: eb84bab0fb38 ("ppc: Kconfig: Enable BPF JIT on ppc32") Signed-off-by: Mark Lord Acked-by: Naveen N. Rao Signed-off-by: Michael Ellerman Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/net/bpf_jit_comp.c | 3 +++ 1 file changed, 3 insertions(+) --- a/arch/powerpc/net/bpf_jit_comp.c +++ b/arch/powerpc/net/bpf_jit_comp.c @@ -329,6 +329,9 @@ static int bpf_jit_build_body(struct bpf BUILD_BUG_ON(FIELD_SIZEOF(struct sk_buff, len) != 4); PPC_LWZ_OFFS(r_A, r_skb, offsetof(struct sk_buff, len)); break; + case BPF_LDX | BPF_W | BPF_ABS: /* A = *((u32 *)(seccomp_data + K)); */ + PPC_LWZ_OFFS(r_A, r_skb, K); + break; case BPF_LDX | BPF_W | BPF_LEN: /* X = skb->len; */ PPC_LWZ_OFFS(r_X, r_skb, offsetof(struct sk_buff, len)); break;