Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2468259imm; Mon, 28 May 2018 08:38:55 -0700 (PDT) X-Google-Smtp-Source: AB8JxZo8lnXdMnOMmJXBe62geApOAAZkTQIvmZGts50drucnj3MKLajCNKJqEg6mkFijJeMKtDP2 X-Received: by 2002:a62:db05:: with SMTP id f5-v6mr13980119pfg.137.1527521935121; Mon, 28 May 2018 08:38:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527521935; cv=none; d=google.com; s=arc-20160816; b=xWuDmHDtE5GE8Xd/a9fNaLsho1cDLMh8hVk2/adeF7Kc7XPXGnTT8QVqEjviJDlMP8 m20gX2FRG87mr9cOdIecQZTtffCugUzayTlpjjhi/R9AkAFyopR8h3DjpMOCy5rIuWev BY+Vhv51JiA2bUwQcyHkhxEqES8Rc0k6gm8g4In6zYo3pOaJqT3tbxWz6imc6iD7eWHG Sid0icWY8Lpd2id6t1mJTDdsECcKF2WFjhrMThxZi/Qzfmpfn/FNChMpkz028hga6FOV rn3XS3V97/UTs7tmPIAC0f2CyDl5nVlixt8FDR22vgKXcesey1A+DCDzlqM0zMcrwxFq HUnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=4/ijmr1xIsEigOk27LMN3TLgclLyEtvwhc1EZdOGz4s=; b=W99LwGhOYk4lb1SvlAeoRzVWA4ufw4ipRT+6jtPYgGGLzPegt0qkQeWSCHIrcGq6CW PqGYmOsZ3VWVSm499ak+wDPvHyIek8g6uD6b0BgT7xF3IVA6exkjM+/hLI2jdTagEa9q lDu2f4PSdnvvtCtqO4z87r4Z/OtRqFS/+dJa7Juo1WGX3UvVDOgnIOPF+DlBBo0GuJQ7 FXGl/UutLifeFf9We/jbq68R3jPkxgwGYGeF/Ke9ZRt9HPFS5vqx5m9irK1e+kZ8SHLc eh9JiNejRHEYB6xOsACE7ADomVN8J1bsQUMyQexcfbFUMHmkcuKETewB0Hr4gYU+Dg/C cMMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TH/gFKsq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n7-v6si7614646pgu.362.2018.05.28.08.38.39; Mon, 28 May 2018 08:38:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TH/gFKsq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1034649AbeE1Ph7 (ORCPT + 99 others); Mon, 28 May 2018 11:37:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:38418 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S968594AbeE1KSU (ORCPT ); Mon, 28 May 2018 06:18:20 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A0E3920843; Mon, 28 May 2018 10:18:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527502700; bh=53EyiYueIznw+JqSgmO//X7Lzu9xOaXw2JUjnbq5hYU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TH/gFKsqGlmUvqQDIu+p1+jUZZ0srOPPPjMn75Y9Rr76JJl/zcMxZO3lgK4qFx7qw lw6jl5o2ZN2zFgMIoEorKm5c+FYJImjZ+I/D9D35xxZczGQVAyifBzZtJb0Cu7kHE5 rxz8JxHtbVs0roNQLEyGxzZOU2gw45G+Z74he7C0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mark Lord , "Naveen N. Rao" , Michael Ellerman , Sasha Levin Subject: [PATCH 4.4 097/268] powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access Date: Mon, 28 May 2018 12:01:11 +0200 Message-Id: <20180528100213.252430510@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100202.045206534@linuxfoundation.org> References: <20180528100202.045206534@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Mark Lord [ Upstream commit 083b20907185b076f21c265b30fe5b5f24c03d8c ] I am using SECCOMP to filter syscalls on a ppc32 platform, and noticed that the JIT compiler was failing on the BPF even though the interpreter was working fine. The issue was that the compiler was missing one of the instructions used by SECCOMP, so here is a patch to enable JIT for that instruction. Fixes: eb84bab0fb38 ("ppc: Kconfig: Enable BPF JIT on ppc32") Signed-off-by: Mark Lord Acked-by: Naveen N. Rao Signed-off-by: Michael Ellerman Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/net/bpf_jit_comp.c | 3 +++ 1 file changed, 3 insertions(+) --- a/arch/powerpc/net/bpf_jit_comp.c +++ b/arch/powerpc/net/bpf_jit_comp.c @@ -329,6 +329,9 @@ static int bpf_jit_build_body(struct bpf BUILD_BUG_ON(FIELD_SIZEOF(struct sk_buff, len) != 4); PPC_LWZ_OFFS(r_A, r_skb, offsetof(struct sk_buff, len)); break; + case BPF_LDX | BPF_W | BPF_ABS: /* A = *((u32 *)(seccomp_data + K)); */ + PPC_LWZ_OFFS(r_A, r_skb, K); + break; case BPF_LDX | BPF_W | BPF_LEN: /* X = skb->len; */ PPC_LWZ_OFFS(r_X, r_skb, offsetof(struct sk_buff, len)); break;