Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp900890ybe; Wed, 4 Sep 2019 09:21:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqzVqyo3fLRNJkFjyqX4+TVWHBMQ8VtqjrHXXsM/wIdL5xqAxT6O7uBRTBPAG7MLRunsmCLT X-Received: by 2002:aa7:8436:: with SMTP id q22mr19454648pfn.74.1567614115771; Wed, 04 Sep 2019 09:21:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567614115; cv=none; d=google.com; s=arc-20160816; b=yK+fwOWytw4X+SWSSGKdsXIAKwUWtFZIMNfjil2lT6wyPNtM/wp3OrxgjABrXuzd95 GG+2wlgvpaKFatiCbZzvewSA2q65U4co7iqk/+kvPniLr/Py4eLB2Rnfs7jyDPcZzaG+ ifSghQ5TglVYLHIw98tDqdfYdxHgmr1J7wosMpwtSc+m1NGeBdYDYSdp/E0RNLRSRbXP A9GCyedvlBsb2Sfn8ML8jmX2kr5QcXo+g/Tv/w83jBV4ZVaXGXKPO7GiZBql1PwSNE86 dNPeqfzwhQgDSbXo9eQ9YUhxGRsU18ZEtLZ89a4jvkPiLxN3jVGo7oFX/IF7pP1XfTbc N3Iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=I234VinqYmF2zsTig030OiEKgJFLgBEuiYgoVa5ksY0=; b=HmH54UW2s32/Gvq8yuWY0R6A79cP/5eCZaQcGfqGzDXyCXPec4FbDBjf+RQ4y9X1qQ Av3ePdUueAdgqSBpIN1XLxWvmdYP3npZYfQ+ZrUD60K+cMXkiZXijotBwM3Bt3SYMCRd UA/YqKe/rcqVS9NHqkimA4mPSk/p7JffkZch4erUiPJyPTbBg98oxbQD5IljOFj0swdm mO4xVmn+p3JIZj124R8XdfBQOTvZEkx7zXm8iGDCtjov5g+afn+d83bt/R+CGl7nIvr9 8Mz5x7khv6ZZ2TaIC1c1yWc14Ckc6zvf5mdHbbG5emV5cZc469Xs1CyxAhXOXBC2df9C lHYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="qGvMmWJ/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u7si17555115plz.363.2019.09.04.09.21.40; Wed, 04 Sep 2019 09:21:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="qGvMmWJ/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731814AbfIDP6N (ORCPT + 99 others); Wed, 4 Sep 2019 11:58:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:60076 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731780AbfIDP6K (ORCPT ); Wed, 4 Sep 2019 11:58:10 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5AAE422CF5; Wed, 4 Sep 2019 15:58:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1567612689; bh=ZUPeU7rXEE9Ft3yii0aStiNyiPcuIWemP1F9qsfU3JI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qGvMmWJ/t9Gxtw8X7al5rHm4TV4DwxnaiHyVWbF0aUiTqgUc7axzKDYXJQAzKjrNQ S5sr0Aqq3CclxbRvVw8e+jrfPdF1DWIFFR3QYXyOYG6ZOQOzKP5L7JIrdryhHvo3Ml eh5cQv4TVosfUBdzG2Mus+5nwJp/lzd9lKqUzXMc= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Ilya Leoshkevich , Daniel Borkmann , Sasha Levin , linux-kselftest@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: [PATCH AUTOSEL 5.2 19/94] selftests/bpf: fix "bind{4, 6} deny specific IP & port" on s390 Date: Wed, 4 Sep 2019 11:56:24 -0400 Message-Id: <20190904155739.2816-19-sashal@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190904155739.2816-1-sashal@kernel.org> References: <20190904155739.2816-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ilya Leoshkevich [ Upstream commit 27df5c7068bf23cab282dc64b1c9894429b3b8a0 ] "bind4 allow specific IP & port" and "bind6 deny specific IP & port" fail on s390 because of endianness issue: the 4 IP address bytes are loaded as a word and compared with a constant, but the value of this constant should be different on big- and little- endian machines, which is not the case right now. Use __bpf_constant_ntohl to generate proper value based on machine endianness. Fixes: 1d436885b23b ("selftests/bpf: Selftest for sys_bind post-hooks.") Signed-off-by: Ilya Leoshkevich Signed-off-by: Daniel Borkmann Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/test_sock.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/bpf/test_sock.c b/tools/testing/selftests/bpf/test_sock.c index fb679ac3d4b07..0e66527334623 100644 --- a/tools/testing/selftests/bpf/test_sock.c +++ b/tools/testing/selftests/bpf/test_sock.c @@ -13,6 +13,7 @@ #include #include "cgroup_helpers.h" +#include "bpf_endian.h" #include "bpf_rlimit.h" #include "bpf_util.h" @@ -232,7 +233,8 @@ static struct sock_test tests[] = { /* if (ip == expected && port == expected) */ BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, offsetof(struct bpf_sock, src_ip6[3])), - BPF_JMP_IMM(BPF_JNE, BPF_REG_7, 0x01000000, 4), + BPF_JMP_IMM(BPF_JNE, BPF_REG_7, + __bpf_constant_ntohl(0x00000001), 4), BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, offsetof(struct bpf_sock, src_port)), BPF_JMP_IMM(BPF_JNE, BPF_REG_7, 0x2001, 2), @@ -261,7 +263,8 @@ static struct sock_test tests[] = { /* if (ip == expected && port == expected) */ BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, offsetof(struct bpf_sock, src_ip4)), - BPF_JMP_IMM(BPF_JNE, BPF_REG_7, 0x0100007F, 4), + BPF_JMP_IMM(BPF_JNE, BPF_REG_7, + __bpf_constant_ntohl(0x7F000001), 4), BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_6, offsetof(struct bpf_sock, src_port)), BPF_JMP_IMM(BPF_JNE, BPF_REG_7, 0x1002, 2), -- 2.20.1