Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3889447pxv; Mon, 19 Jul 2021 11:12:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx/0FUiwWnv+FuEvl2Ax0enm7duOnWERYHcXa8qKs9KW65WbM+9t39GrFmltynBoKeJ0p8o X-Received: by 2002:a02:8241:: with SMTP id q1mr22830443jag.134.1626718332816; Mon, 19 Jul 2021 11:12:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626718332; cv=none; d=google.com; s=arc-20160816; b=eiaiLxtGTtpNBCOleJojLRhgafgFFUY++x+zWX7Dx+5FUizKoYyvyDYEsuMfWDAtxc q1529+WLJsDE1XuzBb2hdTtB0A0iJd9f7TJ1+DvweG30IlXGiq12SKSaNzs0fTuFX1WS 0Oy7Th6X3dunAwkhpjeztsZ+7pGLsS8l8YLzxVFJwtvKpPyOZCypiEnVBq5E1V6FRvHJ ARbeMJbH5ZrtVOzdULdZ6/pIZ9sbyMcjLEAekTNFiiPpZK7mddXKbCjX2Idq34k/fC+l VK5Ix7tZPc1Vei8n6uGQbgGX8wNF7hIy13cuycFtumNfI5wpXbaAfThyUqN2nGgBNkeg /Czg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=c8u9IHujCOVFcAnilg5TZ7Igg5Z9PZDrOFiosZfNvjE=; b=F+GNV6Nos2hg3trqL/njWV0wB3jZhEf30c2dwDfWRFSscnhNMPzmUL4UD0b4mEAV7Y kXrTTPDA0HgankBb29G8fLunSr+3Kvo3KSBza/zBCLZ3PxnqrIDPv8EEkjfJ3I0v0Sgc ELRP2YOpTw7zZKtmrAL3LJKmStQxVJLeVbk5BJgoDVNAHRHXl41qFTG5czBa6iKimjfT 27TgyZirszctxFLrHwERFz/DhM9TaLWShByiGRoTy4fZnm5LVQYtWE5H3Xl43LUuZFS9 nxT55ckaKjtLrwjGRhuUeU54oBBsRMyWxIcYIGbhyFfrBiy497+7antGTAh/7ZfHwB1E ukTA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="onozmVa/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t15si19736763ilg.47.2021.07.19.11.12.01; Mon, 19 Jul 2021 11:12:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="onozmVa/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1356855AbhGSR2k (ORCPT + 99 others); Mon, 19 Jul 2021 13:28:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:47894 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241312AbhGSPqR (ORCPT ); Mon, 19 Jul 2021 11:46:17 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A92AD61355; Mon, 19 Jul 2021 16:26:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626712004; bh=kf5+CRsypA0+w/C48+bQ+w0/522bxgSGt4b3cn1oU/E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=onozmVa/qCxjKd447M+NLv/L2v0+HDHsWPwV6wc8G3VbgJuj4D7s/i42fVNgpB9zV FXGHdAuAurNLp3Y1YP4RevvbXG8WDuHV7OdEUR/ATYZwAg7aKJek/MNjo0vQMi+0eK MYy9ux6sQLU749gcEU9GkNeq6iMZdYbk+3GHbLZU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Olsa , "Naveen N. Rao" , Michael Ellerman , Sasha Levin Subject: [PATCH 5.12 213/292] powerpc/bpf: Fix detecting BPF atomic instructions Date: Mon, 19 Jul 2021 16:54:35 +0200 Message-Id: <20210719144950.000132515@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144942.514164272@linuxfoundation.org> References: <20210719144942.514164272@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Naveen N. Rao [ Upstream commit 419ac821766cbdb9fd85872bb3f1a589df05c94c ] Commit 91c960b0056672 ("bpf: Rename BPF_XADD and prepare to encode other atomics in .imm") converted BPF_XADD to BPF_ATOMIC and added a way to distinguish instructions based on the immediate field. Existing JIT implementations were updated to check for the immediate field and to reject programs utilizing anything more than BPF_ADD (such as BPF_FETCH) in the immediate field. However, the check added to powerpc64 JIT did not look at the correct BPF instruction. Due to this, such programs would be accepted and incorrectly JIT'ed resulting in soft lockups, as seen with the atomic bounds test. Fix this by looking at the correct immediate value. Fixes: 91c960b0056672 ("bpf: Rename BPF_XADD and prepare to encode other atomics in .imm") Reported-by: Jiri Olsa Signed-off-by: Naveen N. Rao Tested-by: Jiri Olsa Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/4117b430ffaa8cd7af042496f87fd7539e4f17fd.1625145429.git.naveen.n.rao@linux.vnet.ibm.com Signed-off-by: Sasha Levin --- arch/powerpc/net/bpf_jit_comp64.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/powerpc/net/bpf_jit_comp64.c b/arch/powerpc/net/bpf_jit_comp64.c index aaf1a887f653..2657bf542985 100644 --- a/arch/powerpc/net/bpf_jit_comp64.c +++ b/arch/powerpc/net/bpf_jit_comp64.c @@ -686,7 +686,7 @@ emit_clear: * BPF_STX ATOMIC (atomic ops) */ case BPF_STX | BPF_ATOMIC | BPF_W: - if (insn->imm != BPF_ADD) { + if (imm != BPF_ADD) { pr_err_ratelimited( "eBPF filter atomic op code %02x (@%d) unsupported\n", code, i); @@ -708,7 +708,7 @@ emit_clear: PPC_BCC_SHORT(COND_NE, tmp_idx); break; case BPF_STX | BPF_ATOMIC | BPF_DW: - if (insn->imm != BPF_ADD) { + if (imm != BPF_ADD) { pr_err_ratelimited( "eBPF filter atomic op code %02x (@%d) unsupported\n", code, i); -- 2.30.2