]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/commit
powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access
authorMark Lord <mlord@pobox.com>
Tue, 20 Feb 2018 19:49:20 +0000 (14:49 -0500)
committerKleber Sacilotto de Souza <kleber.souza@canonical.com>
Mon, 27 Aug 2018 14:40:05 +0000 (16:40 +0200)
commitf7ba6d407ec9e2bd20fd1f7749efe07bdafdaeba
tree0fa2471e3c35da548d5c9456cd387b91bb3553e8
parent1d25a7ead21df6d2f173172c78f5014690929d7b
powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access

BugLink: http://bugs.launchpad.net/bugs/1786352
[ Upstream commit 083b20907185b076f21c265b30fe5b5f24c03d8c ]

I am using SECCOMP to filter syscalls on a ppc32 platform, and noticed
that the JIT compiler was failing on the BPF even though the
interpreter was working fine.

The issue was that the compiler was missing one of the instructions
used by SECCOMP, so here is a patch to enable JIT for that
instruction.

Fixes: eb84bab0fb38 ("ppc: Kconfig: Enable BPF JIT on ppc32")
Signed-off-by: Mark Lord <mlord@pobox.com>
Acked-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Signed-off-by: Sasha Levin <alexander.levin@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Khalid Elmously <khalid.elmously@canonical.com>
arch/powerpc/net/bpf_jit_comp.c