lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 27 Apr 2013 08:27:17 +0200 From: Daniel Borkmann <dborkman@...hat.com> To: Xi Wang <xi.wang@...il.com> CC: netdev@...r.kernel.org, linux-kernel@...r.kernel.org, Heiko Carstens <heiko.carstens@...ibm.com>, Will Drewry <wad@...omium.org>, Eric Dumazet <edumazet@...gle.com>, Russell King <linux@....linux.org.uk>, David Laight <david.laight@...lab.com>, "David S. Miller" <davem@...emloft.net>, Andrew Morton <akpm@...ux-foundation.org>, Nicolas Schichan <nschichan@...ebox.fr> Subject: Re: [PATCH v2 net-next 3/3] ARM: net: bpf_jit_32: support BPF_S_ANC_SECCOMP_LD_W instruction On 04/27/2013 04:17 AM, Xi Wang wrote: > This patch implements the seccomp BPF_S_ANC_SECCOMP_LD_W instruction > in ARM JIT. > > Signed-off-by: Xi Wang <xi.wang@...il.com> > Cc: Daniel Borkmann <dborkman@...hat.com> > Cc: Heiko Carstens <heiko.carstens@...ibm.com> > Cc: Will Drewry <wad@...omium.org> > Cc: Eric Dumazet <edumazet@...gle.com> > Cc: Russell King <linux@....linux.org.uk> > Cc: David Laight <david.laight@...lab.com> > Cc: "David S. Miller" <davem@...emloft.net> > Cc: Andrew Morton <akpm@...ux-foundation.org> > Cc: Nicolas Schichan <nschichan@...ebox.fr> > --- > arch/arm/net/bpf_jit_32.c | 14 ++++++++++++++ > 1 file changed, 14 insertions(+) > > diff --git a/arch/arm/net/bpf_jit_32.c b/arch/arm/net/bpf_jit_32.c > index 073b085..9bfce464 100644 > --- a/arch/arm/net/bpf_jit_32.c > +++ b/arch/arm/net/bpf_jit_32.c > @@ -19,6 +19,7 @@ > #include <linux/if_vlan.h> > #include <asm/cacheflush.h> > #include <asm/hwcap.h> > +#include <asm/syscall.h> > > #include "bpf_jit_32.h" > > @@ -845,6 +846,19 @@ b_epilogue: > off = offsetof(struct sk_buff, queue_mapping); > emit(ARM_LDRH_I(r_A, r_skb, off), ctx); > break; > +#ifdef CONFIG_SECCOMP_FILTER > + case BPF_S_ANC_SECCOMP_LD_W: > + if (k == offsetof(struct seccomp_data, arch)) { > + emit_mov_i(r_A, AUDIT_ARCH_ARM, ctx); > + break; > + } Not an expert in ARM, but ... Arent't you doing here a similar thing in terms of getting arch as Eric criticized (Nicolas' implementation does not use that part btw.)? Also, even if it would be possible here, now your 2 JIT implementations differ in behaviour. I think this is unintended. Besides all that, I think I also pointed you to a patch that already made it in for ARM, not sure why you keep posting the ARM JIT implementation? > + ctx->seen |= SEEN_CALL; > + emit_mov_i(ARM_R3, (u32)seccomp_bpf_load, ctx); > + emit_mov_i(ARM_R0, k, ctx); > + emit_blx_r(ARM_R3, ctx); > + emit(ARM_MOV_R(r_A, ARM_R0), ctx); > + break; > +#endif > default: > return -1; > } > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists