This patch implements the seccomp BPF_S_ANC_SECCOMP_LD_W instruction in x86 JIT.
Signed-off-by: Xi Wang <xi.w...@gmail.com> Cc: Daniel Borkmann <dbork...@redhat.com> Cc: Heiko Carstens <heiko.carst...@de.ibm.com> Cc: Will Drewry <w...@chromium.org> Cc: Eric Dumazet <eduma...@google.com> Cc: Russell King <li...@arm.linux.org.uk> Cc: David Laight <david.lai...@aculab.com> Cc: "David S. Miller" <da...@davemloft.net> Cc: Andrew Morton <a...@linux-foundation.org> Cc: Nicolas Schichan <nschic...@freebox.fr> --- arch/x86/net/bpf_jit_comp.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c index 8898680..5f1dafb 100644 --- a/arch/x86/net/bpf_jit_comp.c +++ b/arch/x86/net/bpf_jit_comp.c @@ -683,6 +683,17 @@ cond_branch: f_offset = addrs[i + filter[i].jf] - addrs[i]; } EMIT_COND_JMP(f_op, f_offset); break; +#ifdef CONFIG_SECCOMP_FILTER + case BPF_S_ANC_SECCOMP_LD_W: + func = (u8 *)seccomp_bpf_load; + t_offset = func - (image + addrs[i]); + /* seccomp filters don't use %rdi, %r8, %r9 + * it is safe to not save these registers + */ + EMIT1_off32(0xbf, K); /* mov imm32,%edi */ + EMIT1_off32(0xe8, t_offset); /* call seccomp_bpf_load */ + break; +#endif default: /* hmm, too complex filter, give up with jit compiler */ goto out; -- 1.8.1.2 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/