diff options
author | Daniel Borkmann <daniel@iogearbox.net> | 2019-01-03 00:58:29 +0100 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2019-01-02 16:01:24 -0800 |
commit | 9b73bfdd08e73231d6a90ae6db4b46b3fbf56c30 (patch) | |
tree | 4f1d5e9561299532a0aba9a59496d488c27cfcda /kernel/seccomp.c | |
parent | 144cd91c4c2bced6eb8a7e25e590f6618a11e854 (diff) | |
download | blackbird-obmc-linux-9b73bfdd08e73231d6a90ae6db4b46b3fbf56c30.tar.gz blackbird-obmc-linux-9b73bfdd08e73231d6a90ae6db4b46b3fbf56c30.zip |
bpf: enable access to ax register also from verifier rewrite
Right now we are using BPF ax register in JIT for constant blinding as
well as in interpreter as temporary variable. Verifier will not be able
to use it simply because its use will get overridden from the former in
bpf_jit_blind_insn(). However, it can be made to work in that blinding
will be skipped if there is prior use in either source or destination
register on the instruction. Taking constraints of ax into account, the
verifier is then open to use it in rewrites under some constraints. Note,
ax register already has mappings in every eBPF JIT.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'kernel/seccomp.c')
0 files changed, 0 insertions, 0 deletions