linux-stable/arch/powerpc/net
Naveen N. Rao fab07611fb powerpc32/bpf: Fix codegen for bpf-to-bpf calls
Pad instructions emitted for BPF_CALL so that the number of instructions
generated does not change for different function addresses. This is
especially important for calls to other bpf functions, whose address
will only be known during extra pass.

Fixes: 51c66ad849 ("powerpc/bpf: Implement extended BPF on PPC32")
Cc: stable@vger.kernel.org # v5.13+
Signed-off-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/52d8fe51f7620a6f27f377791564d79d75463576.1641468127.git.naveen.n.rao@linux.vnet.ibm.com
2022-01-15 12:21:24 +11:00
..
bpf_jit.h bpf ppc32: Add BPF_PROBE_MEM support for JIT 2021-11-25 11:25:32 +11:00
bpf_jit64.h powerpc/bpf: Emit stf barrier instruction sequences for BPF_NOSPEC 2021-10-07 19:52:58 +11:00
bpf_jit_comp.c bpf ppc32: Add BPF_PROBE_MEM support for JIT 2021-11-25 11:25:32 +11:00
bpf_jit_comp32.c powerpc32/bpf: Fix codegen for bpf-to-bpf calls 2022-01-15 12:21:24 +11:00
bpf_jit_comp64.c powerpc updates for 5.17 2022-01-14 15:17:26 +01:00
Makefile powerpc/bpf: Implement extended BPF on PPC32 2021-04-03 21:22:21 +11:00