From patchwork Sat Nov 10 18:58:29 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?b?TWljaGHFgiBNaXJvc8WCYXc=?= X-Patchwork-Id: 995950 Return-Path: X-Original-To: patchwork-incoming-netdev@ozlabs.org Delivered-To: patchwork-incoming-netdev@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=rere.qmqm.pl Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=rere.qmqm.pl header.i=@rere.qmqm.pl header.b="HIgT0xWf"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 42smWf6rrPz9sC7 for ; Sun, 11 Nov 2018 05:58:38 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727214AbeKKEog (ORCPT ); Sat, 10 Nov 2018 23:44:36 -0500 Received: from rere.qmqm.pl ([91.227.64.183]:13190 "EHLO rere.qmqm.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726422AbeKKEof (ORCPT ); Sat, 10 Nov 2018 23:44:35 -0500 Received: from remote.user (localhost [127.0.0.1]) by rere.qmqm.pl (Postfix) with ESMTPSA id 42smVL4zmZzBr; Sat, 10 Nov 2018 19:57:30 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=rere.qmqm.pl; s=1; t=1541876254; bh=7rQkWEZsCQfjIv+pT7sNkq69mXmlLknPPBmoeqeMNi8=; h=Date:From:Subject:To:Cc:From; b=HIgT0xWfizkbiexBP4DXIBLNK148Db5gKTPEWPO/lsxJwGcW2gWGtFL1lNrTND4H5 AOhAsaORwRobZUIR1Wewwnic+33WGgRrTFJE6hYkQM6jSX4QsmGUijNMS6QUXlWadY lA7PKdx/OSO3QF46SY0wpc5Yn2c+2VhFxpTTSbXRnelkOatdS2mHmJ3D+q0vChZ1Ao alpXJLL/CZvrOJVuloP8PM7gdksO9LxK67kL6WNQvUBTXOKx1fCBh25N6wWppjr2YA sheg90lDfF5Vt9dZ5N/vxE96YE8P6YoQycZN9vTUpxTSfgNmBI0OkfLc6v05WMyA7s 3SGFtgiZrbgOg== X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.100.2 at mail Date: Sat, 10 Nov 2018 19:58:29 +0100 Message-Id: From: =?utf-8?b?TWljaGHFgiBNaXJvc8WCYXc=?= Subject: [PATCH net-next 0/6] Remove VLAN.CFI overload MIME-Version: 1.0 To: netdev@vger.kernel.org Cc: Alexei Starovoitov , Benjamin Herrenschmidt , Daniel Borkmann , "David S. Miller" , James Hogan , linux-mips@linux-mips.org, linuxppc-dev@lists.ozlabs.org, Michael Ellerman , Paul Burton , Paul Mackerras , Ralf Baechle , sparclinux@vger.kernel.org Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Fix BPF code/JITs to allow for separate VLAN_PRESENT flag storage and finally move the flag to separate storage in skbuff. This is final step to make CLAN.CFI transparent to core Linux networking stack. An #ifdef is introduced temporarily to mark fragments masking VLAN_TAG_PRESENT. This is removed altogether in the final patch. --- Michał Mirosław (6): net/skbuff: add macros for VLAN_PRESENT bit net/bpf: split VLAN_PRESENT bit handling from VLAN_TCI net/bpf_jit: MIPS: split VLAN_PRESENT bit handling from VLAN_TCI net/bpf_jit: PPC: split VLAN_PRESENT bit handling from VLAN_TCI net/bpf_jit: SPARC: split VLAN_PRESENT bit handling from VLAN_TCI net: remove VLAN_TAG_PRESENT arch/mips/net/bpf_jit.c | 18 ++++++++--------- arch/powerpc/net/bpf_jit_comp.c | 15 +++++++------- arch/sparc/net/bpf_jit_comp_32.c | 13 ++++++------ include/linux/if_vlan.h | 11 ++++++----- include/linux/skbuff.h | 10 +++++++++- lib/test_bpf.c | 14 +++++++------ net/core/filter.c | 34 ++++++++++++++------------------ 7 files changed, 60 insertions(+), 55 deletions(-)