[PATCH] bpf, arm64: start flushing icache range from header
davem at davemloft.net
Mon Nov 16 11:42:16 PST 2015
From: Daniel Borkmann <daniel at iogearbox.net>
Date: Sat, 14 Nov 2015 01:16:18 +0100
> While recently going over ARM64's BPF code, I noticed that the icache
> range we're flushing should start at header already and not at ctx.image.
> Reason is that after b569c1c622c5 ("net: bpf: arm64: address randomize
> and write protect JIT code"), we also want to make sure to flush the
> random-sized trap in front of the start of the actual program (analogous
> to x86). No operational differences from user side.
> Signed-off-by: Daniel Borkmann <daniel at iogearbox.net>
> Acked-by: Zi Shen Lim <zlim.lnx at gmail.com>
> Cc: Alexei Starovoitov <ast at kernel.org>
> ( As arm64 jit fixes seem to go via arm64 tree, sending them here. )
I'm applying this directly, please CC: netdev on future patches
to the BPF JIT's regardless of where you think the patch will
be applied as it should be _REVIEWED_ on netdev regardless.
More information about the linux-arm-kernel