diff options
author | Daniel Borkmann <daniel@iogearbox.net> | 2015-11-14 01:26:53 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-11-16 20:40:49 +0100 |
commit | ebaef649c26b44ff28114b452fd067a270ca7f02 (patch) | |
tree | c709914711a5168ae566eded4ca7faba0ac68210 /arch/arm64/net | |
parent | bpf: samples: exclude asm/sysreg.h for arm64 (diff) | |
download | linux-ebaef649c26b44ff28114b452fd067a270ca7f02.tar.xz linux-ebaef649c26b44ff28114b452fd067a270ca7f02.zip |
bpf, arm: start flushing icache range from header
During review I noticed that the icache range we're flushing should
start at header already and not at ctx.image.
Reason is that after 55309dd3d4cd ("net: bpf: arm: address randomize
and write protect JIT code"), we also want to make sure to flush the
random-sized trap in front of the start of the actual program (analogous
to x86). No operational differences from user side.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Tested-by: Nicolas Schichan <nschichan@freebox.fr>
Cc: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'arch/arm64/net')
0 files changed, 0 insertions, 0 deletions