Home
last modified time | relevance | path

Searched hist:cc2b8ed1369592fb84609e920f99a5659a6445f7 (Results 1 – 1 of 1) sorted by relevance

/linux/arch/arm64/net/
H A Dbpf_jit_comp.cdiff cc2b8ed1369592fb84609e920f99a5659a6445f7 Fri Nov 23 18:29:02 CET 2018 Ard Biesheuvel <ard.biesheuvel@linaro.org> arm64/bpf: use movn/movk/movk sequence to generate kernel addresses

On arm64, all executable code is guaranteed to reside in the vmalloc
space (or the module space), and so jump targets will only use 48
bits at most, and the remaining bits are guaranteed to be 0x1.

This means we can generate an immediate jump address using a sequence
of one MOVN (move wide negated) and two MOVK instructions, where the
first one sets the lower 16 bits but also sets all top bits to 0x1.

Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Acked-by: Will Deacon <will.deacon@arm.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>