Daniel Borkmann ebaef649c2 bpf, arm: start flushing icache range from header
During review I noticed that the icache range we're flushing should
start at header already and not at ctx.image.

Reason is that after 55309dd3d4cd ("net: bpf: arm: address randomize
and write protect JIT code"), we also want to make sure to flush the
random-sized trap in front of the start of the actual program (analogous
to x86). No operational differences from user side.

Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Tested-by: Nicolas Schichan <nschichan@freebox.fr>
Cc: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-11-16 14:40:49 -05:00
..
2015-11-10 15:06:26 -08:00
2015-11-10 10:05:17 -08:00
2015-11-10 14:56:23 -08:00
2015-11-10 14:48:36 -08:00
2015-11-10 14:48:36 -08:00
2015-11-10 14:48:36 -08:00
2015-10-26 10:18:41 +09:00
2015-11-10 14:48:36 -08:00
2015-11-05 13:15:12 -08:00
2015-11-10 14:48:36 -08:00
2015-11-10 14:56:23 -08:00
2015-10-14 17:10:55 +02:00
2015-11-10 14:48:36 -08:00