summaryrefslogtreecommitdiff
path: root/tools/bpf/bpftool/common.c
diff options
context:
space:
mode:
authorArd Biesheuvel <ard.biesheuvel@linaro.org>2018-11-23 20:29:02 +0300
committerDaniel Borkmann <daniel@iogearbox.net>2018-11-30 12:23:25 +0300
commitcc2b8ed1369592fb84609e920f99a5659a6445f7 (patch)
treea795200021283d119ca0cb3a05ee1a6eb91926c4 /tools/bpf/bpftool/common.c
parent93029d7d407fa744a2de358664bd779cda694657 (diff)
downloadlinux-cc2b8ed1369592fb84609e920f99a5659a6445f7.tar.xz
arm64/bpf: use movn/movk/movk sequence to generate kernel addresses
On arm64, all executable code is guaranteed to reside in the vmalloc space (or the module space), and so jump targets will only use 48 bits at most, and the remaining bits are guaranteed to be 0x1. This means we can generate an immediate jump address using a sequence of one MOVN (move wide negated) and two MOVK instructions, where the first one sets the lower 16 bits but also sets all top bits to 0x1. Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Acked-by: Will Deacon <will.deacon@arm.com> Acked-by: Daniel Borkmann <daniel@iogearbox.net> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'tools/bpf/bpftool/common.c')
0 files changed, 0 insertions, 0 deletions