From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753986AbcAMABU (ORCPT ); Tue, 12 Jan 2016 19:01:20 -0500 Received: from mail-pa0-f43.google.com ([209.85.220.43]:35840 "EHLO mail-pa0-f43.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753202AbcAMABS (ORCPT ); Tue, 12 Jan 2016 19:01:18 -0500 Date: Tue, 12 Jan 2016 16:01:13 -0800 From: Alexei Starovoitov To: Laura Abbott Cc: Catalin Marinas , Will Deacon , Mark Rutland , Kees Cook , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] arm64: Allow vmalloc regions to be set with set_memory_* Message-ID: <20160113000112.GA36310@ast-mbp.thefacebook.com> References: <1452635187-8057-1-git-send-email-labbott@fedoraproject.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1452635187-8057-1-git-send-email-labbott@fedoraproject.org> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 12, 2016 at 01:46:27PM -0800, Laura Abbott wrote: > > The range of set_memory_* is currently restricted to the module address > range because of difficulties in breaking down larger block sizes. > vmalloc maps PAGE_SIZE pages so it is safe to use as well. Update the > function ranges and add a comment explaining why the range is restricted > the way it is. > > Signed-off-by: Laura Abbott > --- > This should let the protections for the eBPF work as expected, I don't > know if there is some sort of self test for thatL. you can test it with: # sysctl net.core.bpf_jit_enable=1 # insmod test_bpf.ko On x64 it shows: test_bpf: Summary: 291 PASSED, 0 FAILED, [282/283 JIT'ed] arm64 may have less JIT'ed tests.