linux-stable/arch/riscv/net
Jisheng Zhang fc8504765e
riscv: bpf: Avoid breaking W^X
We allocate Non-executable pages, then call bpf_jit_binary_lock_ro()
to enable executable permission after mapping them read-only. This is
to prepare for STRICT_MODULE_RWX in following patch.

Signed-off-by: Jisheng Zhang <jszhang@kernel.org>
Signed-off-by: Palmer Dabbelt <palmerdabbelt@google.com>
2021-04-26 08:25:14 -07:00
..
bpf_jit.h
bpf_jit_comp32.c
bpf_jit_comp64.c riscv: bpf: Move bpf_jit_alloc_exec() and bpf_jit_free_exec() to core 2021-04-26 08:25:12 -07:00
bpf_jit_core.c riscv: bpf: Avoid breaking W^X 2021-04-26 08:25:14 -07:00
Makefile