riscv: bpf: Avoid breaking W^X
authorJisheng Zhang <jszhang@kernel.org>
Mon, 29 Mar 2021 18:25:21 +0000 (02:25 +0800)
committerPalmer Dabbelt <palmerdabbelt@google.com>
Mon, 26 Apr 2021 15:25:14 +0000 (08:25 -0700)
commitfc8504765ec5e812135b8ccafca7101069a0c6d8
treea4b9d1f65e9bf35e0d6a2120363f108c7c07aca0
parent1d27d854425faec98f352cf88ec3e2a8844429a4
riscv: bpf: Avoid breaking W^X

We allocate Non-executable pages, then call bpf_jit_binary_lock_ro()
to enable executable permission after mapping them read-only. This is
to prepare for STRICT_MODULE_RWX in following patch.

Signed-off-by: Jisheng Zhang <jszhang@kernel.org>
Signed-off-by: Palmer Dabbelt <palmerdabbelt@google.com>
arch/riscv/net/bpf_jit_core.c