linux/arch/riscv/net
Jisheng Zhang fc8504765e
riscv: bpf: Avoid breaking W^X
We allocate Non-executable pages, then call bpf_jit_binary_lock_ro()
to enable executable permission after mapping them read-only. This is
to prepare for STRICT_MODULE_RWX in following patch.

Signed-off-by: Jisheng Zhang <jszhang@kernel.org>
Signed-off-by: Palmer Dabbelt <palmerdabbelt@google.com>
2021-04-26 08:25:14 -07:00
..
bpf_jit_comp32.c bpf: Rename BPF_XADD and prepare to encode other atomics in .imm 2021-01-14 18:34:29 -08:00
bpf_jit_comp64.c riscv: bpf: Move bpf_jit_alloc_exec() and bpf_jit_free_exec() to core 2021-04-26 08:25:12 -07:00
bpf_jit_core.c riscv: bpf: Avoid breaking W^X 2021-04-26 08:25:14 -07:00
bpf_jit.h bpf, riscv: Add encodings for compressed instructions 2020-07-21 13:26:25 -07:00
Makefile riscv, bpf: Add RV32G eBPF JIT 2020-03-05 16:13:47 +01:00