diff options
| author | Alexei Starovoitov <[email protected]> | 2022-09-27 03:40:44 +0000 |
|---|---|---|
| committer | Alexei Starovoitov <[email protected]> | 2022-09-27 03:40:44 +0000 |
| commit | 9666a702657e25e33f03dd326341e0d79b974662 (patch) | |
| tree | 0967cb40ef2d0af8f6beab452a0ed72cb0640c52 /tools/testing/selftests/bpf/prog_tests/sockmap_basic.c | |
| parent | Merge branch 'bpf: Fixes for CONFIG_X86_KERNEL_IBT' (diff) | |
| parent | bpf: Enforce W^X for bpf trampoline (diff) | |
| download | kernel-9666a702657e25e33f03dd326341e0d79b974662.tar.gz kernel-9666a702657e25e33f03dd326341e0d79b974662.zip | |
Merge branch 'enforce W^X for trampoline and dispatcher'
Song Liu says:
====================
Changes v1 => v2:
1. Update arch_prepare_bpf_dispatcher to use a RO image and a RW buffer.
(Alexei) Note: I haven't found an existing test to cover this part, so
this part was tested manually (comparing the generated dispatcher is
the same).
Jeff Layton reported CPA W^X warning linux-next [1]. It turns out to be
W^X issue with bpf trampoline and bpf dispatcher. Fix these by:
1. Use bpf_prog_pack for bpf_dispatcher;
2. Set memory permission properly with bpf trampoline.
[1] https://lore.kernel.org/lkml/[email protected]/
====================
Signed-off-by: Alexei Starovoitov <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/sockmap_basic.c')
0 files changed, 0 insertions, 0 deletions
