From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DCBB1C48BE0 for ; Fri, 11 Jun 2021 14:19:22 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id C027661249 for ; Fri, 11 Jun 2021 14:19:22 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231264AbhFKOVT (ORCPT ); Fri, 11 Jun 2021 10:21:19 -0400 Received: from mail-out.m-online.net ([212.18.0.9]:51050 "EHLO mail-out.m-online.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231584AbhFKOVO (ORCPT ); Fri, 11 Jun 2021 10:21:14 -0400 X-Greylist: delayed 542 seconds by postgrey-1.27 at vger.kernel.org; Fri, 11 Jun 2021 10:21:14 EDT Received: from frontend01.mail.m-online.net (unknown [192.168.8.182]) by mail-out.m-online.net (Postfix) with ESMTP id 4G1jR31TRzz1qt3l; Fri, 11 Jun 2021 16:10:07 +0200 (CEST) Received: from localhost (dynscan1.mnet-online.de [192.168.6.70]) by mail.m-online.net (Postfix) with ESMTP id 4G1jR26D3Sz1r0ws; Fri, 11 Jun 2021 16:10:06 +0200 (CEST) X-Virus-Scanned: amavisd-new at mnet-online.de Received: from mail.mnet-online.de ([192.168.8.182]) by localhost (dynscan1.mail.m-online.net [192.168.6.70]) (amavisd-new, port 10024) with ESMTP id blSMxjRTcGUs; Fri, 11 Jun 2021 16:10:04 +0200 (CEST) X-Auth-Info: dkbXKa2FuB4b08eUrov5kSul9UpeLtIdhCkDN2zB3p004oJgCtYlXEmO7oD1pnrg Received: from igel.home (ppp-46-244-189-84.dynamic.mnet-online.de [46.244.189.84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.mnet-online.de (Postfix) with ESMTPSA; Fri, 11 Jun 2021 16:10:04 +0200 (CEST) Received: by igel.home (Postfix, from userid 1000) id 01ABD2C365F; Fri, 11 Jun 2021 16:10:03 +0200 (CEST) From: Andreas Schwab To: Jisheng Zhang Cc: Paul Walmsley , Palmer Dabbelt , Albert Ou , Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , =?utf-8?B?IEJqw7ZybiBUw7ZwZWw=?= , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Luke Nelson , Xi Wang , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, netdev@vger.kernel.org, bpf@vger.kernel.org Subject: Re: [PATCH 7/9] riscv: bpf: Avoid breaking W^X References: <20210330022144.150edc6e@xhacker> <20210330022521.2a904a8c@xhacker> X-Yow: Look!! Karl Malden! Date: Fri, 11 Jun 2021 16:10:03 +0200 In-Reply-To: <20210330022521.2a904a8c@xhacker> (Jisheng Zhang's message of "Tue, 30 Mar 2021 02:25:21 +0800") Message-ID: <87o8ccqypw.fsf@igel.home> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On Mär 30 2021, Jisheng Zhang wrote: > From: Jisheng Zhang > > We allocate Non-executable pages, then call bpf_jit_binary_lock_ro() > to enable executable permission after mapping them read-only. This is > to prepare for STRICT_MODULE_RWX in following patch. That breaks booting with . Andreas. -- Andreas Schwab, schwab@linux-m68k.org GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510 2552 DF73 E780 A9DA AEC1 "And now for something completely different."