On Wed, 29 Apr 2020, Josh Poimboeuf wrote:

> From: Peter Zijlstra <[email protected]>
> 
> Because of late module patching, a livepatch module needs to be able to
> apply some of its relocations well after it has been loaded.  Instead of
> playing games with module_{dis,en}able_ro(), use existing text poking
> mechanisms to apply relocations after module loading.
> 
> So far only x86, s390 and Power have HAVE_LIVEPATCH but only the first
> two also have STRICT_MODULE_RWX.
> 
> This will allow removal of the last module_disable_ro() usage in
> livepatch.  The ultimate goal is to completely disallow making
> executable mappings writable.
> 
> [ jpoimboe: Split up patches.  Use mod state to determine whether
>           memcpy() can be used.  Test and add fixes. ]
> 
> Cc: [email protected]
> Cc: Heiko Carstens <[email protected]>
> Cc: Gerald Schaefer <[email protected]>
> Cc: Christian Borntraeger <[email protected]>
> Suggested-by: Josh Poimboeuf <[email protected]>
> Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
> Signed-off-by: Josh Poimboeuf <[email protected]>
> Acked-by: Peter Zijlstra (Intel) <[email protected]>
> Acked-by: Joe Lawrence <[email protected]>
> Acked-by: Miroslav Benes <[email protected]>

Could we please get an Ack / Reviewed-by: for this patch from s390 folks?

Thanks,

-- 
Jiri Kosina
SUSE Labs

Reply via email to