On Thu, 7 May 2020 12:00:13 +0200 (CEST)
Jiri Kosina <[email protected]> wrote:

> On Wed, 29 Apr 2020, Josh Poimboeuf wrote:
> 
> > From: Peter Zijlstra <[email protected]>
> > 
> > Because of late module patching, a livepatch module needs to be able to
> > apply some of its relocations well after it has been loaded.  Instead of
> > playing games with module_{dis,en}able_ro(), use existing text poking
> > mechanisms to apply relocations after module loading.
> > 
> > So far only x86, s390 and Power have HAVE_LIVEPATCH but only the first
> > two also have STRICT_MODULE_RWX.
> > 
> > This will allow removal of the last module_disable_ro() usage in
> > livepatch.  The ultimate goal is to completely disallow making
> > executable mappings writable.
> > 
> > [ jpoimboe: Split up patches.  Use mod state to determine whether
> >         memcpy() can be used.  Test and add fixes. ]
> > 
> > Cc: [email protected]
> > Cc: Heiko Carstens <[email protected]>
> > Cc: Gerald Schaefer <[email protected]>
> > Cc: Christian Borntraeger <[email protected]>
> > Suggested-by: Josh Poimboeuf <[email protected]>
> > Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
> > Signed-off-by: Josh Poimboeuf <[email protected]>
> > Acked-by: Peter Zijlstra (Intel) <[email protected]>
> > Acked-by: Joe Lawrence <[email protected]>
> > Acked-by: Miroslav Benes <[email protected]>
> 
> Could we please get an Ack / Reviewed-by: for this patch from s390 folks?
> 
> Thanks,
> 

Looks pretty straightforward, and using s390_kernel_write() is OK, so

Acked-by: Gerald Schaefer <[email protected]> # s390

Reply via email to