On Thu, 7 May 2020 12:00:13 +0200 (CEST) Jiri Kosina <[email protected]> wrote:
> On Wed, 29 Apr 2020, Josh Poimboeuf wrote: > > > From: Peter Zijlstra <[email protected]> > > > > Because of late module patching, a livepatch module needs to be able to > > apply some of its relocations well after it has been loaded. Instead of > > playing games with module_{dis,en}able_ro(), use existing text poking > > mechanisms to apply relocations after module loading. > > > > So far only x86, s390 and Power have HAVE_LIVEPATCH but only the first > > two also have STRICT_MODULE_RWX. > > > > This will allow removal of the last module_disable_ro() usage in > > livepatch. The ultimate goal is to completely disallow making > > executable mappings writable. > > > > [ jpoimboe: Split up patches. Use mod state to determine whether > > memcpy() can be used. Test and add fixes. ] > > > > Cc: [email protected] > > Cc: Heiko Carstens <[email protected]> > > Cc: Gerald Schaefer <[email protected]> > > Cc: Christian Borntraeger <[email protected]> > > Suggested-by: Josh Poimboeuf <[email protected]> > > Signed-off-by: Peter Zijlstra (Intel) <[email protected]> > > Signed-off-by: Josh Poimboeuf <[email protected]> > > Acked-by: Peter Zijlstra (Intel) <[email protected]> > > Acked-by: Joe Lawrence <[email protected]> > > Acked-by: Miroslav Benes <[email protected]> > > Could we please get an Ack / Reviewed-by: for this patch from s390 folks? > > Thanks, > Looks pretty straightforward, and using s390_kernel_write() is OK, so Acked-by: Gerald Schaefer <[email protected]> # s390

