diff options
author | Peter Zijlstra <[email protected]> | 2020-04-29 10:24:48 -0500 |
---|---|---|
committer | Jiri Kosina <[email protected]> | 2020-05-08 00:12:43 +0200 |
commit | be2422612a580e33b927d0cde7a5a3c7935b2849 (patch) | |
tree | dd82c3643cd41b9e01e60b4139b644d45dc963b8 /tools/perf/scripts/python/bin/export-to-postgresql-report | |
parent | cb2cceaefb4c4dc28fc27ff1f1b2d258bfc10353 (diff) |
s390/module: Use s390_kernel_write() for late relocations
Because of late module patching, a livepatch module needs to be able to
apply some of its relocations well after it has been loaded. Instead of
playing games with module_{dis,en}able_ro(), use existing text poking
mechanisms to apply relocations after module loading.
So far only x86, s390 and Power have HAVE_LIVEPATCH but only the first
two also have STRICT_MODULE_RWX.
This will allow removal of the last module_disable_ro() usage in
livepatch. The ultimate goal is to completely disallow making
executable mappings writable.
[ jpoimboe: Split up patches. Use mod state to determine whether
memcpy() can be used. Test and add fixes. ]
Cc: [email protected]
Cc: Heiko Carstens <[email protected]>
Cc: Gerald Schaefer <[email protected]>
Cc: Christian Borntraeger <[email protected]>
Suggested-by: Josh Poimboeuf <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Signed-off-by: Josh Poimboeuf <[email protected]>
Acked-by: Peter Zijlstra (Intel) <[email protected]>
Acked-by: Joe Lawrence <[email protected]>
Acked-by: Miroslav Benes <[email protected]>
Acked-by: Gerald Schaefer <[email protected]> # s390
Signed-off-by: Jiri Kosina <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/bin/export-to-postgresql-report')
0 files changed, 0 insertions, 0 deletions