[PATCH 1/3] powerpc/code-patching: work around code patching verification in patching tests
Christophe Leroy
christophe.leroy at csgroup.eu
Fri Nov 26 21:39:18 AEDT 2021
Le 26/11/2021 à 11:27, Nicholas Piggin a écrit :
> Excerpts from Christophe Leroy's message of November 26, 2021 4:34 pm:
>>
>>
>> Le 26/11/2021 à 04:22, Nicholas Piggin a écrit :
>>> Code patching tests patch the stack and (non-module) vmalloc space now,
>>> which falls afoul of the new address check.
>>>
>>> The stack patching can easily be fixed, but the vmalloc patching is more
>>> difficult. For now, add an ugly workaround to skip the check while the
>>> test code is running.
>>
>> This really looks hacky.
>>
>> To skip the test, you can call do_patch_instruction() instead of calling
>> patch_instruction().
>
> And make a do_patch_branch function. I thought about it, and thought
> this is sligtly easier.
>
Anyway, as reported by Sachin the ftrace code also trips in the new
verification. So I have submitted a patch to revert to the previous
level of verification.
Then we can fix all this properly without going through a temporary hack
and activate the verification again once every caller is fixed.
I was not able to reproduce Sachin's problem on PPC32. Could it be
specific to PPC64 ?
Christophe
More information about the Linuxppc-dev
mailing list