Mathieu Desnoyers wrote: > Hi Rusty, > > Good catch. I also still wonder why alternative (except alternative smp, > which is ok) and paravirt patching functions are not marked __init. I really > hope they are never used when NMI, MCE are enabled or when threads may > have been preempted in the site being patched, or it could result in an > illegal instruction. > We need to patch modules at load time. Presumably an NMI/MCE handler will not depend on code in a being-loaded module. J - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
- Follow-Ups:
- Re: [PATCH] [2/11] x86: Fix alternatives and kprobes to remap write-protected kernel text
- From: Mathieu Desnoyers <[email protected]>
- Re: [PATCH] [2/11] x86: Fix alternatives and kprobes to remap write-protected kernel text
- References:
- [PATCH] [0/11] Some more x86 patches for review
- From: Andi Kleen <[email protected]>
- [PATCH] [2/11] x86: Fix alternatives and kprobes to remap write-protected kernel text
- From: Andi Kleen <[email protected]>
- Re: [PATCH] [2/11] x86: Fix alternatives and kprobes to remap write-protected kernel text
- From: Rusty Russell <[email protected]>
- Re: [PATCH] [2/11] x86: Fix alternatives and kprobes to remap write-protected kernel text
- From: Mathieu Desnoyers <[email protected]>
- [PATCH] [0/11] Some more x86 patches for review
- Prev by Date: Re: [PATCH]: allow individual core dump methods to be unlimited when sending to a pipe
- Next by Date: Re: [PATCH 0/2] Kexec jump: The first step to kexec base hibernation
- Previous by thread: Re: [PATCH] [2/11] x86: Fix alternatives and kprobes to remap write-protected kernel text
- Next by thread: Re: [PATCH] [2/11] x86: Fix alternatives and kprobes to remap write-protected kernel text
- Index(es):