Excerpts from Christophe Leroy's message of November 26, 2021 4:34 pm: > > > Le 26/11/2021 à 04:22, Nicholas Piggin a écrit : >> Code patching tests patch the stack and (non-module) vmalloc space now, >> which falls afoul of the new address check. >> >> The stack patching can easily be fixed, but the vmalloc patching is more >> difficult. For now, add an ugly workaround to skip the check while the >> test code is running. > > This really looks hacky. > > To skip the test, you can call do_patch_instruction() instead of calling > patch_instruction().
And make a do_patch_branch function. I thought about it, and thought this is sligtly easier. Thanks, Nick