Message ID | e6f362b3-2339-c5cb-362b-743271dbe826@suse.com (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | x86: memcpy() / memset() (non-)ERMS flavors plus fallout | expand |
On 27/04/2021 13:53, Jan Beulich wrote: > Unlike Linux, Xen has never (so far) used alternatives patching for > memcpy() or memset(), even less such utilizing multiple alternatives. > Correct the Linux-inherited comment to match reality. > > Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
--- a/xen/arch/x86/alternative.c +++ b/xen/arch/x86/alternative.c @@ -194,8 +194,7 @@ static void init_or_livepatch _apply_alt /* * The scan order should be from start to end. A later scanned * alternative code can overwrite a previous scanned alternative code. - * Some kernel functions (e.g. memcpy, memset, etc) use this order to - * patch code. + * Some code (e.g. ALTERNATIVE_2()) relies on this order of patching. * * So be careful if you want to change the scan order to any other * order.
Unlike Linux, Xen has never (so far) used alternatives patching for memcpy() or memset(), even less such utilizing multiple alternatives. Correct the Linux-inherited comment to match reality. Signed-off-by: Jan Beulich <jbeulich@suse.com>