From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from hrndva-omtalb.mail.rr.com (hrndva-omtalb.mail.rr.com [71.74.56.122]) by ozlabs.org (Postfix) with ESMTP id 652812C0093 for ; Wed, 5 Sep 2012 00:27:23 +1000 (EST) Message-ID: <1346768840.27919.2.camel@gandalf.local.home> Subject: Re: 3.5+: yaboot, Invalid memory access From: Steven Rostedt To: Michael Ellerman Date: Tue, 04 Sep 2012 10:27:20 -0400 In-Reply-To: <1346741491.7619.12.camel@concordia> References: <1346741491.7619.12.camel@concordia> Content-Type: text/plain; charset="ISO-8859-15" Mime-Version: 1.0 Cc: Christian Kujau , linuxppc-dev@ozlabs.org List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Tue, 2012-09-04 at 16:51 +1000, Michael Ellerman wrote: > My guess would be we're calling that quite early and the __put_user() > check is getting confused and failing. That means we'll have left some > code unpatched, which then fails. > > Can you try with the patch applied, but instead of returning if the > __put_user() fails, just continue on anyway. > > That will isolate if it's something in the __put_user() (I doubt it), or > just that the __put_user() is failing and leaving the code unpatched. As a test case, continuing on error is fine, but I would not recommend that as a fix. If it fails, but still does the patch, that could be harmful, and confusing of a result. Need to figure out why put_user is failing. -- Steve