Re: [RFC PATCH 02/12] On Tue, 23 Sep 2008, David Miller wrote:

From: Jiri Kosina
Date: Sat Oct 04 2008 - 06:21:51 EST


On Fri, 3 Oct 2008, Jesse Brandeburg wrote:

> Our experience is different. We are also testing with the "protection
> patch" reverted.
> We see that the problem specifically comes and goes when
> removing/adding the use of set_memory_ro/set_memory_rw to the driver.

But if this patch (which is an obvious workaround, compared to the other
patches which fix real bugs, right?) would be catching some malicious
accessess to the mapped EEPROM, there should be stacktraces present in the
kernel log, right?

Thanks,

--
Jiri Kosina
SUSE Labs
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/