> > +   /* Make sure we aren't patching a freed init section */
> > +   if (in_init_section(patch_addr) && init_freed())
> > +           return 0;
> > +
> 
> Do we even need the init_freed() check?

Maybe not.  If userspace isn't up, then maybe it's ok to skip.

> What user input can we process in init-only code?

See the stack trace in the commit message. It's a weird case for KVM guests in
KVM PR mode. 

That's the only case I can found so far.

> Also it would be nice to write the function+offset of the skipped patch
> location into the kernel log.

OK. I'll update.

Mikey

Reply via email to