Received: by 10.223.176.46 with SMTP id f43csp1152506wra; Sat, 20 Jan 2018 12:02:18 -0800 (PST) X-Google-Smtp-Source: AH8x2252squoyz60B3oYZ9G6hHuGFTjIp9LtoHm5uhg06BGVKi8BsVpiajEePpLOlUMOx8xGcbyc X-Received: by 2002:a17:902:9686:: with SMTP id n6-v6mr1272497plp.333.1516478538595; Sat, 20 Jan 2018 12:02:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516478538; cv=none; d=google.com; s=arc-20160816; b=KTEaNKE/GyquPg1UlHV/9LvbMZQ+oGtRdLAdlL/VL/IQbtHlYPb67e8enB6PGi4Wz2 OuhOfpP1exH1onwGAORQqwSB2+BXtOvHph3AqozGLxbxlyRlyTX89943uiCv+txPm0SK gt5f/9kOYIhDlkw9bLWQNbtjzjqn9n2hN4jxJEFyR54tKV0TxaXmnBWD/+OQwhNlLV8K 6qSe2AW1WG77d4xAStf3lVNQTh1wcdC9LMAPoKOsfGuc5ov5gTsy96bNBrdZLTrXXWil p2JsQduPURZV+9Tag962gHEotJvJR4O5pe7+QY2CFbvQFyuYmYGsrep08lC3ub5+gP36 sRFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=MW+14YY0m6gxk0rL+2VTbTfDDi5/bRLQ7dRzCMgTlB4=; b=eA9aeGkcHZuhpnu+TIYFeQRWAoDkHpMJe+C53Kciy2HKYFqOuUpO9SD+JrpFMqNyl+ NB08Yb8gt9mAbHwN2HTo3WErj5IKtET1HcKIOyagkvGu0nNrlR1JWoH7tzAJLNZQT1kw +1neGzdyc0KR5ag8EsGpiDlMKQqrh106Rw6qyK6ScyU+q+DL0oT1YGkfi+OMSH9DmTGS +MdsYJQKkAHp7U64tIyKiGYZz4jUYDkYyWTnHcufoGgToMgn1JYrdQXRBWkJ+KiMumyV BbxR2uBjBQw60afY1x/J/z2V2nMB7RqwYtGnxH0xYuty9Xl0RDt9RAoFzMSluLchJx3G N9Sg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m12-v6si1939114pls.389.2018.01.20.12.02.03; Sat, 20 Jan 2018 12:02:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756617AbeATUAF (ORCPT + 99 others); Sat, 20 Jan 2018 15:00:05 -0500 Received: from Galois.linutronix.de ([146.0.238.70]:53139 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756447AbeATUAA (ORCPT ); Sat, 20 Jan 2018 15:00:00 -0500 Received: from p4fea5f09.dip0.t-ipconnect.de ([79.234.95.9] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1eczGP-0007lc-BK; Sat, 20 Jan 2018 20:57:17 +0100 Date: Sat, 20 Jan 2018 20:59:50 +0100 (CET) From: Thomas Gleixner To: Andrew Morton cc: LKML , x86@kernel.org, Linus Torvalds , Andy Lutomirsky , Peter Zijlstra , Dave Hansen , Borislav Petkov , Greg KH , keescook@google.com, hughd@google.com, Brian Gerst , Josh Poimboeuf , Denys Vlasenko , Rik van Riel , Boris Ostrovsky , Juergen Gross , David Laight , Eduardo Valentin , aliguori@amazon.com, Will Deacon , daniel.gruss@iaik.tugraz.at, neil.berrington@datacore.com Subject: Re: [patch 00/60] x86/kpti: Kernel Page Table Isolation (was KAISER) In-Reply-To: <20180119125637.5eb77e6fa1a0462df4931964@linux-foundation.org> Message-ID: References: <20171204140706.296109558@linutronix.de> <20180119125637.5eb77e6fa1a0462df4931964@linux-foundation.org> User-Agent: Alpine 2.20 (DEB 67 2015-01-07) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 19 Jan 2018, Andrew Morton wrote: > Should KPTI have a MAINTAINERS entry? I don't think so. It's all x86 core code which has a maintainer entry. > Neil Berrington (cc'ed) is reporting "Double fault in load_new_mm_cr3 with KPTI > enabled" at https://bugzilla.kernel.org/show_bug.cgi?id=198517 Neil, the screenshot shows that this is on a ubuntu 4.13 something kernel. Can you reproduce on 4.14.14 or on Linus latest ? Thanks, tglx