Received: by 10.213.65.68 with SMTP id h4csp2400914imn; Mon, 9 Apr 2018 02:59:33 -0700 (PDT) X-Google-Smtp-Source: AIpwx48BEUnZJmAJNeSM+rFvL/bvTxjc9FCWY0CBVnCa0PdEM7fpAg6cfuRyltDfJQ7wivSiRpxI X-Received: by 10.98.157.7 with SMTP id i7mr28139353pfd.85.1523267973098; Mon, 09 Apr 2018 02:59:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523267973; cv=none; d=google.com; s=arc-20160816; b=rocvtW11VFw4uJ0G3/xepmaNdH1WIFnct4W5GMPNJmEfPMOWxh9tDy3LPEH2nc7qYO y9b3v+FDY4234ExOzzsjxra/4h+qTtZPx6wgSCWBSbrFY+fzT1oeYwkWt686hBrnBt4H w98hNjslblTK/vQ5sYLytgJIHlmsPJDGcHD7wkpNw4DnW021RXmNMGsPvLWuWx/ou1q+ 8thoAWo9YjvdHbaf13+53Isp/dMgU91jf9EzbUOAzWoOBq7nA2Z1pOlEOS6q5ovFowmo cC/PFf0BBSPu3MauNAXu4x9pztne9zpRUNDurCc6WbSmtMmp+NvZZnvIrgO/zu6ZXgYe RymQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=BWGBlpmfPeAG0HRX1waXlMnBFV2dxlLh/NNW0vhjpmo=; b=EEZAqnrQkJYNcdcOMuMnOn9daTFeEUqmJF+oGlNdZ79ON7F+IcMLmGTZk3YZyb6qk0 jAkZ31CTRli/Kh1aYXkRol7TyQziySX4zBg7zPq9PUEDBT5th2bOPfUzuHvwnOpJ684t DC5Rr5Aa5DXc0x0Fbmok9YwJvxJ80UCLaseUdYl/deZ21l/D3MVMxGtb1VO1wkZvPAAA 9VUEq/rplqlefGKMGCm3AH6mcu/yMJPt6ao5lC9Z/ZQ2j4momzLTyqMCOjt/9KDhrq9g Vs6UXKKlH2ZkiIJ+z+hsZztH1Ekf6KUtOxdEM+9kjRU28Y1C/1+uE7LgFWjQ7Wf+jEkE ibbA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u45si10993946pgn.702.2018.04.09.02.58.55; Mon, 09 Apr 2018 02:59:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752309AbeDIJzn (ORCPT + 99 others); Mon, 9 Apr 2018 05:55:43 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:53842 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751464AbeDIJzm (ORCPT ); Mon, 9 Apr 2018 05:55:42 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6F70A1529; Mon, 9 Apr 2018 02:55:42 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5E4963F592; Mon, 9 Apr 2018 02:55:41 -0700 (PDT) Date: Mon, 9 Apr 2018 10:55:34 +0100 From: Mark Rutland To: 20180408150840.GA16019@kroah.com Cc: gregkh@linuxfoundation.org, linux-kernel@vger.kernel.org, will.deacon@arm.com, dan.rue@linaro.org Subject: Re: Linux 4.9.93 Message-ID: <20180409095534.z442itrto2qtc3yc@lakrids.cambridge.arm.com> References: <20180409180534.1768583293d0abe207168c5a@essential.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180409180534.1768583293d0abe207168c5a@essential.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 09, 2018 at 06:05:34PM +0900, Jean-Baptiste Theou wrote: > Hi, Hi, > After this patchset, a kernel built with CFI fails. Disabling > UNMAP_KERNEL_AT_EL0 fix the issue obviously. > > Wondering if there is one of the test suite used on the review > patchset that covers the CFI usecase. IIUC, you're saying that after my v4.9.y meltdown backport, your own backport of an out-of-tree patchset does not function. There's no support for CFI in upsteam (at least as of v4.16), nor in v4.9.93. I have no idea as to how KPTI interacts with an out-of-tree patchset, so could you elaborate on the issue? I've not seen any CFI patches on the linux-arm-kernel mailing list, so it's not clear to me how this interacts with KPTI. Which patches do you have applied that implement CFI? Which compiler are you using? [...] > [ 0.282196] kernel BUG at kernel/cfi.c:32! This file doesn't exit in v4.9.93... > [ 0.282230] CPU: 2 PID: 25 Comm: migration/2 Not tainted 4.9.93-perf+ #39 ... and here I see you have local changes applied. It would be best if you tried to get CFI supported upstream before trying to backport it. That would be best discussed on the linux-arm-kernel mailing list. Thanks, Mark.