Received: by 10.192.165.148 with SMTP id m20csp4375359imm; Tue, 8 May 2018 07:31:15 -0700 (PDT) X-Google-Smtp-Source: AB8JxZp4EVU0qkm26NgFI7J/z8JtsdBiny7XqXzXl6L1BAuRmMuu/ZgJK/aoXGZxlyMzknmLIAUH X-Received: by 2002:a63:69c4:: with SMTP id e187-v6mr32987962pgc.415.1525789875449; Tue, 08 May 2018 07:31:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525789875; cv=none; d=google.com; s=arc-20160816; b=TyJwgH8HmMeJxHukUrx8dMUKsx9K6JqAzekOFyxCBdLTqI4jYQjePOyqkHNLI17ujZ 9Zc6yG1u1J9CWqUx9Grbgxg6dI6QrS00P3nSW30ZRsCSmWVdOpTBABe7sDDqwYVa2wjQ JfMq7+FsSP3yzblOaGXQ4LxTyBkM062QYxYvqrkmDeN35Z0BeLQ1B/rET++Lzd38xwJw bzS3ERNsVbkhbgTzZUL26eVpw2hZkXb/rzlTBAWdb+gGG978nzS0yn72rAgfU25HJCY4 QgPicWCAhWun081wVDcS5+v/3/CW5wsE8lZBESlol69moqq0YD+1iA0f2Qe5RMaoeZr/ cBgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:cc:references:to:subject :arc-authentication-results; bh=sqwaOn90JSyrZWr63Yj3GcGt8xIXsjk3irt2VGzwq50=; b=Ll7tlsVc2BbDtqYkNH93TDQcGraha271cFT09bouYZivLvRbl9SwewDYCbo1Bmso5O uC2+6FkjzHLn/8/UFFKA+xx38XihSHKmVUP9See18VwLz7s1JR1UpiuSOlBt8wqvbrDV 4+OpSyv/i9uRdZpvZjty+MJ2Nk5q6RDZ7i//P+jMjbLaRMW8uNoCGViXURhtn1DMtMpF HB69qjltCpQhVx1CbTZU2qCh8aZlAr+QtsDwsRovCJ6rmn05c3Gz5izXE7KwngjfgtFO yELXUweM4oZNkucdZZnKuEQ9OkDgbobOT31HSPoC3nt4yLKOIFQpefwqhmD1CnTHoMkF CPYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u3-v6si24975277plb.593.2018.05.08.07.31.00; Tue, 08 May 2018 07:31:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932411AbeEHOau (ORCPT + 99 others); Tue, 8 May 2018 10:30:50 -0400 Received: from mga07.intel.com ([134.134.136.100]:34572 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932334AbeEHOat (ORCPT ); Tue, 8 May 2018 10:30:49 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 May 2018 07:30:48 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,378,1520924400"; d="scan'208";a="47654572" Received: from achand8-mobl1.amr.corp.intel.com (HELO [10.252.142.242]) ([10.252.142.242]) by FMSMGA003.fm.intel.com with ESMTP; 08 May 2018 07:30:48 -0700 Subject: Re: [PATCH] x86/boot/64/clang: Use fixup_pointer() to access '__supported_pte_mask' To: Alexander Potapenko , mingo@kernel.org, kirill.shutemov@linux.intel.com References: <20180508121638.174022-1-glider@google.com> Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, mka@chromium.org, dvyukov@google.com, md@google.com From: Dave Hansen Openpgp: preference=signencrypt Message-ID: <1f69bdb6-df5e-d709-064a-4f6fdd6e11a7@linux.intel.com> Date: Tue, 8 May 2018 07:30:48 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20180508121638.174022-1-glider@google.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/08/2018 05:16 AM, Alexander Potapenko wrote: > Similarly to commit 187e91fe5e91 > ("x86/boot/64/clang: Use fixup_pointer() to access 'next_early_pgt'"), > '__supported_pte_mask' must be also accessed using fixup_pointer() to > avoid position-dependent relocations. > > Signed-off-by: Alexander Potapenko > Fixes: fb43d6cb91ef ("x86/mm: Do not auto-massage page protections") In the interests of standalone changelogs, I'd really appreciate an actual explanation of what's going on here. Your patch makes the code uglier and doesn't fix anything functional from what I can see. The other commit has some explanation, so it seems like the rules for accessing globals in head64.c are different than other files because... something. The functional problem here is that it causes insta-reboots? Do we have anything we can do to keep us from recreating these kinds of regressions all the time?