Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp3198363imm; Fri, 24 Aug 2018 12:20:42 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZYXpGVjxfdAlthv5WcKZUK21s+HC4W0HeaR7q9nIsRTtI39uJSaoNuTCx80s6wLCzhD0H+ X-Received: by 2002:a17:902:1001:: with SMTP id b1-v6mr2850467pla.155.1535138442735; Fri, 24 Aug 2018 12:20:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535138442; cv=none; d=google.com; s=arc-20160816; b=nzW9Ibb50YLVA+eMd6mhhJeO8UvQszUj4fcHqxAZ3mVSZ9PaljNDOY7fZ+RMh2c50T 9c6l3j1uSmGqKbRaDusvVsTMiH1taow/+jr3I8zBgltSji9AqEHukdnIwVWrI8aBvaZ3 m3QPAGxWynQk0/wn5GSnRygO2ZOol+H/ZEiMgO5tTkslXEAQQpqJTOFupXHKutqURpt6 U+yjiY07zzdDj4gQPxK4Z0POQg92Vwl10PfJH4oO7z9gJTlR3TLr9A/6lxL1ozcLIbCf Eh4iL3lW2d/AUpRDKIHbj3JFBQDvX0iClJnbMZ3cXztKNdFBK4l1KRnPXsJUsYh8zO3s ay2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=xBrGAGNIDVUBTsdODHWLS3NStodzRUWaLR+/QNqidiw=; b=mDJL5ujduOnesuFSqVlGIuijxJ2ZsPR/FtFy3JfD7NFfzsz/goH/KWKmb+UW17+EBV iz7WYYFRZF88EjPrNEpxQ9uLI8iC9HLapQ+Ml+/TLmwF/kVR5BuNekp6qw/7UMgF4E0C IZ0Nlb33h+BNf+/+pJ/SXlRcNjG4xBSTBHH/vk0q6ULHB/fCIFEwmUP7zb60Zz+r6/qL iGQusSLQbbMsOVmj9AIquVUW4bkurE6lACOQeNki3akjK7gjMjDhVRKCHvnhCZlUQBNp GzWA5eseQd0q/6PLxOOQpoAlwVdmJ/S8XmW8RUm7TVP71gPUtOD5Fa84D03zZmcce9Wh jFWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m8-v6si6994354pls.185.2018.08.24.12.20.27; Fri, 24 Aug 2018 12:20:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727402AbeHXWys (ORCPT + 99 others); Fri, 24 Aug 2018 18:54:48 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38066 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726808AbeHXWys (ORCPT ); Fri, 24 Aug 2018 18:54:48 -0400 Received: from localhost (5355525A.cm-6-6b.dynamic.ziggo.nl [83.85.82.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 7BC3FF4F; Fri, 24 Aug 2018 19:18:51 +0000 (UTC) Date: Fri, 24 Aug 2018 21:18:48 +0200 From: Greg KH To: "Matthias B." , Guenter Roeck Cc: stable@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: How to report kernel panic in 4.4.x Message-ID: <20180824191848.GB15489@kroah.com> References: <20180824142408.6340d052@ninja> <20180824125950.GA29673@kroah.com> <20180824154344.1c53a68c@ninja> <20180824141254.GB31555@kroah.com> <20180824163338.4bd9db8f@ninja> <20180824155545.GA6066@kroah.com> <20180824181919.36e6b3c7@ninja> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180824181919.36e6b3c7@ninja> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 24, 2018 at 06:19:19PM +0200, Matthias B. wrote: > Bisect identified the problem. It's the attached patch. I applied it to > 4.4.152 with patch -Rp1 and I'm running the resulting kernel now. > > MSB > > -- > For every idiot-proof system there exists at least one system-proof > idiot. > > >From 02ff2769edbce2261e981effbc3c4b98fae4faf0 Mon Sep 17 00:00:00 2001 > From: Andi Kleen > Date: Tue, 7 Aug 2018 15:09:39 -0700 > Subject: [PATCH] x86/mm/pat: Make set_memory_np() L1TF safe > > commit 958f79b9ee55dfaf00c8106ed1c22a2919e0028b upstream > > set_memory_np() is used to mark kernel mappings not present, but it has > it's own open coded mechanism which does not have the L1TF protection of > inverting the address bits. > > Replace the open coded PTE manipulation with the L1TF protecting low level > PTE routines. > > Passes the CPA self test. > > Signed-off-by: Andi Kleen > Signed-off-by: Thomas Gleixner > [ dwmw2: Pull in pud_mkhuge() from commit a00cc7d9dd, and pfn_pud() ] > Signed-off-by: David Woodhouse > [groeck: port to 4.4] > Signed-off-by: Guenter Roeck > Signed-off-by: Greg Kroah-Hartman > --- > arch/x86/include/asm/pgtable.h | 27 +++++++++++++++++++++++++++ > arch/x86/mm/pageattr.c | 8 ++++---- > 2 files changed, 31 insertions(+), 4 deletions(-) Guenter, another report of this patch causing an issue. Any ideas? I am away from test systems this weekend, but can push out patches if needed. thanks, greg k-h