Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp8928084ybi; Wed, 10 Jul 2019 01:48:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqwRcXlJ5k3Xqui1MqaGLYgc2q8FS4ZvoYpG+kQVXZHbCchkxHzKnJ1Hpiw86OAI0IDzs/lE X-Received: by 2002:a63:455c:: with SMTP id u28mr36870025pgk.416.1562748495507; Wed, 10 Jul 2019 01:48:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562748495; cv=none; d=google.com; s=arc-20160816; b=cbz8dD32I3AMHn2m91QAcTrDcZrf/MM1HKxF/2GutCiEGfao2fCjsGJXtroPEneSzW 1m2eDdp7eMqR86veP/5BkzilJ/n8tmhVqkT69Enjt5KGHOaSJN6no6mqKXIwyIqcPouY MjzXV4fod9zudhtgzkOvkD83AQ69GE9/cDki4gOEzcyJ9CxQOq085C/sV7WpQ/F0HnlS FBoSL7lWg9Ea1tfPqL9g+c2QINEPK6c7cDHtHYzMzVDSJcoMP9jRj15cWhgZIqOlH2JF 56ruU+SN91k/nXELdbjox48/EbIxwGOYfuwDP3BWZyCcVfftFZQTmjww/4mU0gc8eLUd uHoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=OYXmFHlQ0T/vyF/DpNDD43PZf/W+LxhvdLIWC+7fEi8=; b=t/9pbf3QsEkZm6WcF6g0Zty1+DTKPrmH1Lm6HqMv7besGbqgrX/w64eu4eJnaaS3Lk u6h9y6A0bx8FiCOePKN9hf/i4yOY8/nomhDMIyhqX7jTinvZOlNKufhPJqNygzQi/gZQ v4GyKCjyDvU4x8setDbMoACQsiZePZHGzKd37eK/VIuPa9SDudgRVsCodzCD9rzcqUDK je+nZTPNKFOMwmeeNLAZvAG+B6H9r4akSuO+Ht+eqKD/Z1JXsyFaKmo1k4aOarij1A3S 7SgjjFBP1D73LLh9LpYDJT2bGPw6CLQCtWqWkYImLW0s56/V9LOTu90w9ea5tfToC85k 95zg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u9si1617955pgb.148.2019.07.10.01.48.00; Wed, 10 Jul 2019 01:48:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727581AbfGJIq7 (ORCPT + 99 others); Wed, 10 Jul 2019 04:46:59 -0400 Received: from vmicros1.altlinux.org ([194.107.17.57]:45802 "EHLO vmicros1.altlinux.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726580AbfGJIq7 (ORCPT ); Wed, 10 Jul 2019 04:46:59 -0400 Received: from mua.local.altlinux.org (mua.local.altlinux.org [192.168.1.14]) by vmicros1.altlinux.org (Postfix) with ESMTP id 0A32472CCDD; Wed, 10 Jul 2019 11:46:57 +0300 (MSK) Received: by mua.local.altlinux.org (Postfix, from userid 508) id 00D8C7CCE3A; Wed, 10 Jul 2019 11:46:56 +0300 (MSK) Date: Wed, 10 Jul 2019 11:46:56 +0300 From: "Dmitry V. Levin" To: Xi Ruoyao Cc: Kees Cook , Jani Nikula , David Airlie , Jessica Yu , kernel-hardening@lists.openwall.com, intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-modules@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: kernel oops loading i915 after "x86/asm: Pin sensitive CR4 bits" (873d50d58) Message-ID: <20190710084656.GB5447@altlinux.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Wed, Jul 10, 2019 at 01:44:17PM +0800, Xi Ruoyao wrote: > Hello, > > When I try to build and run the latest mainline kernel, it Oops loading i915 > module: > > BUG: unable to handle page fault for address: ffffffff9edc1598 > #PF: supervisor write access in kernel mode > #PF: error_code(0x0003) - permissions violation > PGD 1a20c067 P4D 1a20c067 PUD 1a20d063 PMD 8000000019e000e1 > Oops: 0003 [#1] SMP PTI > > The complete log is attached. > > Bisection tells "x86/asm: Pin sensitive CR4 bits" (873d50d58) is the first "bad" > commit. I can revert it and also "x86/asm: Pin sensitive CR0 bits" (8dbec27a2) > to make the kernel "seems to" work. > > I'm not a kernel expert so I can't tell if there is a bug in Kees' patch, or his > patch exploits a bug in i915 or module loader. This seems to be a kernel bug introduced after v5.2, see https://lore.kernel.org/lkml/CAHk-=wjh+h_-fd-gJz=wor42ZNmqq46QnB90jyfzqmKLsLFWOg@mail.gmail.com/ -- ldv