Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp566000ybz; Wed, 29 Apr 2020 05:30:44 -0700 (PDT) X-Google-Smtp-Source: APiQypLX8pmf6aZFUESy0XyIPpFJSlZAMknhoMALIvAuiIBGGWXJI3Hg3g442jWs+wYD+GABpSrE X-Received: by 2002:aa7:d718:: with SMTP id t24mr2178957edq.20.1588163444780; Wed, 29 Apr 2020 05:30:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588163444; cv=none; d=google.com; s=arc-20160816; b=OuYE6encx6FJ6EGhm6E/KMocGV1JzxTCTgiIqmsGNsZjLsFU/mouVBJ0aP50qdQegq 3KDlbddKNKI14MxM9SKo0NkpWDyXR0tVF5qMxo6T70Nt3VlhTK/oBOutW51g5oLIcUYG 8iCtncpTkPNsIXGZq5XvhL/lZj6Kv7iWMH3J8wDnLmoNmIHKw00QHZxQLHPGGwL3iyVU fg208aP9ezUsabZMnlw6IGAV1HQvK85wM9dTUoDEFeS9S25it/4RmD78gzM3tSLhLp1Q DyaNCO9YZYINzXOqwMVRQ8gWo1KA2sZJcag+FtvnA8DQ/t8ZUqEjCPQRDVTMqUH/RHS9 aPuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=74BPZlFEwdzMaTx18EXwxz64CmOTliORbN4VS9Bl5fM=; b=SlRUiXk9hRmArTpCz4duMHOvqlLtvQ+NCcYH0bdydcQLvsRwacfKucc218ExgYxETY 9tYlp3Gq7TU0XNR04Xepnk+Eg/LofGcAzrtNbmj3Af8Ns2HlwD8GmF9n12mzxClqP8CG u5emHdGcpwko8s2nTsUcpd5bNjFsMpfSAazu1kgw+RU4t2PVENL7z8A+GrOX1e5GmAhL Jf7pNqRsVMlmsDNRot5/MDvOSFcy4wbWHDKR8S8orh7f/nu4eiXDaA1BuKY0ZTH1RF5l 55lgehhZYGISe9TAKU6s0Jh/hg64vBbFvbqiCPwjwYQ/Enrpp1xP1HbAkvpb+TzGHpZa A97Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u13si3845117edi.202.2020.04.29.05.30.21; Wed, 29 Apr 2020 05:30:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726826AbgD2M26 (ORCPT + 99 others); Wed, 29 Apr 2020 08:28:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:60568 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726524AbgD2M25 (ORCPT ); Wed, 29 Apr 2020 08:28:57 -0400 Received: from oasis.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3EFA62137B; Wed, 29 Apr 2020 12:28:56 +0000 (UTC) Date: Wed, 29 Apr 2020 08:28:54 -0400 From: Steven Rostedt To: Joerg Roedel Cc: LKML , Ingo Molnar , Thomas Gleixner , Peter Zijlstra , Borislav Petkov , Andrew Morton , Shile Zhang , Andy Lutomirski , "Rafael J. Wysocki" , Dave Hansen , Tzvetomir Stoyanov Subject: Re: [RFC][PATCH] x86/mm: Sync all vmalloc mappings before text_poke() Message-ID: <20200429082854.6e1796b5@oasis.local.home> In-Reply-To: <20200429105941.GQ30814@suse.de> References: <20200429054857.66e8e333@oasis.local.home> <20200429105941.GQ30814@suse.de> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 29 Apr 2020 12:59:41 +0200 Joerg Roedel wrote: > > use_temporary_mm() { > > switch_mm_irqs_off() { > > load_new_mm_cr3() { > > write_cr3() <<--- Lock up! > > I don't see how it could lock up in write_cr3(), at least on bare-metal. > What is the environment this happens, 32 or 64 bit, in a VM or > bare-metal? 64 bit bare-metal. In fact, it wasn't reproducible on a VM (according to Tzvetomir, who was just using a Fedora kernel). I only tried it on bare-metal. > > I think it is more likely that your lockup is actually a page-fault > loop, where the #PF handler does not map the faulting address correctly. Sounds reasonable. > > But I have to look closer into how text_poke() works before I can say > more. > > Btw, in case it happens on x86-64, does it also happen without > vmalloc-stacks? Just tried it out with !CONFIG_VMAP_STACKS and it still locks up :-/ -- Steve