Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1178283pxk; Fri, 25 Sep 2020 08:08:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxo1qj/jcAX/ThdfG32HTxS3Pd9BxLCbjXCs2Gi6TeDFLREObAwrhySL9tfjMOJIWpX7/lX X-Received: by 2002:a05:6402:17ec:: with SMTP id t12mr1741323edy.328.1601046514181; Fri, 25 Sep 2020 08:08:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601046514; cv=none; d=google.com; s=arc-20160816; b=Dug6U+fCuqvMlgPBcxutBvps1pqKnbJ8e+YhRUW+dWey1EG+DaKaDlPvyqwLC7HHbv EiOnOuIdrZqbqFR0+IbnEb6tB5i0IK8CYC56ARdvsI/3wMkecrJX6kCPaAZjD0BaZnPy gCe9nA0IqqmLLuDMmTHQ6aNKVkjroXD9HxfkuMS0XR82zxHxZhgtEdG+eoJWTaJHalob VSDqQ/pCYMajMi2lVpO3ElucinCGtw4ubhhQIifX/weFpkIUTkjsNmXwHz2uSEY4Oayg 9j0I/Gpv7w+8p/7N7Wh04MpA2QhG0sTcAjw060rNMaB2FsbKpsIwgbcqgNaZQ18/t5vS ucpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=bTcVIA63N0GsuzstfLcNIG+hpWklG6C4Kpz+yXKBRys=; b=r5ye3N+StInFMnuWrtvbbTlBA37cxvCZH8eb4efFe9CYywwYrNH6A8XsVHlIYwQZKf Y/cKriJMZaeXl6yKtoaxh2WHgFCnh5ghU82tRwtCWG/HrrBNEEiqTF2NAHa5ariorks3 8MjmV2yRZwNNetbqmiOwPYePZNarEn9oDqnjVgJYOmeDhVW5j+XDQtIYmDULoNez5bQR Tha4m9UGTlipTxHxyC2A4vQF3eKmmeLBBLJ9WE5ZyeWbuGlh+Zm2k1EZQ/WnWdVjO8vu R++7szaLoiff/srFMRlgIIbFV22/RXJEdp+wrKX3zvXSslxsQFO8tWzxuk6SmglnR4o8 NQEg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c11si2395597edw.277.2020.09.25.08.08.10; Fri, 25 Sep 2020 08:08:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729218AbgIYPHK (ORCPT + 99 others); Fri, 25 Sep 2020 11:07:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:46962 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728818AbgIYPHJ (ORCPT ); Fri, 25 Sep 2020 11:07:09 -0400 Received: from oasis.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 188EE20878; Fri, 25 Sep 2020 15:07:07 +0000 (UTC) Date: Fri, 25 Sep 2020 11:07:06 -0400 From: Steven Rostedt To: Naresh Kamboju Cc: Greg Kroah-Hartman , Joel Fernandes , Peter Zijlstra , Namhyung Kim , LKML , linux- stable , Sasha Levin , Masami Hiramatsu , LTP List , lkft-triage@lists.linaro.org Subject: Re: [stable 4.19] [PANIC]: tracing: Centralize preemptirq tracepoints and unify their usage Message-ID: <20200925110706.6654954b@oasis.local.home> In-Reply-To: <20200925105914.7de88d27@oasis.local.home> References: <20180823023839.GA13343@shao2-debian> <20180828195347.GA228832@joelaf.mtv.corp.google.com> <20200925051518.GA605188@kroah.com> <20200925105458.567d0bf4@oasis.local.home> <20200925105914.7de88d27@oasis.local.home> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 25 Sep 2020 10:59:14 -0400 Steven Rostedt wrote: > On Fri, 25 Sep 2020 10:54:58 -0400 > Steven Rostedt wrote: > > > > The crash looks like its cr3 related, which I believe Peter Zijlstra > > s/cr3/cr2/ > Specifically, commits: a0d14b8909de55139b8702fe0c7e80b69763dcfb ("x86/mm, tracing: Fix CR2 corruption") 6879298bd0673840cadd1fb36d7225485504ceb4 ("x86/entry/64: Prevent clobbering of saved CR2 value") b8f70953c1251d8b16276995816a95639f598e70 ("x86/entry/32: Pass cr2 to do_async_page_fault()") (which are in 5.4 but not 4.19) But again, is this too intrusive. There was a workaround that was original proposed, but Peter didn't want any more band-aids, and did the restructuring, but as you can see from the two other patches, it makes it a bit more high risk. -- Steve