* [GIT PULL] x86 updates for v4.15
@ 2017-11-13 8:24 Ingo Molnar
2017-11-14 5:02 ` Linus Torvalds
0 siblings, 1 reply; 5+ messages in thread
From: Ingo Molnar @ 2017-11-13 8:24 UTC (permalink / raw)
To: Linus Torvalds
Cc: linux-kernel, Thomas Gleixner, H. Peter Anvin, Peter Zijlstra,
Andrew Morton, Andy Lutomirski, Borislav Petkov
Linus,
Please pull the latest x86-asm-for-linus git tree from:
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86-asm-for-linus
# HEAD: 91a6a6cfee8ad34ea4cc10a54c0765edfe437cdb Merge branch 'linus' into x86/asm, to resolve conflict
Note that in this cycle most of the x86 topics interacted at a level that caused
them to be merged into tip:x86/asm - but this should be a temporary phenomenon,
hopefully we'll back to the usual patterns in the next merge window.
The main changes in this cycle were:
Hardware enablement:
- Add support for the Intel UMIP (User Mode Instruction Prevention) CPU feature.
This is a security feature that disables certain instructions such as SGDT,
SLDT, SIDT, SMSW and STR. [Note that this is disabled by default for now, there
are some smaller enhancements in the pipeline that I'll follow up with in the
next 1-2 days, which allows this to be enabled by default.] (Ricardo Neri)
- Add support for the AMD SEV (Secure Encrypted Virtualization) CPU feature, on
top of SME (Secure Memory Encryption) support that was added in v4.14.
(Tom Lendacky, Brijesh Singh)
- Enable new SSE/AVX/AVX512 CPU features: AVX512_VBMI2, GFNI, VAES, VPCLMULQDQ,
AVX512_VNNI, AVX512_BITALG. (Gayatri Kammela)
Other changes:
- A big series of entry code simplifications and enhancements (Andy Lutomirski)
- Make the ORC unwinder default on x86 and various objtool enhancements.
(Josh Poimboeuf)
- 5-level paging enhancements (Kirill A. Shutemov)
- Micro-optimize the entry code a bit (Borislav Petkov)
- Improve the handling of interdependent CPU features in the early FPU
init code (Andi Kleen)
- Build system enhancements (Changbin Du, Masahiro Yamada)
- ... plus misc enhancements, fixes and cleanups.
out-of-topic modifications in x86-asm-for-linus:
--------------------------------------------------
Makefile # 11af847446ed: x86/unwind: Rename unwinder
arch/powerpc/kernel/machine_kexec_file_64.c# 1d2e733b13b4: resource: Provide resource s
include/asm-generic/vmlinux.lds.h # ac26963a1175: percpu: Introduce DEFINE_PER
# 11af847446ed: x86/unwind: Rename unwinder
include/linux/ioport.h # 0e4c12b45aa8: x86/mm, resource: Use PAGE_K
# 1d2e733b13b4: resource: Provide resource s
include/linux/kexec.h # 1d2e733b13b4: resource: Provide resource s
include/linux/mem_encrypt.h # d8aa7eea78a1: x86/mm: Add Secure Encrypted
include/linux/mm.h # 15670bfe1990: x86/mm/64: Rename the regist
include/linux/mmzone.h # 83e3c48729d9: mm/sparsemem: Allocate mem_s
include/linux/percpu-defs.h # ac26963a1175: percpu: Introduce DEFINE_PER
kernel/extable.c # e846d1395806: kprobes, x86/alternatives: U
kernel/kexec_file.c # 1d2e733b13b4: resource: Provide resource s
kernel/resource.c # 0e4c12b45aa8: x86/mm, resource: Use PAGE_K
# 1d2e733b13b4: resource: Provide resource s
# 4ac2aed837cb: resource: Consolidate resour
lib/swiotlb.c # d7b417fa08d1: x86/mm: Add DMA support for
mm/gup.c # 5b65c4677a57: mm, x86/mm: Fix performance
mm/sparse.c # 629a359bdb0e: mm/sparsemem: Fix ARM64 boot
# 83e3c48729d9: mm/sparsemem: Allocate mem_s
scripts/Makefile.build # 11af847446ed: x86/unwind: Rename unwinder
tools/objtool/check.c # 00d96180dc38: objtool: Don't report end of
tools/objtool/objtool.c # 6a93bb7e4a7d: objtool: Print top level com
tools/testing/selftests/x86/entry_from_vm86.c# a9e017d5619e: selftests/x86: Add tests for
# 9390afebe1d3: selftests/x86: Add tests for
tools/testing/selftests/x86/ldt_gdt.c# fec8f5ae1715: selftests/x86/ldt_get: Add a
# adedf2893c19: selftests/x86/ldt_gdt: Run m
# d744dcad3909: selftests/x86/ldt_gdt: Add i
# d60ad744c974: selftests/x86/ldt_gdt: Robus
tools/testing/selftests/x86/protection_keys.c# 693cb5580fdb: selftests/x86/protection_key
Thanks,
Ingo
------------------>
Andi Kleen (5):
bitops: Add clear/set_bit32() to linux/bitops.h
x86/cpuid: Add generic table for CPUID dependencies
x86/fpu: Parse clearcpuid= as early XSAVE argument
x86/fpu: Make XSAVE check the base CPUID features before enabling
x86/fpu: Remove the explicit clearing of XSAVE dependent features
Andrey Ryabinin (1):
x86/kasan: Use the same shadow offset for 4- and 5-level paging
Andy Lutomirski (24):
x86/entry/64: Remove the restore_c_regs_and_iret label
x86/entry/64: Split the IRET-to-user and IRET-to-kernel paths
x86/entry/64: Move SWAPGS into the common IRET-to-usermode path
x86/entry/64: Simplify reg restore code in the standard IRET paths
x86/entry/64: Shrink paranoid_exit_restore and make labels local
x86/entry/64: Use pop instead of movq in syscall_return_via_sysret
x86/entry/64: Merge the fast and slow SYSRET paths
x86/entry/64: Use POP instead of MOV to restore regs on NMI return
x86/entry/64: Remove the RESTORE_..._REGS infrastructure
x86/entry/64: De-Xen-ify our NMI code
x86/entry/32: Pull the MSR_IA32_SYSENTER_CS update code out of native_load_sp0()
x86/entry/64: Pass SP0 directly to load_sp0()
x86/entry: Add task_top_of_stack() to find the top of a task's stack
x86/xen/64, x86/entry/64: Clean up SP code in cpu_initialize_context()
x86/entry/64: Stop initializing TSS.sp0 at boot
x86/entry/64: Remove all remaining direct thread_struct::sp0 reads
x86/entry/32: Fix cpu_current_top_of_stack initialization at boot
x86/entry/64: Remove thread_struct::sp0
x86/traps: Use a new on_thread_stack() helper to clean up an assertion
selftests/x86/protection_keys: Fix syscall NR redefinition warnings
selftests/x86/ldt_gdt: Robustify against set_thread_area() and LAR oddities
selftests/x86/ldt_gdt: Add infrastructure to test set_thread_area()
selftests/x86/ldt_gdt: Run most existing LDT test cases against the GDT as well
selftests/x86/ldt_get: Add a few additional tests for limits
Baoquan He (1):
x86/mm/64: Rename the register_page_bootmem_memmap() 'size' parameter to 'nr_pages'
Borislav Petkov (2):
x86/entry/64: Shorten TEST instructions
x86/mm: Define _PAGE_TABLE using _KERNPG_TABLE
Brijesh Singh (5):
Documentation/x86: Add AMD Secure Encrypted Virtualization (SEV) description
x86: Add support for changing memory encryption attribute in early boot
percpu: Introduce DEFINE_PER_CPU_DECRYPTED
X86/KVM: Decrypt shared per-cpu variables when SEV is active
X86/KVM: Clear encryption attribute when SEV is active
Changbin Du (5):
x86/build: Factor out fdimage/isoimage generation commands to standalone script
x86/build: Add new paths for isolinux.bin and ldlinux.c32
x86/build: Specify -input-charset=utf-8 for mkisofs
x86/build: Add more generated files to the .gitignore file
x86/build: Make the boot image generation less verbose
Dave Hansen (1):
x86/entry: Use SYSCALL_DEFINE() macros for sys_modify_ldt()
Gayatri Kammela (1):
x86/cpufeatures: Enable new SSE/AVX/AVX512 CPU features
Ingo Molnar (3):
x86/unwinder: Make CONFIG_UNWINDER_ORC=y the default in the 64-bit defconfig
x86/cpufeatures: Re-tabulate the X86_FEATURE definitions
x86/cpufeatures: Fix various details in the feature definitions
Josh Poimboeuf (11):
objtool: Don't report end of section error after an empty unwind hint
x86/head: Remove confusing comment
x86/head: Remove unused 'bad_address' code
x86/head: Fix head ELF function annotations
x86/boot: Annotate verify_cpu() as a callable function
x86/xen: Fix xen head ELF annotations
x86/xen: Add unwind hint annotations
x86/head: Add unwind hint annotations
x86/unwind: Rename unwinder config options to 'CONFIG_UNWINDER_*'
x86/unwind: Make CONFIG_UNWINDER_ORC=y the default in kconfig for 64-bit
x86/asm: Don't use the confusing '.ifeq' directive
Juergen Gross (1):
xen, x86/entry/64: Add xen NMI trap entry
Kamalesh Babulal (1):
objtool: Print top level commands on incorrect usage
Kirill A. Shutemov (5):
mm, x86/mm: Fix performance regression in get_user_pages_fast()
mm/sparsemem: Allocate mem_section at runtime for CONFIG_SPARSEMEM_EXTREME=y
x86/xen: Provide pre-built page tables only for CONFIG_XEN_PV=y and CONFIG_XEN_PVH=y
x86/xen: Drop 5-level paging support code from the XEN_PV code
mm/sparsemem: Fix ARM64 boot crash when CONFIG_SPARSEMEM_EXTREME=y
Masahiro Yamada (1):
x86/build: Beautify build log of syscall headers
Ricardo Neri (31):
x86/mm: Relocate page fault error codes to traps.h
x86/boot: Relocate definition of the initial state of CR0
uprobes/x86: Use existing definitions for segment override prefixes
x86/mpx: Simplify handling of errors when computing linear addresses
ptrace,x86: Make user_64bit_mode() available to 32-bit builds
x86/mpx: Use signed variables to compute effective addresses
x86/mpx: Do not use SIB.index if its value is 100b and ModRM.mod is not 11b
x86/mpx: Do not use SIB.base if its value is 101b and ModRM.mod = 0
x86/mpx, x86/insn: Relocate insn util functions to a new insn-eval file
x86/insn-eval: Do not BUG on invalid register type
x86/insn-eval: Add a utility function to get register offsets
x86/insn-eval: Add utility function to identify string instructions
x86/insn-eval: Add utility functions to get segment selector
x86/insn-eval: Add utility function to get segment descriptor
x86/insn-eval: Add utility functions to get segment descriptor base address and limit
x86/insn-eval: Add function to get default params of code segment
x86/insn-eval: Indicate a 32-bit displacement if ModRM.mod is 0 and ModRM.rm is 101b
x86/insn-eval: Incorporate segment base in linear address computation
x86/insn-eval: Extend get_seg_base_addr() to also obtain segment limit
x86/insn-eval: Compute linear address in several utility functions
x86/insn-eval: Add support to resolve 32-bit address encodings
x86/insn-eval: Add wrapper function for 32 and 64-bit addresses
x86/insn-eval: Handle 32-bit address encodings in virtual-8086 mode
x86/insn-eval: Add support to resolve 16-bit address encodings
x86/cpufeature: Add User-Mode Instruction Prevention definitions
x86/umip: Add emulation code for UMIP instructions
x86/umip: Force a page fault when unable to copy emulated result to user
x86/umip: Enable User-Mode Instruction Prevention at runtime
x86/traps: Fix up general protection faults caused by UMIP
selftests/x86: Add tests for User-Mode Instruction Prevention
selftests/x86: Add tests for the STR and SLDT instructions
Steven Rostedt (VMware) (1):
x86/fpu/debug: Remove unused 'x86_fpu_state' and 'x86_fpu_deactivate_state' tracepoints
Thomas Gleixner (3):
x86/cpuid: Prevent out of bound access in do_clear_cpu_cap()
x86/cpuid: Replace set/clear_bit32()
bitops: Revert cbe96375025e ("bitops: Add clear/set_bit32() to linux/bitops.h")
Tom Lendacky (13):
x86/mm: Remove unnecessary TLB flush for SME in-place encryption
x86/mm: Add Secure Encrypted Virtualization (SEV) support
x86/mm: Don't attempt to encrypt initrd under SEV
x86/realmode: Don't decrypt trampoline area under SEV
x86/mm: Use encrypted access of boot related data with SEV
x86/mm: Include SEV for encryption memory attribute changes
x86/efi: Access EFI data as encrypted when SEV is active
resource: Consolidate resource walking code
resource: Provide resource struct in resource walk callback
x86/mm, resource: Use PAGE_KERNEL protection for ioremap of memory pages
x86/mm: Add DMA support for SEV memory encryption
x86/boot: Add early boot support when running with SEV active
x86/io: Unroll string I/O when SEV is active
Uros Bizjak (1):
x86/asm: Remove unnecessary \n\t in front of CC_SET() from asm templates
Zhou Chengming (1):
kprobes, x86/alternatives: Use text_mutex to protect smp_alt_modules
kbuild test robot (1):
resource: Fix resource_size.cocci warnings
Documentation/x86/amd-memory-encryption.txt | 30 +-
Documentation/x86/orc-unwinder.txt | 2 +-
Documentation/x86/x86_64/mm.txt | 2 +-
Makefile | 4 +-
arch/powerpc/kernel/machine_kexec_file_64.c | 12 +-
arch/x86/Kconfig | 13 +-
arch/x86/Kconfig.debug | 39 +-
arch/x86/boot/.gitignore | 3 +
arch/x86/boot/Makefile | 59 +-
arch/x86/boot/compressed/Makefile | 1 +
arch/x86/boot/compressed/head_64.S | 16 +
arch/x86/boot/compressed/mem_encrypt.S | 120 +++
arch/x86/boot/compressed/misc.h | 2 +
arch/x86/boot/compressed/pagetable.c | 8 +-
arch/x86/boot/genimage.sh | 124 +++
arch/x86/configs/tiny.config | 4 +-
arch/x86/configs/x86_64_defconfig | 1 +
arch/x86/entry/calling.h | 69 +-
arch/x86/entry/entry_64.S | 141 +--
arch/x86/entry/entry_64_compat.S | 3 +-
arch/x86/entry/syscalls/Makefile | 4 +-
arch/x86/entry/vdso/vma.c | 5 +-
arch/x86/include/asm/archrandom.h | 8 +-
arch/x86/include/asm/bitops.h | 10 +-
arch/x86/include/asm/compat.h | 1 +
arch/x86/include/asm/cpufeature.h | 9 +-
arch/x86/include/asm/cpufeatures.h | 537 +++++-----
arch/x86/include/asm/disabled-features.h | 8 +-
arch/x86/include/asm/inat.h | 10 +
arch/x86/include/asm/insn-eval.h | 23 +
arch/x86/include/asm/io.h | 43 +-
arch/x86/include/asm/mem_encrypt.h | 14 +
arch/x86/include/asm/module.h | 2 +-
arch/x86/include/asm/msr-index.h | 3 +
arch/x86/include/asm/paravirt.h | 5 +-
arch/x86/include/asm/paravirt_types.h | 2 +-
arch/x86/include/asm/percpu.h | 2 +-
arch/x86/include/asm/pgtable_types.h | 3 +-
arch/x86/include/asm/processor.h | 52 +-
arch/x86/include/asm/ptrace.h | 6 +-
arch/x86/include/asm/rmwcc.h | 2 +-
arch/x86/include/asm/switch_to.h | 24 +
arch/x86/include/asm/syscalls.h | 2 +-
arch/x86/include/asm/trace/fpu.h | 10 -
arch/x86/include/asm/traps.h | 20 +-
arch/x86/include/asm/umip.h | 12 +
arch/x86/include/asm/unwind.h | 8 +-
arch/x86/include/uapi/asm/kvm_para.h | 1 -
arch/x86/include/uapi/asm/processor-flags.h | 5 +
arch/x86/kernel/Makefile | 11 +-
arch/x86/kernel/alternative.c | 26 +-
arch/x86/kernel/cpu/Makefile | 1 +
arch/x86/kernel/cpu/common.c | 54 +-
arch/x86/kernel/cpu/cpuid-deps.c | 121 +++
arch/x86/kernel/crash.c | 18 +-
arch/x86/kernel/fpu/init.c | 11 +
arch/x86/kernel/fpu/xstate.c | 43 +-
arch/x86/kernel/head_32.S | 5 +-
arch/x86/kernel/head_64.S | 45 +-
arch/x86/kernel/kvm.c | 40 +-
arch/x86/kernel/kvmclock.c | 65 +-
arch/x86/kernel/ldt.c | 16 +-
arch/x86/kernel/pmem.c | 2 +-
arch/x86/kernel/process.c | 8 +-
arch/x86/kernel/process_32.c | 6 +-
arch/x86/kernel/process_64.c | 5 +-
arch/x86/kernel/setup.c | 6 +-
arch/x86/kernel/smpboot.c | 3 +-
arch/x86/kernel/traps.c | 9 +-
arch/x86/kernel/umip.c | 366 +++++++
arch/x86/kernel/uprobes.c | 15 +-
arch/x86/kernel/verify_cpu.S | 3 +-
arch/x86/kernel/vm86_32.c | 20 +-
arch/x86/lib/Makefile | 2 +-
arch/x86/lib/insn-eval.c | 1364 +++++++++++++++++++++++++
arch/x86/mm/fault.c | 88 +-
arch/x86/mm/init_64.c | 10 +-
arch/x86/mm/ioremap.c | 123 ++-
arch/x86/mm/kasan_init_64.c | 101 +-
arch/x86/mm/mem_encrypt.c | 301 +++++-
arch/x86/mm/mpx.c | 120 +--
arch/x86/mm/pageattr.c | 4 +-
arch/x86/platform/efi/efi_64.c | 16 +-
arch/x86/realmode/init.c | 5 +-
arch/x86/um/ldt.c | 7 +-
arch/x86/xen/enlighten_pv.c | 9 +-
arch/x86/xen/mmu_pv.c | 159 ++-
arch/x86/xen/smp_pv.c | 17 +-
arch/x86/xen/xen-asm_64.S | 2 +-
arch/x86/xen/xen-head.S | 11 +-
include/asm-generic/vmlinux.lds.h | 21 +-
include/linux/ioport.h | 7 +-
include/linux/kexec.h | 2 +-
include/linux/mem_encrypt.h | 7 +-
include/linux/mm.h | 2 +-
include/linux/mmzone.h | 6 +-
include/linux/percpu-defs.h | 15 +
kernel/extable.c | 2 +
kernel/kexec_file.c | 5 +-
kernel/resource.c | 76 +-
lib/Kconfig.debug | 2 +-
lib/swiotlb.c | 5 +-
mm/gup.c | 97 +-
mm/sparse.c | 27 +-
scripts/Makefile.build | 2 +-
tools/objtool/check.c | 7 +-
tools/objtool/objtool.c | 6 +-
tools/testing/selftests/x86/entry_from_vm86.c | 89 +-
tools/testing/selftests/x86/ldt_gdt.c | 88 +-
tools/testing/selftests/x86/protection_keys.c | 24 +-
110 files changed, 4067 insertions(+), 1145 deletions(-)
create mode 100644 arch/x86/boot/compressed/mem_encrypt.S
create mode 100644 arch/x86/boot/genimage.sh
create mode 100644 arch/x86/include/asm/insn-eval.h
create mode 100644 arch/x86/include/asm/umip.h
create mode 100644 arch/x86/kernel/cpu/cpuid-deps.c
create mode 100644 arch/x86/kernel/umip.c
create mode 100644 arch/x86/lib/insn-eval.c
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [GIT PULL] x86 updates for v4.15
2017-11-13 8:24 [GIT PULL] x86 updates for v4.15 Ingo Molnar
@ 2017-11-14 5:02 ` Linus Torvalds
2017-11-14 9:48 ` Borislav Petkov
0 siblings, 1 reply; 5+ messages in thread
From: Linus Torvalds @ 2017-11-14 5:02 UTC (permalink / raw)
To: Ingo Molnar
Cc: Linux Kernel Mailing List, Thomas Gleixner, H. Peter Anvin,
Peter Zijlstra, Andrew Morton, Andy Lutomirski, Borislav Petkov
On Mon, Nov 13, 2017 at 12:24 AM, Ingo Molnar <mingo@kernel.org> wrote:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86-asm-for-linus
Hmm #2.
My laptop had odd SIGBUS and IO errors after a suspend/resume cycle
when running commit d6ec9d9a4def, which is after my merge of the x86
core changes.
I'm probably not going to be able to bisect it - there's nothing in
the logs, probably because processes just died (and most likely the IO
errors were due to the disk having gone missing), but looking at the
merges I had done up until that point, all the suspect ones are from
you.
The x86 pull obviously being the most likely one, just based on
content, and based on that "after suspend/resume".
I'm wondering how much suspend/resume testing that entry code has
gotten. Last release it was the TLB ASID code that messed up on
suspend/resume, I suspect there is a decided lack of test coverage in
the otherwise good x86 farm..
I'll see if I can get anything interesting out of testing some more,
but I thought I'd give you guys a heads up.
Usually it's the networking tree and the PM tree that triggers issues
on my laptop, but neither of those had been merged at that point. But
there also really isn't anything else that looks odd in there.
Linus
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [GIT PULL] x86 updates for v4.15
2017-11-14 5:02 ` Linus Torvalds
@ 2017-11-14 9:48 ` Borislav Petkov
2017-11-14 17:48 ` Linus Torvalds
0 siblings, 1 reply; 5+ messages in thread
From: Borislav Petkov @ 2017-11-14 9:48 UTC (permalink / raw)
To: Linus Torvalds
Cc: Ingo Molnar, Linux Kernel Mailing List, Thomas Gleixner,
H. Peter Anvin, Peter Zijlstra, Andrew Morton, Andy Lutomirski
On Mon, Nov 13, 2017 at 09:02:36PM -0800, Linus Torvalds wrote:
> On Mon, Nov 13, 2017 at 12:24 AM, Ingo Molnar <mingo@kernel.org> wrote:
> >
> > git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86-asm-for-linus
>
> Hmm #2.
>
> My laptop had odd SIGBUS and IO errors after a suspend/resume cycle
> when running commit d6ec9d9a4def, which is after my merge of the x86
> core changes.
Just did 2 suspend cycles (once to RAM and once to disk) on my x230
with your tree from right now and it looks ok so far. So it could be
machine- and config-specific...
--
Regards/Gruss,
Boris.
Good mailing practices for 400: avoid top-posting and trim the reply.
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [GIT PULL] x86 updates for v4.15
2017-11-14 9:48 ` Borislav Petkov
@ 2017-11-14 17:48 ` Linus Torvalds
2017-11-15 7:50 ` Ingo Molnar
0 siblings, 1 reply; 5+ messages in thread
From: Linus Torvalds @ 2017-11-14 17:48 UTC (permalink / raw)
To: Borislav Petkov
Cc: Ingo Molnar, Linux Kernel Mailing List, Thomas Gleixner,
H. Peter Anvin, Peter Zijlstra, Andrew Morton, Andy Lutomirski
On Tue, Nov 14, 2017 at 1:48 AM, Borislav Petkov <bp@alien8.de> wrote:
>
> Just did 2 suspend cycles (once to RAM and once to disk) on my x230
> with your tree from right now and it looks ok so far. So it could be
> machine- and config-specific...
.. and it's not repeatable for me. I rebooted pretty quickly, and
didn't gather a lot of information (well, 'dmesg' would SIBGUS, so..)
and it hasn't happened again.
Will ignore until I have more information.
Linus
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [GIT PULL] x86 updates for v4.15
2017-11-14 17:48 ` Linus Torvalds
@ 2017-11-15 7:50 ` Ingo Molnar
0 siblings, 0 replies; 5+ messages in thread
From: Ingo Molnar @ 2017-11-15 7:50 UTC (permalink / raw)
To: Linus Torvalds
Cc: Borislav Petkov, Linux Kernel Mailing List, Thomas Gleixner,
H. Peter Anvin, Peter Zijlstra, Andrew Morton, Andy Lutomirski
* Linus Torvalds <torvalds@linux-foundation.org> wrote:
> On Tue, Nov 14, 2017 at 1:48 AM, Borislav Petkov <bp@alien8.de> wrote:
> >
> > Just did 2 suspend cycles (once to RAM and once to disk) on my x230
> > with your tree from right now and it looks ok so far. So it could be
> > machine- and config-specific...
>
> .. and it's not repeatable for me. I rebooted pretty quickly, and
> didn't gather a lot of information (well, 'dmesg' would SIBGUS, so..)
> and it hasn't happened again.
>
> Will ignore until I have more information.
Haven't seen such behavior or got such reports - although admittedly laptop
suspend/resume testing is done only sporadically, as it isn't easily automated.
As per the symptoms one thing that _could_ produce SIGSEGVs are the
CONFIG_X86_INTEL_UMIP changes: the upcoming changes that make any UMIP action more
verbose should make it more apparent if that's the case.
Plus, of course, anything entry code related. We did a few harmless (looking...)
x86/mm changes as well, but none stands out at the moment.
Thanks,
Ingo
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2017-11-15 7:50 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-11-13 8:24 [GIT PULL] x86 updates for v4.15 Ingo Molnar
2017-11-14 5:02 ` Linus Torvalds
2017-11-14 9:48 ` Borislav Petkov
2017-11-14 17:48 ` Linus Torvalds
2017-11-15 7:50 ` Ingo Molnar
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).