x86/mm: fix poking_init() for Xen PV guests
authorJuergen Gross <jgross@suse.com>
Mon, 9 Jan 2023 15:09:22 +0000 (16:09 +0100)
committerPeter Zijlstra <peterz@infradead.org>
Thu, 12 Jan 2023 10:22:20 +0000 (11:22 +0100)
commit26ce6ec364f18d2915923bc05784084e54a5c4cc
tree8af8622ce3f5137c36a488a9e337869e40cad13a
parent2a81160d29d65b5876ab3f824fda99ae0219f05e
x86/mm: fix poking_init() for Xen PV guests

Commit 3f4c8211d982 ("x86/mm: Use mm_alloc() in poking_init()") broke
the kernel for running as Xen PV guest.

It seems as if the new address space is never activated before being
used, resulting in Xen rejecting to accept the new CR3 value (the PGD
isn't pinned).

Fix that by adding the now missing call of paravirt_arch_dup_mmap() to
poking_init(). That call was previously done by dup_mm()->dup_mmap() and
it is a NOP for all cases but for Xen PV, where it is just doing the
pinning of the PGD.

Fixes: 3f4c8211d982 ("x86/mm: Use mm_alloc() in poking_init()")
Signed-off-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/20230109150922.10578-1-jgross@suse.com
arch/x86/mm/init.c