[PATCH] [PATCH] arm64: Boot failure on m400 with new cont PTEs
Jeremy Linton
jlinton at redhat.com
Mon Nov 23 08:02:02 PST 2015
On 11/23/2015 09:51 AM, Catalin Marinas wrote:
> Call trace:
> [<ffffffc0000952b8>] __create_mapping.isra.5+0x360/0x530
> [<ffffffc0000954ec>] fixup_init+0x64/0x80
> [<ffffffc0000945a4>] free_initmem+0xc/0x38
> [<ffffffc0005eb9f8>] kernel_init+0x20/0xe0
> [<ffffffc000085c50>] ret_from_fork+0x10/0x40
>
> What I don't get is why we have fixup_init() even when
> !CONFIG_DEBUG_RODATA. It probably breaks the initial mapping just to get
> a non-executable init section. However, the other sections are left
> executable when this config option is disabled. The patch below fixes
> the warnings above:
Well the kernel permissions are a bit of a mess, and not at all
"secure" in their current state. But I guess the thought must have been
that turning off execute on the init sections was a good way to find
functions incorrectly marked _init(). Which is different from RO.
Frankly, I expect someone will push to cleanup the kernel permissions at
some point (I've got it on my "spare time todo, list"), but this will of
course make the create_mapping_late a lot more popular as I see it being
called during module load/unload.
Anyway, I've been saying the problem is create_mapping_late() all
along, as you notice there isn't any TLB flushes in fixup_init() and
that is the core of the problem, not all this other discussion.
> Jeremy, can you give this fixup_init() patch a try, see whether it makes
> any difference (it's just a temporary hack which may prevent us from
> reverting the PTE_CONT patches until we have a better solution).
I will try it, but i'm pretty sure that fixes it too.
More information about the linux-arm-kernel
mailing list