lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080815163212.GA5408@joi>
Date:	Fri, 15 Aug 2008 18:32:24 +0200
From:	Marcin Slusarz <marcin.slusarz@...il.com>
To:	Ingo Molnar <mingo@...e.hu>
Cc:	LKML <linux-kernel@...r.kernel.org>,
	Thomas Gleixner <tglx@...utronix.de>,
	Ingo Molnar <mingo@...hat.com>,
	"H. Peter Anvin" <hpa@...or.com>
Subject: [PATCH v2] x86: fix section mismatch warning - spp_getpage()

On Fri, Aug 15, 2008 at 03:50:27PM +0200, Ingo Molnar wrote:
> 
> * Marcin Slusarz <marcin.slusarz@...il.com> wrote:
> 
> > I looked at both implementations of arch_setup_additional_pages and 
> > didn't see any call to native_set_fixmap or function which calls 
> > directly native_set_fixmap... Can you tell me what's the callchain?
> 
> the callchain would be:
> 
> [   20.116039] PM: Adding info for No Bus:vcsa1
> [   20.180039] BUG: unable to handle kernel paging request at c0833e44
> [   20.180039] IP: [<c0833e44>] native_set_fixmap+0x0/0x1d
> [   20.180039] *pde = 36f2a163 *pte = 00833162
> [   20.180039] Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
> [   20.180039] Modules linked in:
> [   20.180039]
> [   20.180039] Pid: 1, comm: init Not tainted (2.6.27-rc3-00005-g844342a-dirty #24071)
> [   20.180039] EIP: 0060:[<c0833e44>] EFLAGS: 00010216 CPU: 0
> [   20.180039] EIP is at native_set_fixmap+0x0/0x1d
> [   20.180039] EAX: 00000001 EBX: 00000001 ECX: 00000025 EDX: 3782e000
> [   20.180039] ESI: 00000000 EDI: f671c000 EBP: f7836e68 ESP: f7836e4c
> [   20.180039]  DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
> [   20.180039] Process init (pid: 1, ti=f7836000 task=f7870000 task.ti=f7836000)
> [   20.180039] Stack: c011d580 f671c034 c018bbea 00000025 00000000 00000988 f6ef2000 f7836f1c
> [   20.180039]        c01b43d6 00000003 00000008 f7836f7c f782fd10 00000003 f78b6100 08048000
> [   20.180039]        00000000 00000001 f67a2500 08050b99 08050b99 00000000 00000000 00000000
> [   20.180039] Call Trace:
> [   20.180039]  [<c011d580>] ? arch_setup_additional_pages+0x8c/0x124
> [   20.180039]  [<c018bbea>] ? try_module_get+0x8/0x2f
> [   20.180039]  [<c01b43d6>] ? load_elf_binary+0xae6/0x1108
> [   20.180039]  [<c0144c6d>] ? lock_release_holdtime+0x43/0x48
> [   20.180039]  [<c018c0c0>] ? search_binary_handler+0x92/0x1e5
> [   20.180039]  [<c01b38f0>] ? load_elf_binary+0x0/0x1108
> [   20.180039]  [<c018d2d7>] ? do_execve+0x14c/0x1d8
> [   20.180039]  [<c0101dd8>] ? sys_execve+0x2e/0x56
> [   20.180039]  [<c01030ca>] ? syscall_call+0x7/0xb
> [   20.180039]  [<c01067c8>] ? kernel_execve+0x1c/0x21
> [   20.180039]  [<c0101286>] ? run_init_process+0x1c/0x1e
> [   20.180039]  [<c0101333>] ? init_post+0xab/0xd4
> [   20.180039]  [<c0103d07>] ? kernel_thread_helper+0x7/0x10
> [   20.180039]  =======================
> [   20.180039] Code:  Bad EIP value.
> 
> 	Ingo

Thanks.
arch_setup_additional_pages -> map_compat_vdso -> __set_fixmap -> native_set_fixmap

How about this one?
---
From: Marcin Slusarz <marcin.slusarz@...il.com>
Subject: [PATCH v2] x86: fix section mismatch warning - spp_getpage()

WARNING: vmlinux.o(.text+0x17a3e): Section mismatch in reference from the function set_pte_vaddr_pud() to the function .init.text:spp_getpage()
The function set_pte_vaddr_pud() references
the function __init spp_getpage().
This is often because set_pte_vaddr_pud lacks a __init
annotation or the annotation of spp_getpage is wrong.

spp_getpage is called from __init (__init_extra_mapping) and
non __init (set_pte_vaddr_pud) functions, so it can't be __init.
Unfortunately it calls alloc_bootmem_pages which is __init,
but does it only when bootmem allocator is available (after_bootmem == 0).

Signed-off-by: Marcin Slusarz <marcin.slusarz@...il.com>
Cc: Thomas Gleixner <tglx@...utronix.de>
Cc: Ingo Molnar <mingo@...hat.com>
Cc: H. Peter Anvin <hpa@...or.com>
---
 arch/x86/mm/init_64.c |    6 +++++-
 1 files changed, 5 insertions(+), 1 deletions(-)

diff --git a/arch/x86/mm/init_64.c b/arch/x86/mm/init_64.c
index 129618c..f0923ce 100644
--- a/arch/x86/mm/init_64.c
+++ b/arch/x86/mm/init_64.c
@@ -88,7 +88,11 @@ early_param("gbpages", parse_direct_gbpages_on);
 
 int after_bootmem;
 
-static __init void *spp_getpage(void)
+/*
+ * NOTE: This function is marked __ref because it calls __init function
+ * (alloc_bootmem_pages). It's safe to do it ONLY when after_bootmem == 0.
+ */
+static __ref void *spp_getpage(void)
 {
 	void *ptr;
 
-- 
1.5.4.5

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ