Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7452742ybi; Mon, 22 Jul 2019 13:31:13 -0700 (PDT) X-Google-Smtp-Source: APXvYqyFWNiJ3cpV9R/9MOt/Drd2AzZr4wUznKirnSyzFhlS49j8oK6QApEQn3gYe7+0ouZTfxP7 X-Received: by 2002:a17:90a:cb97:: with SMTP id a23mr77216059pju.67.1563827473746; Mon, 22 Jul 2019 13:31:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563827473; cv=none; d=google.com; s=arc-20160816; b=L9PgmHOFyVYF2ZaFSts7kxBx+JRxwUVEhSZ3yi6G0cZCLdj8JDp9N071F5HLJWppe2 Q9PVBoeK5PkEeZ9kJ8cK1gWEBgPUD3g3tone8eqs/29mf8FxX8ANFQ/PE51XZTevpDBq zjo5jw8EiCA86wf4rucTIboJ1iYRvSihrcmThNXNTaeQtCEwqSJryXVvZRkm/H5AxFJF IPpHdPB66UUI+zFB7fuvL4BYKsynKtzc/6Ftoim1uV504sgtJ20vVySbyLe0kvEIcSJn 8UsaCP55rMLUUZCxANMpQeeeo/kxfNzdxqaXTb2l2jjkZ7cp920cjsQiWUERJvZXcd7z gMXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=qRF1cDhe0GY5daVPUx8JkxJwoqWX/6OBi7AFlI/zy/U=; b=kmhwm9b0MTIm5Ing+D7JudwMoG5haOpJe1p5vmqLMy9MU6J9TgpbGwRIBcjfSpAZSD 8kFu57yxpvD85dfBSr2aSsCHSQpXth6SeM2bmU9BPKc7mnJv6AOjCTD8dXZC42jKpbk+ 3dbke0m73r+uOD+cRB9RI78uGccgnW9vhw73Bfnfw6POP2KskYnK4Es+GRpCdksWCjM9 ShELKdRKYjboW3Wm4HkLd7fFC/TZmf0a61kPWqFAH5oPvUVt1gYaqmnwIKk6difpS9lj hWyeBdtd2PQDPjRsuq6okZ2sqh10vWqxkjSp3kHWLOZItSJzIpLFeIjuJbEBV4HQXqbP pYqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MUpHChpb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v71si10460500pgd.468.2019.07.22.13.30.57; Mon, 22 Jul 2019 13:31:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MUpHChpb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730627AbfGVQKR (ORCPT + 99 others); Mon, 22 Jul 2019 12:10:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:36578 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726236AbfGVQKR (ORCPT ); Mon, 22 Jul 2019 12:10:17 -0400 Received: from linux-8ccs (ip5f5adbdb.dynamic.kabel-deutschland.de [95.90.219.219]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 09986218EA; Mon, 22 Jul 2019 16:10:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563811816; bh=R01ar/p9nfNdG1w3JT6uL3SWLuboe6q/SUqDc3/nKNo=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=MUpHChpb5+yyjDzx0ktXfsOjbwH6UBZ43HA8zM9j4Zvy9VITkcxH2YO+xyF2pDlDX r7g1zo78lxSQH79pMyT7AQkaRwe7BTXHrNx1Pdbtl0m+UnGoy1TiJ5X06qdCf+Zuh6 cU0Zdi1nfOr9S1ZnvLiOZr7qEvmiFpkeFZDK1z0U= Date: Mon, 22 Jul 2019 18:10:07 +0200 From: Jessica Yu To: Bartosz Golaszewski Cc: Yang Yingliang , Jian Cheng , Nadav Amit , Linux Kernel Mailing List , Sekhar Nori , Kevin Hilman , David Lechner , Adam Ford Subject: Re: [v5.3-rc1 regression] Hitting a kernel BUG() when trying to load a module on DaVinci SoC Message-ID: <20190722161006.GA4297@linux-8ccs> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: X-OS: Linux linux-8ccs 4.12.14-lp150.12.28-default x86_64 User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org +++ Bartosz Golaszewski [22/07/19 14:12 +0200]: >Hi, > >with v5.3-rc1 I'm hitting the following BUG() when trying to load the >gpio-backlight module: > >kernel BUG at kernel/module.c:1919! >Internal error: Oops - BUG: 0 [#1] PREEMPT ARM >Modules linked in: >CPU: 0 PID: 1 Comm: systemd Tainted: G W >5.2.0-rc2-00005-g7dabaa5ce05a #19 >Hardware name: DaVinci DA850/OMAP-L138/AM18x EVM >PC is at frob_text.constprop.16+0x2c/0x34 >LR is at load_module+0x1888/0x21b4 >pc : [] lr : [] psr: 20000013 >sp : c6837e58 ip : c6b4fa80 fp : bf00574c >r10: c0601008 r9 : bf005740 r8 : c0493e38 >r7 : c00807f8 r6 : 00000000 r5 : 00000001 r4 : c6837f38 >r3 : 00000fff r2 : bf000000 r1 : 00004b80 r0 : bf005818 >Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none >Control: 0005317f Table: c6b78000 DAC: 00000051 >Process systemd (pid: 1, stack limit = 0x(ptrval)) >Stack: (0xc6837e58 to 0xc6838000) >7e40: bf005740 c6492a90 >7e60: 00000001 c6bf5788 00000003 c6837f38 bf0058c0 bf0058a8 bf00a495 c0493e38 >7e80: 00000000 c05368c0 00000001 00000000 c0580030 c0574b28 00000000 00000000 >7ea0: 00000000 00000000 00000000 00000000 6e72656b 00006c65 00000000 00000000 >7ec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 >7ee0: 00000000 00000000 00000000 aefb2bb8 7fffffff c0601008 00000000 00000004 >7f00: b6cee714 c00091e4 c6836000 00000000 005bc668 c00847b0 7fffffff 00000000 >7f20: 00000003 00000000 0000b2d0 c884e000 0000b2d0 00000000 c8852dcb c88533a0 >7f40: c884e000 0000b2d0 c8858cb8 c8858b34 c88568d4 000058c0 00006190 000023b8 >7f60: 00006713 00000000 00000000 00000000 000023a8 00000024 00000025 00000019 >7f80: 0000001d 00000011 00000000 aefb2bb8 00000000 00000000 00000000 00000000 >7fa0: 0000017b c0009000 00000000 00000000 00000004 b6cee714 00000000 00000000 >7fc0: 00000000 00000000 00000000 0000017b 00000000 00000000 00000001 005bc668 >7fe0: be907b00 be907af0 b6ce66b0 b6c3fac0 60000010 00000004 00000000 00000000 >[] (frob_text.constprop.16) from [] >(load_module+0x1888/0x21b4) >[] (load_module) from [] (sys_finit_module+0xbc/0xdc) >[] (sys_finit_module) from [] (ret_fast_syscall+0x0/0x50) >Exception stack(0xc6837fa8 to 0xc6837ff0) >7fa0: 00000000 00000000 00000004 b6cee714 00000000 00000000 >7fc0: 00000000 00000000 00000000 0000017b 00000000 00000000 00000001 005bc668 >7fe0: be907b00 be907af0 b6ce66b0 b6c3fac0 >Code: e1a01621 e1a00002 eafe4531 e7f001f2 (e7f001f2) >---[ end trace 2cbefb0005882c52 ]--- >Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b >---[ end Kernel panic - not syncing: Attempted to kill init! >exitcode=0x0000000b ]--- > >I bisected it to commit 06bd260e836d ("modules: fix BUG when load >module with rodata=n") with commit 7dabaa5ce05a ("modules: fix compile >error if don't have strict module rwx") on top to make it build. > >Let me know if you need me to provide more info. > >Best regards, >Bartosz Golaszewski Hi Bartosz, Thanks for reporting this, I was able to reproduce this on qemu. This is due to hitting the BUG_ON() in frob_text() due to layout->base and/or layout->text_size not being page-aligned. These values are always page-aligned when CONFIG_STRICT_MODULE_RWX=y, but in commit 2eef1399a86 ("modules: fix BUG when load module with rodata=n"), the frob_text()+set_memory_x() calls got moved *outside* of the STRICT_MODULE_RWX block since some arches (like x86 and arm64) allocate non-executable module memory via module_alloc(), so naturally the module text needed to be made executable at a later stage of load_module(), regardless of whether STRICT_MODULE_RWX is set or not. In your case, you must've had CONFIG_STRICT_MODULE_RWX=n and so we were calling frob_text() with non-page-aligned values, triggering the BUG_ON(). In any case, could you please try and see if the following patch fixes the issue for you? diff --git a/kernel/module.c b/kernel/module.c index 5933395af9a0..cd8df516666d 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -64,14 +64,9 @@ /* * Modules' sections will be aligned on page boundaries - * to ensure complete separation of code and data, but - * only when CONFIG_STRICT_MODULE_RWX=y + * to ensure complete separation of code and data */ -#ifdef CONFIG_STRICT_MODULE_RWX # define debug_align(X) ALIGN(X, PAGE_SIZE) -#else -# define debug_align(X) (X) -#endif /* If this is set, the section belongs in the init part of the module */ #define INIT_OFFSET_MASK (1UL << (BITS_PER_LONG-1))