Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp117765ybm; Tue, 26 May 2020 12:12:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx1uz9EbOgnoB5ElRoj7XJJevJsuCJoqOOG+QRghMXXtpTtCm0rBYv0WvSwlzUL19YpYEn1 X-Received: by 2002:a05:6402:2211:: with SMTP id cq17mr20597610edb.171.1590520371726; Tue, 26 May 2020 12:12:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590520371; cv=none; d=google.com; s=arc-20160816; b=Au6Ax9zKcwcUsuJZwSlavb67TEZNjPtGizz3roTskTkztQcJjvUbQbdfwDrrSLBiOF Wak8kk3jPXFPxQlhgDuh56+CSLBfY7kk3QWzkZsYSpr2RMAOTNKOn0aJEgfpvZsyZ9CZ 2MW6Bpg0IoPldkc39EcM0phY1XQtgfV7ZsxhCLi0mFZhBbH5DWz2mhZNy2CAg8U0DPFx I8LqCiUIkrQ866v/6XNRHO5spn2CFjAqeD5I9Oe/kZMnwn00L8VlK+zLbw3wp6D/XZFV ey7Y6jhrXstNxuszJfw/LvDlPrVnEd7gILJ5kprDMB1BMKVljn94pe+VmoJGww6YmPWF csBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=N59sFQrKCMZ+3jHKWoeFdS5AGhTUjscw81VxjSUSkUg=; b=qRjUJcfYGrJJrRrcpq+i/xugKbaajdtFSnQlcyu4aeCfowOLOp28Dk+TwbOvWjQNOq PKt9a0GI1SbP+G7BPFgxZ9AHKnE+LXpbfsQW9sS+0BpRP/2gk1HPFMwt/sXEzcD/7ibs jh9RexaYuLa4cWxTn6ZI6l8d9fA/cx5HXuMuupo+rSaJ0GisR9xqC7+Y+vLSVHB9raun fQRbJt+kC9EUPyKgMC4s8xQ8Eaet4aCA9Vj/oESfTCcIfdF8jEOaTf8PShqWDbz+Q/s7 YFRAJH6OflaYGrEvveMFByyEFcYDfLWOHSt8fLB5iCg6V2IJ3DAm3N/VnJcAY2M794Og r46A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mCJoYVeG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dt12si592423ejc.99.2020.05.26.12.12.28; Tue, 26 May 2020 12:12:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mCJoYVeG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404029AbgEZTKu (ORCPT + 99 others); Tue, 26 May 2020 15:10:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:40014 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390891AbgEZTKo (ORCPT ); Tue, 26 May 2020 15:10:44 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E1EA9208A7; Tue, 26 May 2020 19:10:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590520244; bh=uRYjAfcBLCDplyNwEKjmFODt4UceFio/YeWgljBxLy0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mCJoYVeGR1snWkBBMYg2xi3/4Z8oweuxtrwATAeB1pYxETURmbRIRkuHvxCNJidNp 7VIOIif0qNh1zwuRz9NkvSUOxxPi6yQr34nEuvRuKFXsRWaiLK9s2FHOvykm8lKELd 4/d8drdKsEru+okSFyfuoQuZoEWoYKVFnYJEX6s4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michael Ellerman , Sasha Levin Subject: [PATCH 5.4 077/111] powerpc/64s: Disable STRICT_KERNEL_RWX Date: Tue, 26 May 2020 20:53:35 +0200 Message-Id: <20200526183940.153290244@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183932.245016380@linuxfoundation.org> References: <20200526183932.245016380@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michael Ellerman [ Upstream commit 8659a0e0efdd975c73355dbc033f79ba3b31e82c ] Several strange crashes have been eventually traced back to STRICT_KERNEL_RWX and its interaction with code patching. Various paths in our ftrace, kprobes and other patching code need to be hardened against patching failures, otherwise we can end up running with partially/incorrectly patched ftrace paths, kprobes or jump labels, which can then cause strange crashes. Although fixes for those are in development, they're not -rc material. There also seem to be problems with the underlying strict RWX logic, which needs further debugging. So for now disable STRICT_KERNEL_RWX on 64-bit to prevent people from enabling the option and tripping over the bugs. Fixes: 1e0fc9d1eb2b ("powerpc/Kconfig: Enable STRICT_KERNEL_RWX for some configs") Cc: stable@vger.kernel.org # v4.13+ Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/20200520133605.972649-1-mpe@ellerman.id.au Signed-off-by: Sasha Levin --- arch/powerpc/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig index 198bbf42e398..3dc5aecdd853 100644 --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -133,7 +133,7 @@ config PPC select ARCH_HAS_PTE_SPECIAL select ARCH_HAS_MEMBARRIER_CALLBACKS select ARCH_HAS_SCALED_CPUTIME if VIRT_CPU_ACCOUNTING_NATIVE && PPC_BOOK3S_64 - select ARCH_HAS_STRICT_KERNEL_RWX if ((PPC_BOOK3S_64 || PPC32) && !HIBERNATION) + select ARCH_HAS_STRICT_KERNEL_RWX if (PPC32 && !HIBERNATION) select ARCH_HAS_TICK_BROADCAST if GENERIC_CLOCKEVENTS_BROADCAST select ARCH_HAS_UACCESS_FLUSHCACHE select ARCH_HAS_UACCESS_MCSAFE if PPC64 -- 2.25.1