Hi Again,

Le 04/09/2025 à 09:31, Christophe Leroy a écrit :
Hi Erhard,

Le 04/09/2025 à 00:44, Erhard Furtner a écrit :
Greetings!

In a conversation with Andrew about his page table check code for PowerPC he found out there seems to be a general problem of the code patching code on ppc:

 > I note that STATIC_CALL_SELFTEST seems to fail, which could be but isn't
 > necessarily related.

 > Specifically, it looks like code patching fails if the instruction being patched
 > is in an __init function, and in this case, that occurs due to
 > page_table_check_pte_clear() being inlined into ptep_clear(), which is in turn  > inlined into pte_clear_tests() in debug_vm_pgtable.c which is marked __init.
 > Very curious!

Indeed, when I enable STATIC_CALL_SELFTEST=y on my G4 the kernel fails to boot at an early stage, the OpenFirmware console showing only:

done
found display   : /pci@f0000000/ATY,AlteracParent@10/ATY,Alterac_B@1, opening...

Without STATIC_CALL_SELFTEST the kernel boots just fine.

Kernel .config attached.

With your .config, on QEMU I get the following. I will investigate.

[    0.000000] Kernel panic - not syncing: arch_static_call_transform: patching failed func_a+0x0/0x10 at 0x0 [    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.17.0- rc4-PMacG4+ #1628 PREEMPTLAZY
[    0.000000] Hardware name: PowerMac3,1 7400 0xc0209 PowerMac
[    0.000000] Call Trace:
[    0.000000] [c0dd7e60] [c0810e54] dump_stack_lvl+0x70/0x8c (unreliable)
[    0.000000] [c0dd7e80] [c004b220] vpanic+0x114/0x2e4
[    0.000000] [c0dd7eb0] [c004b45c] arch_set_bit+0x0/0x38
[    0.000000] [c0dd7f00] [c00155fc] arch_static_call_transform+0xec/0x1e8
[    0.000000] [c0dd7f30] [c0176944] __static_call_init+0x110/0x288
[    0.000000] [c0dd7f80] [c0c19ab0] static_call_init+0x4c/0x9c
[    0.000000] [c0dd7fa0] [c0c02e00] start_kernel+0x7c/0x664
[    0.000000] [c0dd7ff0] [000035d0] 0x35d0
[    0.000000] Rebooting in 40 seconds..

The problem comes from the following in arch/powerpc/include/asm/pgtable.h :

/*
 * Protection used for kernel text. We want the debuggers to be able to
 * set breakpoints anywhere, so don't write protect the kernel text
 * on platforms where such control is possible.
 */
#if defined(CONFIG_KGDB) || defined(CONFIG_XMON) || defined(CONFIG_BDI_SWITCH) || \
        defined(CONFIG_KPROBES) || defined(CONFIG_DYNAMIC_FTRACE)
#define PAGE_KERNEL_TEXT        PAGE_KERNEL_X
#else
#define PAGE_KERNEL_TEXT        PAGE_KERNEL_ROX
#endif

I don't know what the best fix is at the moment. This probably comes from the old days when we didn't have CONFIG_STRICT_KERNEL_RWX. Would it nowadays be acceptable to inconditionnally set:

        #define PAGE_KERNEL_TEXT        PAGE_KERNEL_X

It propably would, taking into account it is used exclusively on powerpc/32:

arch/powerpc/mm/book3s32/mmu.c: setibat(i++, PAGE_OFFSET + base, base, size, PAGE_KERNEL_TEXT); arch/powerpc/mm/book3s32/mmu.c: setibat(i++, PAGE_OFFSET + base, base, size, PAGE_KERNEL_TEXT); arch/powerpc/mm/pgtable_32.c: map_kernel_page(v, p, ktext ? PAGE_KERNEL_TEXT : PAGE_KERNEL);

Christophe

Reply via email to