From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9F572C433DF for ; Mon, 29 Jun 2020 21:23:52 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 81B52208B6 for ; Mon, 29 Jun 2020 21:23:52 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390770AbgF2VXv (ORCPT ); Mon, 29 Jun 2020 17:23:51 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:16255 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728868AbgF2SvA (ORCPT ); Mon, 29 Jun 2020 14:51:00 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 49wPzP5LWHz9tyrG; Mon, 29 Jun 2020 13:15:13 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id OXuXuozMG7Iv; Mon, 29 Jun 2020 13:15:13 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 49wPzP4K8pz9tyqw; Mon, 29 Jun 2020 13:15:13 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 35C818B79E; Mon, 29 Jun 2020 13:15:20 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id 9LehT2Iwe4Is; Mon, 29 Jun 2020 13:15:20 +0200 (CEST) Received: from pc16570vm.idsi0.si.c-s.fr (po15451.idsi0.si.c-s.fr [172.25.230.105]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 0AFBA8B799; Mon, 29 Jun 2020 13:15:20 +0200 (CEST) Received: by pc16570vm.idsi0.si.c-s.fr (Postfix, from userid 0) id C32AF65B29; Mon, 29 Jun 2020 11:15:19 +0000 (UTC) Message-Id: From: Christophe Leroy Subject: [PATCH v2 0/6] powerpc/32s: Allocate modules outside of vmalloc space for STRICT_KERNEL_RWX To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Mon, 29 Jun 2020 11:15:19 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On book3s32 (hash), exec protection is set per 256Mb segments with NX bit. Instead of clearing NX bit on vmalloc space when CONFIG_MODULES is selected, allocate modules in a dedicated segment (0xb0000000-0xbfffffff by default). This allows to keep exec protection on vmalloc space while allowing exec on modules. v2: - Removed the two patches that fix ptdump. Will submitted independently - Only changing the user/kernel boundary for PPC32 now. - Reordered the patches inside the series. Christophe Leroy (6): powerpc/lib: Prepare code-patching for modules allocated outside vmalloc space powerpc: Use MODULES_VADDR if defined powerpc/32s: Only leave NX unset on segments used for modules powerpc/32: Set user/kernel boundary at TASK_SIZE instead of PAGE_OFFSET powerpc/32s: Kernel space starts at TASK_SIZE powerpc/32s: Use dedicated segment for modules with STRICT_KERNEL_RWX arch/powerpc/Kconfig | 1 + arch/powerpc/include/asm/book3s/32/pgtable.h | 15 +++++---------- arch/powerpc/include/asm/page.h | 4 +++- arch/powerpc/kernel/head_32.S | 12 ++++++------ arch/powerpc/kernel/module.c | 11 +++++++++++ arch/powerpc/lib/code-patching.c | 2 +- arch/powerpc/mm/book3s32/hash_low.S | 2 +- arch/powerpc/mm/book3s32/mmu.c | 17 ++++++++++++++--- arch/powerpc/mm/kasan/kasan_init_32.c | 6 ++++++ arch/powerpc/mm/ptdump/ptdump.c | 16 ++++++++++++++-- 10 files changed, 62 insertions(+), 24 deletions(-) -- 2.25.0