Le 23/05/2019 à 19:27, Aaro Koskinen a écrit :
Hi,

On Thu, May 23, 2019 at 07:33:38AM +0200, Christophe Leroy wrote:
Ok, the Oops confirms that the error is due to executing the kexec control
code which is located outside the kernel text area.

My yesterday's proposed change doesn't work because on book3S/32, NX
protection is based on setting segments to NX, and using IBATs for kernel
text.

Can you try the patch I sent out a few minutes ago ?
(https://patchwork.ozlabs.org/patch/1103827/)

It now crashes with "BUG: Unable to handle kernel instruction fetch"
and the faulting address is 0xef13a000.


Ok.

Can you try with both changes at the same time, ie the mtsrin(...) and the change_page_attr() ?

I suspect that allthough the HW is not able to check EXEC flag, the SW will check it before loading the hash entry.

Christophe

Reply via email to