FS#47849 - [linux] x86/mm: Found insecure W+X mapping at address

Attached to Project: Arch Linux
Opened by Tomasz Przybył (FadeMind) - Thursday, 21 January 2016, 19:33 GMT
Last edited by Tobias Powalowski (tpowa) - Monday, 01 February 2016, 07:04 GMT
Task Type Bug Report
Category Kernel
Status Closed
Assigned To Tobias Powalowski (tpowa)
Thomas Bächler (brain0)
Architecture All
Severity Low
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

Kernel in 4.4 series is affected bug x86/mm: Found insecure W+X mapping at addres. It is most recent issue reported on another OS'es:
https://lkml.org/lkml/2016/1/19/134
http://www.gossamer-threads.com/lists/linux/kernel/2347570
http://www.spinics.net/lists/kernel/msg2167658.html

On my setup I had:

[ 0.863245] Loading compiled-in X.509 certificates
[ 0.867024] zswap: loaded using pool lz4/zbud
[ 0.867704] Magic number: 0:524:41
[ 0.867846] rtc_cmos 00:02: setting system clock to 2016-01-21 19:02:48 UTC (1453402968)
[ 0.868154] PM: Hibernation image not present or could not be loaded.
[ 0.870003] Freeing unused kernel memory: 1228K (ffffffff81b02000 - ffffffff81c35000)
[ 0.870006] Write protecting the kernel read-only data: 10240k
[ 0.871048] Freeing unused kernel memory: 2004K (ffff88000160b000 - ffff880001800000)
[ 0.872169] Freeing unused kernel memory: 220K (ffff8800019c9000 - ffff880001a00000)
[ 0.887927] ------------[ cut here ]------------
[ 0.887934] WARNING: CPU: 1 PID: 1 at arch/x86/mm/dump_pagetables.c:225 note_page+0x5f0/0x790()
[ 0.887937] x86/mm: Found insecure W+X mapping at address ffffffffa0005000/0xffffffffa0005000
[ 0.887939] Modules linked in: lz4 lz4_compress
[ 0.887947] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G A 4.4.0-1-mainline #1
[ 0.887949] Hardware name: ASUSTeK COMPUTER INC. K55VM/K55VM, BIOS K55VM.211 09/11/2012
[ 0.887952] 0000000000000000 000000007164ed01 ffff880225ddbd48 ffffffff81306d0f
[ 0.887956] ffff880225ddbd90 ffff880225ddbd80 ffffffff81080565 ffff880225ddbe90
[ 0.887960] 0000000000000000 0000000000000004 0000000000000000 0000000000000000
[ 0.887964] Call Trace:
[ 0.887972] [<ffffffff81306d0f>] dump_stack+0x5e/0x7f
[ 0.887977] [<ffffffff81080565>] warn_slowpath_common+0x95/0xd0
[ 0.887982] [<ffffffff8108060b>] warn_slowpath_fmt+0x6b/0x90
[ 0.887985] [<ffffffff81074fe0>] note_page+0x5f0/0x790
[ 0.887989] [<ffffffff81075493>] ptdump_walk_pgd_level_core+0x313/0x460
[ 0.887993] [<ffffffff8107563a>] ptdump_walk_pgd_level_checkwx+0x2a/0x30
[ 0.887998] [<ffffffff8106a752>] mark_rodata_ro+0x102/0x110
[ 0.888003] [<ffffffff815f6020>] ? rest_init+0xa0/0xa0
[ 0.888007] [<ffffffff815f6050>] kernel_init+0x30/0xf0
[ 0.888012] [<ffffffff8160360f>] ret_from_fork+0x3f/0x70
[ 0.888017] [<ffffffff815f6020>] ? rest_init+0xa0/0xa0
[ 0.888019] ---[ end trace 18f38777e281f4d1 ]---
[ 0.888056] x86/mm: Checked W+X mappings: FAILED, 3 W+X pages found.


After CLEAN POWER ON boot fine (not restart) .
This task depends upon

Closed by  Tobias Powalowski (tpowa)
Monday, 01 February 2016, 07:04 GMT
Reason for closing:  Fixed
Additional comments about closing:  4.4.1-1
Comment by Alexander Schnaidt (Namarrgon) - Monday, 25 January 2016, 00:07 GMT
This is harmless and comes from the new CONFIG_DEBUG_WX option being enabled.

https://lkml.org/lkml/2015/12/14/670

Loading...