[Bug 215621] New: Warning: Unable to mark rodata read only on this CPU. (PPC970MP)
bugzilla-daemon at kernel.org
bugzilla-daemon at kernel.org
Sat Feb 19 12:04:16 AEDT 2022
https://bugzilla.kernel.org/show_bug.cgi?id=215621
Bug ID: 215621
Summary: Warning: Unable to mark rodata read only on this CPU.
(PPC970MP)
Product: Platform Specific/Hardware
Version: 2.5
Kernel Version: 5.17-rc4
Hardware: PPC-64
OS: Linux
Tree: Mainline
Status: NEW
Severity: normal
Priority: P1
Component: PPC-64
Assignee: platform_ppc-64 at kernel-bugs.osdl.org
Reporter: erhard_f at mailbox.org
Regression: No
Created attachment 300482
--> https://bugzilla.kernel.org/attachment.cgi?id=300482&action=edit
dmesg (5.17-rc4, PowerMac G5 11,2)
STRICT_MODULE_RWX is enabled in kernel but it does not seem to work on my
PowerMac G5 11,2.
Kernel dmesg says:
[...]
Freeing unused kernel image (initmem) memory: 3968K
Warning: Unable to mark rodata read only on this CPU.
rodata_test: test data was not read only
[...]
# lscpu
Architecture: ppc64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Big Endian
CPU(s): 2
On-line CPU(s) list: 0,1
Model name: PPC970MP, altivec supported
Model: 1.1 (pvr 0044 0101)
Thread(s) per core: 1
Core(s) per socket: 2
Socket(s): 1
CPU max MHz: 2300.0000
CPU min MHz: 1150.0000
Caches (sum of all):
L1d: 64 KiB (2 instances)
L1i: 128 KiB (2 instances)
L2: 2 MiB (2 instances)
NUMA:
NUMA node(s): 1
NUMA node0 CPU(s): 0,1
Vulnerabilities:
Itlb multihit: Not affected
L1tf: Vulnerable
Mds: Not affected
Meltdown: Vulnerable
Spec store bypass: Vulnerable
Spectre v1: Mitigation; __user pointer sanitization
Spectre v2: Vulnerable
Srbds: Not affected
Tsx async abort: Not affected
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the Linuxppc-dev
mailing list