Received: by 10.223.185.116 with SMTP id b49csp3515569wrg; Tue, 13 Feb 2018 03:38:54 -0800 (PST) X-Google-Smtp-Source: AH8x2251Ba07ZpzgbuSyZEj/aEq2ivdsnylXcd8G8r7a5Fz2GaNxHeTGoD/DGkauLxiJ03I4/asg X-Received: by 2002:a17:902:2c83:: with SMTP id n3-v6mr879782plb.227.1518521934604; Tue, 13 Feb 2018 03:38:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518521934; cv=none; d=google.com; s=arc-20160816; b=xmIBC5DGHDrnL7SMbrQoRgrW3sY5UEcreWOMmczqm0q8YpFYDyPhvW2mlBdvY91LI7 szX+fcuwHINupjVed+X+bGpimsEsPP1hUuv0QsJs/MIl0XdbMwKIxXMVy4HET84bpCV2 PxBIyQVY9v/JM+gTJ9dQRwp6LDjsCvqmF7OW3uGQBiKm+rYXX0FRGsHycPmYH7+Ehl8I YSPp5N80N/b7+d7hN5JMVLuBVR5wYhfRCqWyKNDPEudVIakQ/twmJlg5Iq1+ovUw9xf/ RBZtJF9CiXOyBVaMwtiDycexkKnIcD1ta9oieWt87h+jNULWGumq7+QkxuKc9MS+SnaC PX1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=d+gdAd8G+za/VRSUfwxFmPKbW7yT4dO0KJ0sDVKeInI=; b=pwIInTuoeCHiGkEjuwONo25UwmAmv4rmURqxcTQhGjdNzWJFbGt638OU3VHgTk+ekl qb47mKA5vH0uqQD79vACCEViomWgjrpw6D6Raz8VPDhz7bGQrvAA0GPZ/iJ20QRm1Q6e p6GZtX2eMibwXxyR5RTN0yUp+B3kiiS1q5nzwP9keiC4JJI+rjXALal9iACXP/UEkGcU BB40Xye/4ms4biKQV1Tyr/laVKJfGUj2Y+UCOQwRla+1aT8OPw7SPOGz1TI1l86f0wvY gbDpkSD4mC+pm15H2FLjX/3nAgfScgND3LookHQgFqfNhOp2to4uhbrXnNebo+qzwTQN AJ+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l1si4685510pgn.324.2018.02.13.03.38.40; Tue, 13 Feb 2018 03:38:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934717AbeBMLhe (ORCPT + 99 others); Tue, 13 Feb 2018 06:37:34 -0500 Received: from 9pmail.ess.barracuda.com ([64.235.150.225]:52171 "EHLO 9pmail.ess.barracuda.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934078AbeBMLhd (ORCPT ); Tue, 13 Feb 2018 06:37:33 -0500 Received: from MIPSMAIL01.mipstec.com (mailrelay.mips.com [12.201.5.28]) by mx27.ess.sfj.cudaops.com (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NO); Tue, 13 Feb 2018 11:36:02 +0000 Received: from [10.150.130.83] (10.150.130.83) by MIPSMAIL01.mipstec.com (10.20.43.31) with Microsoft SMTP Server (TLS) id 14.3.361.1; Tue, 13 Feb 2018 03:30:57 -0800 Subject: Re: [PATCH v2 05/15] MIPS: KASLR: Drop relocatable fixup from reservation_init To: Serge Semin , , , , , , , , , CC: , , , , , , , References: <20180117222312.14763-1-fancer.lancer@gmail.com> <20180202035458.30456-1-fancer.lancer@gmail.com> <20180202035458.30456-6-fancer.lancer@gmail.com> From: Matt Redfearn Message-ID: <25ae5315-0386-4709-ec73-d265ed342b58@mips.com> Date: Tue, 13 Feb 2018 11:30:53 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: <20180202035458.30456-6-fancer.lancer@gmail.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.150.130.83] X-BESS-ID: 1518521760-637137-26795-167917-12 X-BESS-VER: 2018.1-r1801291959 X-BESS-Apparent-Source-IP: 12.201.5.28 X-BESS-Outbound-Spam-Score: 0.00 X-BESS-Outbound-Spam-Report: Code version 3.2, rules version 3.2.2.188374 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------- 0.00 BSF_BESS_OUTBOUND META: BESS Outbound X-BESS-Outbound-Spam-Status: SCORE=0.00 using account:ESS59374 scores of KILL_LEVEL=7.0 tests=BSF_BESS_OUTBOUND X-BESS-BRTS-Status: 1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Serge, On 02/02/18 03:54, Serge Semin wrote: > From: Matt Redfearn > > A recent change ("MIPS: memblock: Discard bootmem initialization") > removed the reservation of all memory below the kernel's _end symbol in > bootmem. This makes the call to free_bootmem unnecessary, since the > memory region is no longer marked reserved. > > Additionally, ("MIPS: memblock: Print out kernel virtual mem > layout") added a display of the kernel's virtual memory layout, so > printing the relocation information at this point is redundant. > > Remove this section of code. > > Signed-off-by: Matt Redfearn Missing your SoB. I think this change should go after you introduce the new mechanism, i.e. after "MIPS: memblock: Print out kernel virtual mem layout", which should probably go nearer the start of the series. Thanks, Matt > --- > arch/mips/kernel/setup.c | 23 ----------------------- > 1 file changed, 23 deletions(-) > > diff --git a/arch/mips/kernel/setup.c b/arch/mips/kernel/setup.c > index b5fcacf71b3f..cf3674977170 100644 > --- a/arch/mips/kernel/setup.c > +++ b/arch/mips/kernel/setup.c > @@ -528,29 +528,6 @@ static void __init bootmem_init(void) > memory_present(0, start, end); > } > > -#ifdef CONFIG_RELOCATABLE > - /* > - * The kernel reserves all memory below its _end symbol as bootmem, > - * but the kernel may now be at a much higher address. The memory > - * between the original and new locations may be returned to the system. > - */ > - if (__pa_symbol(_text) > __pa_symbol(VMLINUX_LOAD_ADDRESS)) { > - unsigned long offset; > - extern void show_kernel_relocation(const char *level); > - > - offset = __pa_symbol(_text) - __pa_symbol(VMLINUX_LOAD_ADDRESS); > - free_bootmem(__pa_symbol(VMLINUX_LOAD_ADDRESS), offset); > - > -#if defined(CONFIG_DEBUG_KERNEL) && defined(CONFIG_DEBUG_INFO) > - /* > - * This information is necessary when debugging the kernel > - * But is a security vulnerability otherwise! > - */ > - show_kernel_relocation(KERN_INFO); > -#endif > - } > -#endif > - > /* > * Reserve initrd memory if needed. > */ >