Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3768292imm; Tue, 17 Jul 2018 09:58:02 -0700 (PDT) X-Google-Smtp-Source: AAOMgpers0L9gx0H0T2NUHUWJEXnWRm0fB1KZtnpUSfV33eDpe6fRJnlyZ/mpEb2CyOsLcdMO7g8 X-Received: by 2002:a62:c4c3:: with SMTP id h64-v6mr1464580pfk.39.1531846682798; Tue, 17 Jul 2018 09:58:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531846682; cv=none; d=google.com; s=arc-20160816; b=f8pGkFwzD1YrNfUgkVzsyETnk41aLSoxKF575YWRkcdP4rG6RLdYBnyw2f569gYG/T WS+0uC1fYTn88VPOGp6EIBuoiRksos9XOYFNxp0wyB7cDa4aRvB0SFDE4+xS3Fd7HlWj dKD3570IVAuqSlA8TiQfPn32c1v/0Z9gOMlc5T7Yo0lTaGII7kt+16PSYbmhzthAgvtK ohfTvCeRqrZ8BmJFrhQUT6r8OeJSafTVtjXn50K4wjQ3mf5w3jaTRItKE3rT4UIa3hWF 3Id5Qulykvgi/xTcrLgw3TWuH41/IyBOOby7TCadpio+wrVwxO1KOLbqkER/IW7B7Uu3 jTlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=GUv9pJRD93Vymnq15vQygcGNtGE6VNVBVbT5uNOiWCU=; b=gldRl4E7QH9Sdgkuh9uRU2JVVIWqI1lffuNylrb9jhpRP1ta8AU+S3EYOSzlSCLADN +V/6zAvluSPz6NZ2v9MzV4YePTryut5YP5R3a915PUiNzF4uhO+/s3/odf4SOvmqE1hs xuDX3q+YV9XEH1f5PWR0xCoxu8OIUb1zsH3gQCtzzDQOPZQSqrOFDA+pNnn0EDp9lZZL ReHYQQF9BSyO4yJXkLkfKotTlVp+/+OD3BKKqZ0IfvPVSs04jG2kulcw1dESEcElUtoS E2V1L4Sd9WQ7puK1nQaV+tplOJEF+oh462+74N/iKPy3ns6r3mJUXS9XLgI3qrubX8fs Lz7Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q13-v6si1224052plr.220.2018.07.17.09.57.47; Tue, 17 Jul 2018 09:58:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729743AbeGQRap (ORCPT + 99 others); Tue, 17 Jul 2018 13:30:45 -0400 Received: from foss.arm.com ([217.140.101.70]:49912 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729689AbeGQRao (ORCPT ); Tue, 17 Jul 2018 13:30:44 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id EC3B27A9; Tue, 17 Jul 2018 09:57:11 -0700 (PDT) Received: from [10.1.206.34] (melchizedek.cambridge.arm.com [10.1.206.34]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1BD193F318; Tue, 17 Jul 2018 09:57:07 -0700 (PDT) Subject: Re: [PATCH v11 09/15] arm64: kexec_file: load initrd and device-tree To: AKASHI Takahiro Cc: catalin.marinas@arm.com, will.deacon@arm.com, dhowells@redhat.com, vgoyal@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net, dyoung@redhat.com, bhe@redhat.com, arnd@arndb.de, ard.biesheuvel@linaro.org, bhsharma@redhat.com, kexec@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org References: <20180711074203.3019-1-takahiro.akashi@linaro.org> <20180711074203.3019-10-takahiro.akashi@linaro.org> From: James Morse Message-ID: Date: Tue, 17 Jul 2018 17:57:06 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <20180711074203.3019-10-takahiro.akashi@linaro.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Akashi, On 11/07/18 08:41, AKASHI Takahiro wrote: > load_other_segments() is expected to allocate and place all the necessary > memory segments other than kernel, including initrd and device-tree > blob (and elf core header for crash). > While most of the code was borrowed from kexec-tools' counterpart, > users may not be allowed to specify dtb explicitly, instead, the dtb > presented by the original boot loader is reused. > > arch_kimage_kernel_post_load_cleanup() is responsible for freeing arm64- > specific data allocated in load_other_segments(). > diff --git a/arch/arm64/kernel/machine_kexec_file.c b/arch/arm64/kernel/machine_kexec_file.c > index c38a8048ed00..ca00681c25c6 100644 > --- a/arch/arm64/kernel/machine_kexec_file.c > +++ b/arch/arm64/kernel/machine_kexec_file.c > +int arch_kimage_file_post_load_cleanup(struct kimage *image) > +{ > + vfree(image->arch.dtb_buf); > + image->arch.dtb_buf = NULL; > + > + return kexec_image_post_load_cleanup_default(image); > +} A nit from sparse: | warning: symbol 'arch_kimage_file_post_load_cleanup' was not declared Can we add a definition for this to a header file somewhere. asm/kexec.h is probably the best bet. > +static int setup_dtb(struct kimage *image, > + unsigned long initrd_load_addr, unsigned long initrd_len, > + char *cmdline, unsigned long cmdline_len, > + char **dtb_buf, size_t *dtb_buf_len) > +{ > + /* add initrd-* */ > + if (initrd_load_addr) { > + value = cpu_to_fdt64(initrd_load_addr); > + ret = fdt_setprop_u64(buf, nodeoffset, "linux,initrd-start", > + value); fdt_setprop_u64() already does the endian conversion. From scripts/dtc/libfdt/libfdt.h, its implemented as: | fdt64_t tmp = cpu_to_fdt64(val); | return fdt_setprop(fdt, nodeoffset, name, &tmp, sizeof(tmp)); (I think you were using setprop directly in an older version) This leads to: | ------------[ cut here ]------------ | initrd not fully accessible via the linear mapping -- please check your | bootloader ... | WARNING: CPU: 0 PID: 0 at ../arch/arm64/mm/init.c:429 | arm64_memblock_init+0x150/0x3d8 | Modules linked in: | CPU: 0 PID: 0 Comm: swapper Not tainted 4.18.0-rc5-00015-g95b5c843d0da #10150 | Hardware name: AMD Seattle (Rev.B0) Development Board (Overdrive) (DT) | pstate: 60000085 (nZCv daIf -PAN -UAO) | pc : arm64_memblock_init+0x150/0x3d8 | lr : arm64_memblock_init+0x150/0x3d8 | Call trace: | arm64_memblock_init+0x150/0x3d8 | setup_arch+0x1c0/0x510 | start_kernel+0x80/0x418 | random: get_random_bytes called from print_oops_end_marker+0x4c/0x68 with | crng_init=0 | ---[ end trace 0000000000000000 ]--- Which is caused by the values being miles outside ram due to the extra byte swapping: | morse@frikadeller:~$ sudo dtc -I dtb -O dts /sys/firmware/fdt | grep initrd | linux,initrd-end = <0x900b6c05 0x80000000>; | linux,initrd-start = <0x906a04 0x80000000>; With the two extra cpu_to_fdt64() calls removed: Reviewed-by: James Morse Thanks, James