Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp3752125imm; Mon, 8 Oct 2018 08:59:06 -0700 (PDT) X-Google-Smtp-Source: ACcGV6329lTPU99EvfbFmGEW00IHGra/9LXNWpWGZOakdzlriMkK0iFpf0M+pEnXCXK4o/84dET2 X-Received: by 2002:a62:7604:: with SMTP id r4-v6mr26006225pfc.230.1539014346358; Mon, 08 Oct 2018 08:59:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539014346; cv=none; d=google.com; s=arc-20160816; b=rZA143wjaiMBSRZbx+eOY6v5gSm6o1bTPYa36O85QWT4oE4enYGiIF0xc5c5CYi5Rb qO9TMGuz07hdB+bVtewxEhfCWnlMV9pjxsGKpqEUs/Q5N4erCegWms7yvnO8vXZXyBS7 VK4N8CTG9AFjKE/y/twCS49DtTyLkFyhxC+Ja7iwL1KHQanyM2EVMcm6jCIn8+rCzXSQ OoONiu9kNsMRJgYGPOxZ+8/AL+kNoo+wZfJkljHcI0pFBxvd7ptURUfDOZVJi+u6+26x 8hznepJgGo60xxxwclmtL/FdUaNNS76YyT9L1gqZ5SwVzQe7OoJPLfYbf3X9EWvlEliz uPxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=0e6NjVL7/63ANAUK49zx8sY6KGhwepbRC6Yei7uQCQk=; b=CpRkER0eJ9q8OEhO781JlD77DcFVWaG/3rYAEOsBxg6x0tEmZ8LEP4Na6CleEeuX6E Azk40lB6/SpUkYAKFFL8bQJrk0AkKMb9oCGNnviCl/azD3KK34rCwiPLvH6taIiXuRUD tRF/APvpMFeScvs1EL0L1gc+0LWqxY5YjAb0TBM1dWAme0MEsDHIzKfpT7O6pHMjIk8H 53ImZWvlwkrnIvgTLfdLa7TBlV7ZVuwuablxR4s5CwEGrJndiyVl+RkiIqj/q/thG5+9 iwsesuWHwonLwbEWCMJmgVAoD7HA2407blj3rQRlY+pniLgrdTGTl5WhQTB69tHyFsLA cKfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lVVMB6Wn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s130-v6si21546755pfc.81.2018.10.08.08.58.51; Mon, 08 Oct 2018 08:59:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lVVMB6Wn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726789AbeJHXKy (ORCPT + 99 others); Mon, 8 Oct 2018 19:10:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:46530 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726461AbeJHXKx (ORCPT ); Mon, 8 Oct 2018 19:10:53 -0400 Received: from mail-ed1-f41.google.com (mail-ed1-f41.google.com [209.85.208.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 581AC2145D; Mon, 8 Oct 2018 15:58:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539014308; bh=6bPHYSqqcTTnoh7EbtIq2dGvzt+kn8l1/Vy8N6/2ZE0=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=lVVMB6WnhtlOrKU6Uam3oRjjnjKl7hQgp4eJobLHfX0B+2NTyqXrJyLN+ZsGK4TVx mPEnH41p/ng5qwAzBtcskGhhOLcq4Xt55BQkyOK2V+MNc8ejNbbEj7B/lEd/GErRtX /UDiy8+o3rytV/6c6d4lJaukIkFHtGjLXqdHLnGg= Received: by mail-ed1-f41.google.com with SMTP id z21-v6so13637646edb.11; Mon, 08 Oct 2018 08:58:28 -0700 (PDT) X-Gm-Message-State: ABuFfoi1/Cij/2vkgHV9ibgE15LsWDFioEP3rwjiVGsJ2C8++LFMRb2c o4VbdV1jtLfZKnID11iG8NQXvxa4O97GYojTxGU= X-Received: by 2002:a17:906:7384:: with SMTP id f4-v6mr23743432ejl.8.1539014306619; Mon, 08 Oct 2018 08:58:26 -0700 (PDT) MIME-Version: 1.0 References: <1538712767-30394-1-git-send-email-frowand.list@gmail.com> <1538712767-30394-10-git-send-email-frowand.list@gmail.com> In-Reply-To: <1538712767-30394-10-git-send-email-frowand.list@gmail.com> From: Alan Tull Date: Mon, 8 Oct 2018 10:57:50 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 09/16] of: overlay: validate overlay properties #address-cells and #size-cells To: Frank Rowand Cc: Rob Herring , Pantelis Antoniou , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Moritz Fischer , linux-kernel , linuxppc-dev , "open list:OPEN FIRMWARE AND FLATTENED DEVICE TREE BINDINGS" , linux-fpga@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 4, 2018 at 11:14 PM wrote: > > From: Frank Rowand > > If overlay properties #address-cells or #size-cells are already in > the live devicetree for any given node, then the values in the > overlay must match the values in the live tree. Hi Frank, I'm starting some FPGA testing on this patchset applied to v4.19-rc7. That applied cleanly; if that's not the best base to test against, please let me know. On a very simple overlay, I'm seeing this patch's warning catching things other than #address-cells or #size-cells. I'm just getting started looking at this, will spend time understanding this better and I'll test other overlays. The warnings were: Applying dtbo: socfpga_overlay.dtb [ 33.117881] fpga_manager fpga0: writing soc_system.rbf to Altera SOCFPGA FPGA Manager [ 33.575223] OF: overlay: WARNING: add_changeset_property(), memory leak will occur if overlay removed. Property: /soc/base-fpga-region/firmware-name [ 33.588584] OF: overlay: WARNING: add_changeset_property(), memory leak will occur if overlay removed. Property: /soc/base-fpga-region/fpga-bridges [ 33.601856] OF: overlay: WARNING: add_changeset_property(), memory leak will occur if overlay removed. Property: /soc/base-fpga-region/ranges Here's part of that overlay including the properties it's complaining about: /dts-v1/; /plugin/; / { fragment@0 { target = <&base_fpga_region>; #address-cells = <1>; #size-cells = <1>; __overlay__ { #address-cells = <1>; #size-cells = <1>; firmware-name = "soc_system.rbf"; fpga-bridges = <&fpga_bridge1>; ranges = <0x20000 0xff200000 0x100000>, <0x0 0xc0000000 0x20000000>; gpio@10040 { so on... By the way, I didn't get any warnings when I subsequently removed this overlay. Alan > > If the properties are already in the live tree then there is no > need to create a changeset entry to add them since they must > have the same value. This reduces the memory used by the > changeset and eliminates a possible memory leak. This is > verified by 12 fewer warnings during the devicetree unittest, > as the possible memory leak warnings about #address-cells and > > Signed-off-by: Frank Rowand > --- > drivers/of/overlay.c | 38 +++++++++++++++++++++++++++++++++++--- > 1 file changed, 35 insertions(+), 3 deletions(-) > > diff --git a/drivers/of/overlay.c b/drivers/of/overlay.c > index 29c33a5c533f..e6fb3ffe9d93 100644 > --- a/drivers/of/overlay.c > +++ b/drivers/of/overlay.c > @@ -287,7 +287,12 @@ static struct property *dup_and_fixup_symbol_prop( > * @target may be either in the live devicetree or in a new subtree that > * is contained in the changeset. > * > - * Some special properties are not updated (no error returned). > + * Some special properties are not added or updated (no error returned): > + * "name", "phandle", "linux,phandle". > + * > + * Properties "#address-cells" and "#size-cells" are not updated if they > + * are already in the live tree, but if present in the live tree, the values > + * in the overlay must match the values in the live tree. > * > * Update of property in symbols node is not allowed. > * > @@ -300,6 +305,7 @@ static int add_changeset_property(struct overlay_changeset *ovcs, > { > struct property *new_prop = NULL, *prop; > int ret = 0; > + bool check_for_non_overlay_node = false; > > if (!of_prop_cmp(overlay_prop->name, "name") || > !of_prop_cmp(overlay_prop->name, "phandle") || > @@ -322,13 +328,39 @@ static int add_changeset_property(struct overlay_changeset *ovcs, > if (!new_prop) > return -ENOMEM; > > - if (!prop) > + if (!prop) { > + > + check_for_non_overlay_node = true; > ret = of_changeset_add_property(&ovcs->cset, target->np, > new_prop); > - else > + > + } else if (!of_prop_cmp(prop->name, "#address-cells")) { > + > + if (prop->length != 4 || new_prop->length != 4 || > + *(u32 *)prop->value != *(u32 *)new_prop->value) > + pr_err("ERROR: overlay and/or live tree #address-cells invalid in node %pOF\n", > + target->np); > + > + } else if (!of_prop_cmp(prop->name, "#size-cells")) { > + > + if (prop->length != 4 || new_prop->length != 4 || > + *(u32 *)prop->value != *(u32 *)new_prop->value) > + pr_err("ERROR: overlay and/or live tree #size-cells invalid in node %pOF\n", > + target->np); > + > + } else { > + > + check_for_non_overlay_node = true; > ret = of_changeset_update_property(&ovcs->cset, target->np, > new_prop); > > + } > + > + if (check_for_non_overlay_node && > + !of_node_check_flag(target->np, OF_OVERLAY)) > + pr_err("WARNING: %s(), memory leak will occur if overlay removed. Property: %pOF/%s\n", > + __func__, target->np, new_prop->name); > + > if (ret) { > kfree(new_prop->name); > kfree(new_prop->value); > -- > Frank Rowand >