Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp4015589imd; Mon, 29 Oct 2018 16:25:41 -0700 (PDT) X-Google-Smtp-Source: AJdET5eNetkG/iX493tIXmI8mnHvdZi1+5G0xdBctv4Vn0yCxVZKfcDMMTzmfMn/8mAg/Dhx56tU X-Received: by 2002:a62:8d16:: with SMTP id z22-v6mr400481pfd.185.1540855541092; Mon, 29 Oct 2018 16:25:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540855541; cv=none; d=google.com; s=arc-20160816; b=XIAafmb6cbOa06V7Am+x2M5MDYveXmhielvhFfBcmr2egXXVoY3NyS0aMAC0tcKWez AznBm27F4SCLasU25+NKK32P0i8cCYxOe2Qaq3bRJgaO2N+AQk2UoM2bJ79ogV/HJG2Z 01mPQTk6hQHB/t4rLOL7u3DYK5VAnNp5AXTmLCQeWR2N1zP+GrtSxXAAdu+GNMEmKR7i D54yaxzcCNUIeOv+bqSbdCL1bVPF1Im3yg8LU2Wbr+E6qSRiQ+TAgers1IUF4AmrLN9n n3Vyr+tDVAHAiAAoXBFAGz3aH4v10+x4qnfdtRUXHhCLxkkx0ImUZlkJtRrO7FA4FWN7 1sTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=vDHjyGYVQTUtQVsDqr8AcLp/l+YUwkmPF00q1LqJLJQ=; b=ioI6tVVcinYLEyjfRnwAeWFb5jTmYn9dGm5a0jsSAwQlS+nn7zPB8737BQz51hueQs 2Mqn/w1xCbnekw5GVYksOqQM0O6nlG3O0WCN37YzuJh35k2FQpE0bHws1OLlL084C63k aQ/v0qTFVSbeX9sBc0hKJTdVxVymrx8X6rvm5d1keqj2DlZxH8fmB1aqa+N8Cl9Pr5Ac PaZPz21xG9xqzPkDylGfGh8fpsF7UWk6DHjFfU7audLvz8JqIHUQia8DUxN8WRN9QoXX cdZ3HCtlPJbPUJYJUteRaDpVRN+25t6IuJTsksY4tomUugR4ZAGCak7Mhtx1tbZkqB6p gLJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oijYefpG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q25-v6si17034573pgd.357.2018.10.29.16.25.24; Mon, 29 Oct 2018 16:25:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oijYefpG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725929AbeJ3IQB (ORCPT + 99 others); Tue, 30 Oct 2018 04:16:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:58146 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725763AbeJ3IQA (ORCPT ); Tue, 30 Oct 2018 04:16:00 -0400 Received: from mail-qt1-f177.google.com (mail-qt1-f177.google.com [209.85.160.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3F71721104; Mon, 29 Oct 2018 23:25:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1540855502; bh=sAasVK4V1LbEtnONT+TBXvpf441PteCxNR4+6vQO6S4=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=oijYefpGqeV600sVhKURNeWjIFA38kxoobu9YZ2N6OQr+QMEU4Xy7rKsQfQwHY08/ ptqgIjl2mBE5WEQhplFVVP1xhwf0ZaREa0GXL3g1USadi5uTKXRLWpwQ1rczYmNGnO uKqpRB+xsrPej15s5/xJhzjsGIg7bN0afLKUZt1w= Received: by mail-qt1-f177.google.com with SMTP id q41-v6so11406437qtq.10; Mon, 29 Oct 2018 16:25:02 -0700 (PDT) X-Gm-Message-State: AGRZ1gJVid6GW2lQC4SiHkXLtSBSY+jPy9fICNwZT/ZAm0WigQA1KB0q H68r++CXB5XgP2bPKqTcq42xykFLlms+d/DwEA== X-Received: by 2002:aed:3ece:: with SMTP id o14-v6mr408104qtf.26.1540855501326; Mon, 29 Oct 2018 16:25:01 -0700 (PDT) MIME-Version: 1.0 References: <20181029190014.6455-1-f.fainelli@gmail.com> <20181029190014.6455-2-f.fainelli@gmail.com> In-Reply-To: From: Rob Herring Date: Mon, 29 Oct 2018 18:24:48 -0500 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 1/2 v5] arm64: Get rid of __early_init_dt_declare_initrd() To: Ard Biesheuvel Cc: Florian Fainelli , "linux-kernel@vger.kernel.org" , rppt@linux.ibm.com, Catalin Marinas , Will Deacon , Frank Rowand , Andrew Morton , Marc Zyngier , Russell King , aryabinin@virtuozzo.com, Andrey Konovalov , Masahiro Yamada , Robin Murphy , Laura Abbott , Stefan Agner , Johannes Weiner , ghackmann@android.com, Kristina Martsenko , chandan.vn@samsung.com, "moderated list:ARM/FREESCALE IMX / MXC ARM ARCHITECTURE" , devicetree@vger.kernel.org, Russell King Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 29, 2018 at 4:58 PM Ard Biesheuvel wrote: > > On 29 October 2018 at 16:59, Rob Herring wrote: > > +Ard who last touched this. > > > > On Mon, Oct 29, 2018 at 2:23 PM Florian Fainelli wrote: > >> > >> ARM64 is the only architecture that re-defines > >> __early_init_dt_declare_initrd() in order for that function to populate > >> initrd_start/initrd_end with physical addresses instead of virtual > >> addresses. Instead of having an override, just get rid of that > >> implementation and perform the virtual to physical conversion of these > >> addresses in arm64_memblock_init() where relevant. > >> > >> Signed-off-by: Florian Fainelli > >> Signed-off-by: Mike Rapoport > >> --- > >> arch/arm64/include/asm/memory.h | 8 ------- > >> arch/arm64/mm/init.c | 42 +++++++++++++++++++++------------ > >> 2 files changed, 27 insertions(+), 23 deletions(-) > >> > >> diff --git a/arch/arm64/include/asm/memory.h b/arch/arm64/include/asm/memory.h > >> index b96442960aea..dc3ca21ba240 100644 > >> --- a/arch/arm64/include/asm/memory.h > >> +++ b/arch/arm64/include/asm/memory.h > >> @@ -168,14 +168,6 @@ > >> #define IOREMAP_MAX_ORDER (PMD_SHIFT) > >> #endif > >> > >> -#ifdef CONFIG_BLK_DEV_INITRD > >> -#define __early_init_dt_declare_initrd(__start, __end) \ > >> - do { \ > >> - initrd_start = (__start); \ > >> - initrd_end = (__end); \ > >> - } while (0) > >> -#endif > >> - > >> #ifndef __ASSEMBLY__ > >> > >> #include > >> diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c > >> index 3cf87341859f..292570b08f85 100644 > >> --- a/arch/arm64/mm/init.c > >> +++ b/arch/arm64/mm/init.c > >> @@ -62,6 +62,8 @@ > >> s64 memstart_addr __ro_after_init = -1; > >> phys_addr_t arm64_dma_phys_limit __ro_after_init; > >> > >> +static phys_addr_t phys_initrd_start, phys_initrd_end; > >> + > >> #ifdef CONFIG_BLK_DEV_INITRD > >> static int __init early_initrd(char *p) > >> { > >> @@ -72,8 +74,8 @@ static int __init early_initrd(char *p) > >> if (*endp == ',') { > >> size = memparse(endp + 1, NULL); > >> > >> - initrd_start = start; > >> - initrd_end = start + size; > >> + phys_initrd_start = start; > >> + phys_initrd_end = start + size; > >> } > >> return 0; > >> } > >> @@ -364,6 +366,7 @@ static void __init fdt_enforce_memory_region(void) > >> void __init arm64_memblock_init(void) > >> { > >> const s64 linear_region_size = -(s64)PAGE_OFFSET; > >> + u64 __maybe_unused base, size; > >> > >> /* Handle linux,usable-memory-range property */ > >> fdt_enforce_memory_region(); > >> @@ -408,14 +411,25 @@ void __init arm64_memblock_init(void) > >> memblock_add(__pa_symbol(_text), (u64)(_end - _text)); > >> } > >> > >> - if (IS_ENABLED(CONFIG_BLK_DEV_INITRD) && initrd_start) { > >> + if (IS_ENABLED(CONFIG_BLK_DEV_INITRD) && > >> + (initrd_start || phys_initrd_start)) { > > > > I've tried to explain already that this is broken. The problem is > > __early_init_dt_declare_initrd using __va() which happens before this > > function is called. __va() uses PHYS_OFFSET which in turn is defined > > as memstart_addr. However, memstart_addr may be changed just above > > this hunk, so the earlier conversion to a VA may not be valid at this > > point. This is explained if you read Ard's commit that added all this > > mess. > > > > You could fix this by converting back to a PA before adjusting > > memstart_addr, but that's 2 wrongs making a right and fragile. The > > better solution is the other proposal making the DT code set > > phys_initrd_* (whatever the ARM code calls them). > > > > On arm64, we have > > #define PHYS_OFFSET \ > ({ VM_BUG_ON(memstart_addr & 1); memstart_addr; }) > > and > > s64 memstart_addr __ro_after_init = -1; > > IOW, any attempt to perform PA to VA translations before memstart_addr > is assigned will BUG() if CONFIG_DEBUG_VM=y, so please enable that > when playing with this code. Which will result in a crashed kernel with no console output unless you have earlycon enabled (or maybe EFI console will be up?). A WARN would be better. > The reason we have this code is because the start of the linear region > might not coincide with memblock_start_of_DRAM(), which could happen, > e.g., when running a 39-bit VA kernel on a system with a very sparse > memory map (which is unfortunately what some silicon vendors think is > what ARM recommends) and the kernel loaded near the top of that > memory. The ability to load the kernel anywhere in physical memory was > introduced to accommodate physical KASLR. > > Ideally, we'd fix this by only recording physical addresses for the > initrd in generic code, and deferring the translation until the point > where we actually do the access. The plan had been for the core code to set both the phys and virt addresses and let arm64 calculate the VA again. I guess we'll have to condition getting the VA on !ARM64 at least until we convert other platforms to use physaddr. Rob