Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1200843imu; Tue, 11 Dec 2018 14:42:10 -0800 (PST) X-Google-Smtp-Source: AFSGD/Vd+O6VkKzidv4k8VDVbLN/5m6ir0/8GOTRr96LmMODyZ+RGOncHhrX2BdZV+3/O3MFBHEX X-Received: by 2002:a62:7796:: with SMTP id s144mr17936050pfc.26.1544568130858; Tue, 11 Dec 2018 14:42:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544568130; cv=none; d=google.com; s=arc-20160816; b=nq1aO/PCVRnMIDTq3Pkr27mLNkcNk/0T1AaG0qIKIQdYYwWc4eCuzJNxfzFwyD83qd Uc1dbc4TPxamwukNFUwW2Ag214ofwaJsjgjQ1TdY4HJH9Op0Cf/fTWyXcUaKNv6MowAj 47jcTvAzBLWs1dpKBcoaSjE2ml/4dh+6m9FaCPuLeb7HA4IHkcE8NIdVKeDjhlNsZn9u JFVYdTUxeT18wL/gVVTIzy+3VGtlSuHcCHEV1Lpf1Y3mX7NFaYMSHTXwI2peGCJnCyyM txUo44MAZbXTZXmas8KH8cg/2W/1qmuH+FRye5Ls3FGFJEudh0gaCOMrimD67aR/BzAq iscg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:message-id; bh=ETB7HsiE+YrG0kzdnpU0CH9qNUOUidFW+KqeJYv3lMY=; b=M/769d+tlqYCwchKts2bDbJlPxlO/vTuVKxoIRnCwuV6nOTXpUS1lERWhr6E+AKgTL Vg5XT05LXhqDMrCFchOP1qeNEBMvJbtrxUcG44ARNuBVj0ogVzhPFitexJOw6HbWJkS8 Wl3b4R671bok+hrTiR9forEWkeQALDW3+b+rZsYhA14hTe3LofHPhsU9bU0fWKUfbKTx pCS81lg8rvIc3FHLYhVgOH9FeY03PYPtoPx8QrjolIl8MI0Z2c/+nmY9iZAJnWAuDtVz 8f1w4UEFACjqKOFdAXpuc8tTr0YZgYf4OATOJacXcGsUF3ptsJN/TnyQ5I1Y0PtPOEtK rDJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n187si12793846pfn.83.2018.12.11.14.41.56; Tue, 11 Dec 2018 14:42:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726247AbeLKWk4 (ORCPT + 99 others); Tue, 11 Dec 2018 17:40:56 -0500 Received: from pegase1.c-s.fr ([93.17.236.30]:19354 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726234AbeLKWkz (ORCPT ); Tue, 11 Dec 2018 17:40:55 -0500 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 43Dvzn5rc0z9v0sm; Tue, 11 Dec 2018 23:40:53 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id DRsE75rC7Ea9; Tue, 11 Dec 2018 23:40:53 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 43Dvzn4xyYz9v0sl; Tue, 11 Dec 2018 23:40:53 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id ECE8D8B818; Tue, 11 Dec 2018 23:40:53 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id VMz-VvTwKv-a; Tue, 11 Dec 2018 23:40:53 +0100 (CET) Received: from PO15451.localdomain (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id A21A98B812; Tue, 11 Dec 2018 23:40:53 +0100 (CET) Received: by localhost.localdomain (Postfix, from userid 0) id 3E3CB71707; Tue, 11 Dec 2018 22:40:53 +0000 (UTC) Message-Id: From: Christophe Leroy Subject: [PATCH v3] powerpc: implement CONFIG_DEBUG_VIRTUAL To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Tue, 11 Dec 2018 22:40:53 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch implements CONFIG_DEBUG_VIRTUAL to warn about incorrect use of virt_to_phys() and page_to_phys() Below is the result of test_debug_virtual: [ 1.438746] WARNING: CPU: 0 PID: 1 at ./arch/powerpc/include/asm/io.h:808 test_debug_virtual_init+0x3c/0xd4 [ 1.448156] CPU: 0 PID: 1 Comm: swapper Not tainted 4.20.0-rc5-00560-g6bfb52e23a00-dirty #532 [ 1.457259] NIP: c066c550 LR: c0650ccc CTR: c066c514 [ 1.462257] REGS: c900bdb0 TRAP: 0700 Not tainted (4.20.0-rc5-00560-g6bfb52e23a00-dirty) [ 1.471184] MSR: 00029032 CR: 48000422 XER: 20000000 [ 1.477811] [ 1.477811] GPR00: c0650ccc c900be60 c60d0000 00000000 006000c0 c9000000 00009032 c7fa0020 [ 1.477811] GPR08: 00002400 00000001 09000000 00000000 c07b5d04 00000000 c00037d8 00000000 [ 1.477811] GPR16: 00000000 00000000 00000000 00000000 c0760000 c0740000 00000092 c0685bb0 [ 1.477811] GPR24: c065042c c068a734 c0685b8c 00000006 00000000 c0760000 c075c3c0 ffffffff [ 1.512711] NIP [c066c550] test_debug_virtual_init+0x3c/0xd4 [ 1.518315] LR [c0650ccc] do_one_initcall+0x8c/0x1cc [ 1.523163] Call Trace: [ 1.525595] [c900be60] [c0567340] 0xc0567340 (unreliable) [ 1.530954] [c900be90] [c0650ccc] do_one_initcall+0x8c/0x1cc [ 1.536551] [c900bef0] [c0651000] kernel_init_freeable+0x1f4/0x2cc [ 1.542658] [c900bf30] [c00037ec] kernel_init+0x14/0x110 [ 1.547913] [c900bf40] [c000e1d0] ret_from_kernel_thread+0x14/0x1c [ 1.553971] Instruction dump: [ 1.556909] 3ca50100 bfa10024 54a5000e 3fa0c076 7c0802a6 3d454000 813dc204 554893be [ 1.564566] 7d294010 7d294910 90010034 39290001 <0f090000> 7c3e0b78 955e0008 3fe0c062 [ 1.572425] ---[ end trace 6f6984225b280ad6 ]--- [ 1.577467] PA: 0x09000000 for VA: 0xc9000000 [ 1.581799] PA: 0x061e8f50 for VA: 0xc61e8f50 Signed-off-by: Christophe Leroy --- v3: Added missing linux/mm.h I realised that a driver may use DMA on stack after checking with virt_addr_valid(), so the new verification might induce false positives. I remove it for now, will add it again later in a more controled way. v2: Using asm/pgtable.h to avoid build failure on ppc64e. Added a verification that the object is not in stack to catch problems before activing VMAP_STACK. arch/powerpc/Kconfig | 1 + arch/powerpc/include/asm/io.h | 13 ++++++++++++- arch/powerpc/mm/pgtable_32.c | 2 +- 3 files changed, 14 insertions(+), 2 deletions(-) diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig index e312e92e3381..94b46624068d 100644 --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -128,6 +128,7 @@ config PPC # # Please keep this list sorted alphabetically. # + select ARCH_HAS_DEBUG_VIRTUAL select ARCH_HAS_DEVMEM_IS_ALLOWED select ARCH_HAS_DMA_SET_COHERENT_MASK select ARCH_HAS_ELF_RANDOMIZE diff --git a/arch/powerpc/include/asm/io.h b/arch/powerpc/include/asm/io.h index e746becd9d6f..7f19fbd3ba55 100644 --- a/arch/powerpc/include/asm/io.h +++ b/arch/powerpc/include/asm/io.h @@ -29,12 +29,14 @@ extern struct pci_dev *isa_bridge_pcidev; #include #include +#include #include #include #include #include #include #include +#include #ifdef CONFIG_PPC64 #include @@ -804,6 +806,8 @@ extern void __iounmap_at(void *ea, unsigned long size); */ static inline unsigned long virt_to_phys(volatile void * address) { + WARN_ON(IS_ENABLED(CONFIG_DEBUG_VIRTUAL) && !virt_addr_valid(address)); + return __pa((unsigned long)address); } @@ -827,7 +831,14 @@ static inline void * phys_to_virt(unsigned long address) /* * Change "struct page" to physical address. */ -#define page_to_phys(page) ((phys_addr_t)page_to_pfn(page) << PAGE_SHIFT) +static inline phys_addr_t page_to_phys(struct page *page) +{ + unsigned long pfn = page_to_pfn(page); + + WARN_ON(IS_ENABLED(CONFIG_DEBUG_VIRTUAL) && !pfn_valid(pfn)); + + return PFN_PHYS(pfn); +} /* * 32 bits still uses virt_to_bus() for it's implementation of DMA diff --git a/arch/powerpc/mm/pgtable_32.c b/arch/powerpc/mm/pgtable_32.c index 4fc77a99c9bf..68d204a45cd0 100644 --- a/arch/powerpc/mm/pgtable_32.c +++ b/arch/powerpc/mm/pgtable_32.c @@ -143,7 +143,7 @@ __ioremap_caller(phys_addr_t addr, unsigned long size, pgprot_t prot, void *call * Don't allow anybody to remap normal RAM that we're using. * mem_init() sets high_memory so only do the check after that. */ - if (slab_is_available() && (p < virt_to_phys(high_memory)) && + if (slab_is_available() && virt_addr_valid(p) && page_is_ram(__phys_to_pfn(p))) { printk("__ioremap(): phys addr 0x%llx is RAM lr %ps\n", (unsigned long long)p, __builtin_return_address(0)); -- 2.13.3