Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1692020imu; Wed, 12 Dec 2018 02:37:21 -0800 (PST) X-Google-Smtp-Source: AFSGD/U8DoD4t8OV2f3agcgYr9knyPnAotoyQ2wPv0KbQrD51PjzYkAvaPvwXVV4tYzjpjgqpQuW X-Received: by 2002:a63:6ecf:: with SMTP id j198mr18160501pgc.3.1544611041267; Wed, 12 Dec 2018 02:37:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544611041; cv=none; d=google.com; s=arc-20160816; b=FXgs888mQu9nFk4xZFYDC5X4lz99f5QqHqfAmf4biV+7wcM1LbTsbjxrHsVNH2NqMW ZUvqyWj+h0wbM2VC7AwHGWFIGA16moTuXJNB5Obb1rCLx9xWOZrpdwmvnITaSTBt/Vq2 SPhrxzLJooi3qyS/txtupsVMTtOvphVWz3JpvqtctnIJJ/d9gcxjf3e7v5IUAvZLS6yJ aHO2jP5sN7ia6GsNSXzVtxoo6q2FmjsS1wKdgvzSexn9k0QwzuM1YXG2kCMyFQVpgC1+ 1rzp2jxRrmS/5sZBMrNjvG3sd/ZK+5vNAep1M/huNL3xjl+1cOzOmTCc/Hm2nGK26rKO 4ngw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:references:in-reply-to:subject:cc:to:from; bh=IqT96AMzdflRM3XBEyY6Mf31VK7oJPN/uEECAKBWnqw=; b=Q4umuXrLU+ko3T3OJRSYZ4w5zieRS8KT35FcFX8A56eR1C1uRj1FbvTID0nz0Medh2 +h6j7iEbMQQ9mYNHA6cNx/X0WtzC90t52/plMOUqGmd6YvBjT7XjxLfO9+brmeFEddw2 E2eLGb7gXUYezNAtU7dCovVtrJq7/YuVGruO8Psb12xAu/nT/de3y+J/2rWeuArad3jy DGnlGfWiA1oEFT5gNFTi77hgrxqciuN4sG7qdKLDdPTPpXgTxazI3/ufjlBhMy1n+zcp ObQXLLzrImUJ2MBN6ITlsYdVWk0iibdKlzCYNK+Zh0btIdS3tZBDQjgROptJm7mF+cdt /FXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v83si15688526pfk.264.2018.12.12.02.37.05; Wed, 12 Dec 2018 02:37:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727061AbeLLKgC convert rfc822-to-8bit (ORCPT + 99 others); Wed, 12 Dec 2018 05:36:02 -0500 Received: from ozlabs.org ([203.11.71.1]:55295 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726960AbeLLKgC (ORCPT ); Wed, 12 Dec 2018 05:36:02 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 43FCrv1VVKz9s47; Wed, 12 Dec 2018 21:35:59 +1100 (AEDT) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=ellerman.id.au From: Michael Ellerman To: Christophe Leroy , Benjamin Herrenschmidt , Paul Mackerras Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH v3] powerpc: implement CONFIG_DEBUG_VIRTUAL In-Reply-To: <32b00148-214c-44db-e9cf-fa4caa2547e8@c-s.fr> References: <87va3zwq1t.fsf@concordia.ellerman.id.au> <32b00148-214c-44db-e9cf-fa4caa2547e8@c-s.fr> Date: Wed, 12 Dec 2018 21:35:59 +1100 Message-ID: <87o99rvxps.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Christophe Leroy writes: > Le 12/12/2018 à 01:23, Michael Ellerman a écrit : >> Christophe Leroy writes: >> >>> This patch implements CONFIG_DEBUG_VIRTUAL to warn about >>> incorrect use of virt_to_phys() and page_to_phys() >>> >>> Below is the result of test_debug_virtual: >>> >>> [ 1.438746] WARNING: CPU: 0 PID: 1 at ./arch/powerpc/include/asm/io.h:808 test_debug_virtual_init+0x3c/0xd4 >>> [ 1.448156] CPU: 0 PID: 1 Comm: swapper Not tainted 4.20.0-rc5-00560-g6bfb52e23a00-dirty #532 >>> [ 1.457259] NIP: c066c550 LR: c0650ccc CTR: c066c514 >>> [ 1.462257] REGS: c900bdb0 TRAP: 0700 Not tainted (4.20.0-rc5-00560-g6bfb52e23a00-dirty) >>> [ 1.471184] MSR: 00029032 CR: 48000422 XER: 20000000 >>> [ 1.477811] >>> [ 1.477811] GPR00: c0650ccc c900be60 c60d0000 00000000 006000c0 c9000000 00009032 c7fa0020 >>> [ 1.477811] GPR08: 00002400 00000001 09000000 00000000 c07b5d04 00000000 c00037d8 00000000 >>> [ 1.477811] GPR16: 00000000 00000000 00000000 00000000 c0760000 c0740000 00000092 c0685bb0 >>> [ 1.477811] GPR24: c065042c c068a734 c0685b8c 00000006 00000000 c0760000 c075c3c0 ffffffff >>> [ 1.512711] NIP [c066c550] test_debug_virtual_init+0x3c/0xd4 >>> [ 1.518315] LR [c0650ccc] do_one_initcall+0x8c/0x1cc >>> [ 1.523163] Call Trace: >>> [ 1.525595] [c900be60] [c0567340] 0xc0567340 (unreliable) >>> [ 1.530954] [c900be90] [c0650ccc] do_one_initcall+0x8c/0x1cc >>> [ 1.536551] [c900bef0] [c0651000] kernel_init_freeable+0x1f4/0x2cc >>> [ 1.542658] [c900bf30] [c00037ec] kernel_init+0x14/0x110 >>> [ 1.547913] [c900bf40] [c000e1d0] ret_from_kernel_thread+0x14/0x1c >>> [ 1.553971] Instruction dump: >>> [ 1.556909] 3ca50100 bfa10024 54a5000e 3fa0c076 7c0802a6 3d454000 813dc204 554893be >>> [ 1.564566] 7d294010 7d294910 90010034 39290001 <0f090000> 7c3e0b78 955e0008 3fe0c062 >>> [ 1.572425] ---[ end trace 6f6984225b280ad6 ]--- >>> [ 1.577467] PA: 0x09000000 for VA: 0xc9000000 >>> [ 1.581799] PA: 0x061e8f50 for VA: 0xc61e8f50 >>> >>> Signed-off-by: Christophe Leroy >>> --- >>> v3: Added missing linux/mm.h >>> I realised that a driver may use DMA on stack after checking with virt_addr_valid(), so the new >>> verification might induce false positives. I remove it for now, will add it again later in a more >>> controled way. >> >> What is this comment referring to? >> >> I can't see any difference to v2 except the linux/mm.h include. > > v2 was: > > > @@ -804,6 +806,11 @@ extern void __iounmap_at(void *ea, unsigned long size); > */ > static inline unsigned long virt_to_phys(volatile void * address) > { > + if (IS_ENABLED(CONFIG_DEBUG_VIRTUAL) && > + !WARN_ON(IS_ENABLED(CONFIG_HAVE_ARCH_VMAP_STACK) && current->pid && > + object_is_on_stack((const void*)address))) > + WARN_ON(!virt_addr_valid(address)); > + > return __pa((unsigned long)address); > } > > > v3 is: (same as v1) > > > @@ -804,6 +806,8 @@ extern void __iounmap_at(void *ea, unsigned long size); > */ > static inline unsigned long virt_to_phys(volatile void * address) > { > + WARN_ON(IS_ENABLED(CONFIG_DEBUG_VIRTUAL) && !virt_addr_valid(address)); > + > return __pa((unsigned long)address); > } Right, sorry I must have been looking at v1 (which was already applied in my tree). > The idea in v2 was to detect objects on stack used for DMA before > activating CONFIG_VMAP_STACK, but if the driver uses virt_addr_valid() > to decide if it can DMA map it, then we'll get false positives. > So I think this should be added with a dedicated DEBUG CONFIG option, > not implicitely. Sounds good. I'll take v3. cheers