Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4813113imu; Wed, 19 Dec 2018 00:18:18 -0800 (PST) X-Google-Smtp-Source: AFSGD/UTO5VZ8bP3vK5n+EkOLOUE2wBmv0VCYaYg/suRcGgFh9iqPxzcpR5ILPLEeRcsjrnfs+Ts X-Received: by 2002:a63:2109:: with SMTP id h9mr18525341pgh.277.1545207498296; Wed, 19 Dec 2018 00:18:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545207498; cv=none; d=google.com; s=arc-20160816; b=KjSASipfWp5RLUW8RDx1GCtY26kfIGBXfhgIpgfGHeR+q1ngf1sGWZDnsTGs14LuOZ BIYzvsxPS5PVPJrmMLATCir9oBAER5NAvMLXz7blMNTtOEQ/rkpAOPetpE3tXDXLOZ9E UnyuyUBWARd8pve155QBS8APa+2wy4mgDGTFogw9zQKn5NccCAPVrioh5dg7gTgjS9fb RwF2fiYTc+w18lZJtYjS4oVyxCzQq7xdy6/sMaEF8EL6KIyle5dr+5sCUlzvTtanE7mf 1dFNSxRpG+17p+sEGiCmhyzXgdx7eKVUldWEz3qzdA0mnV8NBSV9gO3sCHwf9oWGLRK8 qKxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:message-id; bh=ApfBdIJ6LayJUgEG4saHtHwmHiU5E/ZDunjo04VRw90=; b=iVxuE0lYIXl9NK2vIdfFfsq1ggZW13NNG5iC3/oDPmZ2J70DoFOh8P85KGM0nio61D V+kXjuJrj0A2H3OZmAJpNlmu47f/7G6iiR27cNPGciLgBDnt98o1LQEiboEkDMjt72Ju +KwhyJoB5fc6OSphppPF6xHZg8+pjL8Y4pKUsYZseAMVxu6HcHxXSahE+QsM93MZw/Oq MZKiW/1gNW6bsIjwcHBYqW05NYr79pQ9JDiGr448cBPVivnao9YMORbWGbjQMtTVBwAp 8mKrwKx4z9eMqPKOTKj+dXwbxkDLbPQYvwBJA2ADEqARzuzCCJOqjeZFDVwRSbEN89D7 B9JA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c19si14545411pls.242.2018.12.19.00.18.02; Wed, 19 Dec 2018 00:18:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728227AbeLSHJl (ORCPT + 99 others); Wed, 19 Dec 2018 02:09:41 -0500 Received: from pegase1.c-s.fr ([93.17.236.30]:24139 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728041AbeLSHJk (ORCPT ); Wed, 19 Dec 2018 02:09:40 -0500 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 43KQxZ6ClRz9v2Rx; Wed, 19 Dec 2018 08:09:38 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id 8bqWcGPS2kNy; Wed, 19 Dec 2018 08:09:38 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 43KQxZ5VzXz9v2Rw; Wed, 19 Dec 2018 08:09:38 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id A5E8D8B85D; Wed, 19 Dec 2018 08:09:39 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id D_utCnL0TIJx; Wed, 19 Dec 2018 08:09:39 +0100 (CET) Received: from po14163vm.idsi0.si.c-s.fr (po15451.idsi0.si.c-s.fr [172.25.231.2]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 7D9248B754; Wed, 19 Dec 2018 08:09:39 +0100 (CET) Received: by po14163vm.idsi0.si.c-s.fr (Postfix, from userid 0) id 5673671729; Wed, 19 Dec 2018 07:09:39 +0000 (UTC) Message-Id: <2769431386b8b54a052b442ed3d629153d24e7a4.1545203319.git.christophe.leroy@c-s.fr> From: Christophe Leroy Subject: [PATCH v4] powerpc: implement CONFIG_DEBUG_VIRTUAL To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Wed, 19 Dec 2018 07:09:39 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch implements CONFIG_DEBUG_VIRTUAL to warn about incorrect use of virt_to_phys() and page_to_phys() Below is the result of test_debug_virtual: [ 1.438746] WARNING: CPU: 0 PID: 1 at ./arch/powerpc/include/asm/io.h:808 test_debug_virtual_init+0x3c/0xd4 [ 1.448156] CPU: 0 PID: 1 Comm: swapper Not tainted 4.20.0-rc5-00560-g6bfb52e23a00-dirty #532 [ 1.457259] NIP: c066c550 LR: c0650ccc CTR: c066c514 [ 1.462257] REGS: c900bdb0 TRAP: 0700 Not tainted (4.20.0-rc5-00560-g6bfb52e23a00-dirty) [ 1.471184] MSR: 00029032 CR: 48000422 XER: 20000000 [ 1.477811] [ 1.477811] GPR00: c0650ccc c900be60 c60d0000 00000000 006000c0 c9000000 00009032 c7fa0020 [ 1.477811] GPR08: 00002400 00000001 09000000 00000000 c07b5d04 00000000 c00037d8 00000000 [ 1.477811] GPR16: 00000000 00000000 00000000 00000000 c0760000 c0740000 00000092 c0685bb0 [ 1.477811] GPR24: c065042c c068a734 c0685b8c 00000006 00000000 c0760000 c075c3c0 ffffffff [ 1.512711] NIP [c066c550] test_debug_virtual_init+0x3c/0xd4 [ 1.518315] LR [c0650ccc] do_one_initcall+0x8c/0x1cc [ 1.523163] Call Trace: [ 1.525595] [c900be60] [c0567340] 0xc0567340 (unreliable) [ 1.530954] [c900be90] [c0650ccc] do_one_initcall+0x8c/0x1cc [ 1.536551] [c900bef0] [c0651000] kernel_init_freeable+0x1f4/0x2cc [ 1.542658] [c900bf30] [c00037ec] kernel_init+0x14/0x110 [ 1.547913] [c900bf40] [c000e1d0] ret_from_kernel_thread+0x14/0x1c [ 1.553971] Instruction dump: [ 1.556909] 3ca50100 bfa10024 54a5000e 3fa0c076 7c0802a6 3d454000 813dc204 554893be [ 1.564566] 7d294010 7d294910 90010034 39290001 <0f090000> 7c3e0b78 955e0008 3fe0c062 [ 1.572425] ---[ end trace 6f6984225b280ad6 ]--- [ 1.577467] PA: 0x09000000 for VA: 0xc9000000 [ 1.581799] PA: 0x061e8f50 for VA: 0xc61e8f50 Signed-off-by: Christophe Leroy --- v4: revised verification in __ioremap_caller(): we keep the verification based on virt_to_phys() but do it on (highmem - 1) instead of highmem because highmem is not a valid virtual address. v3: Added missing linux/mm.h I realised that a driver may use DMA on stack after checking with virt_addr_valid(), so the new verification might induce false positives. I remove it for now, will add it again later in a more controled way. v2: Using asm/pgtable.h to avoid build failure on ppc64e. Added a verification that the object is not in stack to catch problems before activing VMAP_STACK. arch/powerpc/Kconfig | 1 + arch/powerpc/include/asm/io.h | 13 ++++++++++++- arch/powerpc/mm/pgtable_32.c | 2 +- 3 files changed, 14 insertions(+), 2 deletions(-) diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig index e312e92e3381..94b46624068d 100644 --- a/arch/powerpc/Kconfig +++ b/arch/powerpc/Kconfig @@ -128,6 +128,7 @@ config PPC # # Please keep this list sorted alphabetically. # + select ARCH_HAS_DEBUG_VIRTUAL select ARCH_HAS_DEVMEM_IS_ALLOWED select ARCH_HAS_DMA_SET_COHERENT_MASK select ARCH_HAS_ELF_RANDOMIZE diff --git a/arch/powerpc/include/asm/io.h b/arch/powerpc/include/asm/io.h index e746becd9d6f..7f19fbd3ba55 100644 --- a/arch/powerpc/include/asm/io.h +++ b/arch/powerpc/include/asm/io.h @@ -29,12 +29,14 @@ extern struct pci_dev *isa_bridge_pcidev; #include #include +#include #include #include #include #include #include #include +#include #ifdef CONFIG_PPC64 #include @@ -804,6 +806,8 @@ extern void __iounmap_at(void *ea, unsigned long size); */ static inline unsigned long virt_to_phys(volatile void * address) { + WARN_ON(IS_ENABLED(CONFIG_DEBUG_VIRTUAL) && !virt_addr_valid(address)); + return __pa((unsigned long)address); } @@ -827,7 +831,14 @@ static inline void * phys_to_virt(unsigned long address) /* * Change "struct page" to physical address. */ -#define page_to_phys(page) ((phys_addr_t)page_to_pfn(page) << PAGE_SHIFT) +static inline phys_addr_t page_to_phys(struct page *page) +{ + unsigned long pfn = page_to_pfn(page); + + WARN_ON(IS_ENABLED(CONFIG_DEBUG_VIRTUAL) && !pfn_valid(pfn)); + + return PFN_PHYS(pfn); +} /* * 32 bits still uses virt_to_bus() for it's implementation of DMA diff --git a/arch/powerpc/mm/pgtable_32.c b/arch/powerpc/mm/pgtable_32.c index 4fc77a99c9bf..d67215248d82 100644 --- a/arch/powerpc/mm/pgtable_32.c +++ b/arch/powerpc/mm/pgtable_32.c @@ -143,7 +143,7 @@ __ioremap_caller(phys_addr_t addr, unsigned long size, pgprot_t prot, void *call * Don't allow anybody to remap normal RAM that we're using. * mem_init() sets high_memory so only do the check after that. */ - if (slab_is_available() && (p < virt_to_phys(high_memory)) && + if (slab_is_available() && p <= virt_to_phys(high_memory - 1) && page_is_ram(__phys_to_pfn(p))) { printk("__ioremap(): phys addr 0x%llx is RAM lr %ps\n", (unsigned long long)p, __builtin_return_address(0)); -- 2.13.3