Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2733602imj; Mon, 11 Feb 2019 07:41:28 -0800 (PST) X-Google-Smtp-Source: AHgI3IbxAWGxks5sUqTux+45IFy1eEeo6rI9gaE/1PttAH1dvPPoMICiduUq6yXUnkzHIdQYdyyW X-Received: by 2002:a17:902:b489:: with SMTP id y9mr38636862plr.193.1549899688373; Mon, 11 Feb 2019 07:41:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549899688; cv=none; d=google.com; s=arc-20160816; b=LeQvj4zs6DAaWIL09em9C9/Ni8uoFCp0YtygQEA0DIZ6mQHvm7263b8U6gVeTLAy9M pnphWTTcud0gKg80gF7lUSQ2VtO6BgDmFYFfOINxqFS0i7dLuWt7A1SAKde99nR3rvO1 XGpgi+zxgsow3C9nDaYRtBebr8Q+ZogLZR6aaEp5oKQl28VNcSJzFm0Fhx/YBUAFcw/h cGQ4Rq4tdZWCwSbUq1NycGqe3HTxIhyh4It6nrOve66Rrcbofx57HQF0+xgDOpcOGMOc ys5sBJ1iN/72szrkUuD3bztZqXSH98W5rgAZFXtm1r06qq+G6MfreOmuCLuPQBuViq0F f6Og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1G4T0El8zKkEkkc1W7GIbchpf/S9whj2k7lt5+8BneY=; b=SjGqABwZIIZYkdAR1eDu3xRQgPMq2HzAgKnHS9/UtifRMh7kfb+w3GgSxdOtjz/8Vl u61GEj494hf9oVqjSajmOaprCXGE1T37chXUcdClOqnyUPqyhbdYtbXNRjN+nVoiSt4z Y2/xpO5r/kxyIxQAxUD9V6ZuUk8+GVc0JtYZvoawH4xVMbmPN3if6oKUlr0hdes8nIoH 4yKLJTsovGjhfKPaZX7tXga8EjIGAOBQvNqIxRGDrGeNfE4iq2vqy++gGTaCvdKnYTN6 EpIUfw9ktKGWD6vtdntdaYzzNNfnO8YlZ3Yd+xV58Cma/2XW18P70CbGOaRSuE3KkPaZ pQ9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Fa4BNKuf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w20si9506777plp.310.2019.02.11.07.41.12; Mon, 11 Feb 2019 07:41:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Fa4BNKuf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387695AbfBKOsd (ORCPT + 99 others); Mon, 11 Feb 2019 09:48:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:33780 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729067AbfBKOsa (ORCPT ); Mon, 11 Feb 2019 09:48:30 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 06E34206BA; Mon, 11 Feb 2019 14:48:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549896509; bh=HaGKvFBewvbisdZqV3Lu/Vp4YM5XMgij9rwh4pwXTfA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Fa4BNKufIfA1Py3Ltp7KlSmsL9ZF06hEZyv59hsddihB0w94SOfDHtDfTwv5Xn1p6 ocHYbuOI2poTQAGtyCove6i/Xmm1HpcJiCCL+VHKyh9eRMBcBZy/zPVLEEG+hAs+2m MGipRO2F7EX+0h2Cw3ihSNHVeZ41+d96Rwkeb9GY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mahesh Salgaonkar , Michael Ellerman , Sasha Levin Subject: [PATCH 4.19 207/313] powerpc/fadump: Do not allow hot-remove memory from fadump reserved area. Date: Mon, 11 Feb 2019 15:18:07 +0100 Message-Id: <20190211141906.982126445@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141852.749630980@linuxfoundation.org> References: <20190211141852.749630980@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 0db6896ff6332ba694f1e61b93ae3b2640317633 ] For fadump to work successfully there should not be any holes in reserved memory ranges where kernel has asked firmware to move the content of old kernel memory in event of crash. Now that fadump uses CMA for reserved area, this memory area is now not protected from hot-remove operations unless it is cma allocated. Hence, fadump service can fail to re-register after the hot-remove operation, if hot-removed memory belongs to fadump reserved region. To avoid this make sure that memory from fadump reserved area is not hot-removable if fadump is registered. However, if user still wants to remove that memory, he can do so by manually stopping fadump service before hot-remove operation. Signed-off-by: Mahesh Salgaonkar Signed-off-by: Michael Ellerman Signed-off-by: Sasha Levin --- arch/powerpc/include/asm/fadump.h | 2 +- arch/powerpc/kernel/fadump.c | 10 ++++++++-- arch/powerpc/platforms/pseries/hotplug-memory.c | 7 +++++-- 3 files changed, 14 insertions(+), 5 deletions(-) diff --git a/arch/powerpc/include/asm/fadump.h b/arch/powerpc/include/asm/fadump.h index 1e7a33592e29..15bc07a31c46 100644 --- a/arch/powerpc/include/asm/fadump.h +++ b/arch/powerpc/include/asm/fadump.h @@ -200,7 +200,7 @@ struct fad_crash_memory_ranges { unsigned long long size; }; -extern int is_fadump_boot_memory_area(u64 addr, ulong size); +extern int is_fadump_memory_area(u64 addr, ulong size); extern int early_init_dt_scan_fw_dump(unsigned long node, const char *uname, int depth, void *data); extern int fadump_reserve_mem(void); diff --git a/arch/powerpc/kernel/fadump.c b/arch/powerpc/kernel/fadump.c index a711d22339ea..c02c95287a5f 100644 --- a/arch/powerpc/kernel/fadump.c +++ b/arch/powerpc/kernel/fadump.c @@ -118,13 +118,19 @@ int __init early_init_dt_scan_fw_dump(unsigned long node, /* * If fadump is registered, check if the memory provided - * falls within boot memory area. + * falls within boot memory area and reserved memory area. */ -int is_fadump_boot_memory_area(u64 addr, ulong size) +int is_fadump_memory_area(u64 addr, ulong size) { + u64 d_start = fw_dump.reserve_dump_area_start; + u64 d_end = d_start + fw_dump.reserve_dump_area_size; + if (!fw_dump.dump_registered) return 0; + if (((addr + size) > d_start) && (addr <= d_end)) + return 1; + return (addr + size) > RMA_START && addr <= fw_dump.boot_memory_size; } diff --git a/arch/powerpc/platforms/pseries/hotplug-memory.c b/arch/powerpc/platforms/pseries/hotplug-memory.c index c1578f54c626..e4c658cda3a7 100644 --- a/arch/powerpc/platforms/pseries/hotplug-memory.c +++ b/arch/powerpc/platforms/pseries/hotplug-memory.c @@ -389,8 +389,11 @@ static bool lmb_is_removable(struct drmem_lmb *lmb) phys_addr = lmb->base_addr; #ifdef CONFIG_FA_DUMP - /* Don't hot-remove memory that falls in fadump boot memory area */ - if (is_fadump_boot_memory_area(phys_addr, block_sz)) + /* + * Don't hot-remove memory that falls in fadump boot memory area + * and memory that is reserved for capturing old kernel memory. + */ + if (is_fadump_memory_area(phys_addr, block_sz)) return false; #endif -- 2.19.1