Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp5652014ybi; Wed, 31 Jul 2019 01:04:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqxg4u2Xa8VWmvxIcw+1DjCxk6J5paZC53DXZtB+NYhr4yszoolgsSwrVDq9t0PSD5t7XHgO X-Received: by 2002:a17:902:bd06:: with SMTP id p6mr122281007pls.189.1564560242307; Wed, 31 Jul 2019 01:04:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564560242; cv=none; d=google.com; s=arc-20160816; b=PhpqD36YanSYKxZ4QcmvEHVp5ekiWnfeR5VQ8tZzJtq73zm9cUZ/Uwh5iy/XdBEFog ntT32EOWP/hZvLQZ6aiOUzWYXvwpC6iHL+QF8ZnxS+y3osifJ2hLxToJKS8ivtigeJri Dq+BQLW9qJ+hJfvLuZzzoiUHc+OejZXydKCNqokhCrTAijIWpBC8R6V1xcrx+9GaVhXd eFnbmfH7pUa3t62oBmFjFgq9vIxLAf7ftnrmNbR16Rq0XYUDUQM9lRnCdibPNIlAjtng STc23qNGL9X//uVWF3i3myGb7XHUI1Wd2aLLiHSrq9ixK58n6ngEuueMgrLoO8mnipdY xtRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:cc:to:from:subject:dkim-signature; bh=urMfCkzEN/XPPc7SqG4losLKhjWS1AUFXYonBDS8tIc=; b=fybw7QbLWBrjoNcptL7M2lr6exhmFuNjVLIVHfM7ssJ2w9ZsN2GLQgPXXcdE5ZOu0a Gno8KrSoZlTBViaFys9cqmTcLTvhKmMZJrxu01w5GrIoN9YUS9DR08JOGVW8U/SJzPsq 46csP+KBguMR8GLZctu15P0ohflHjuhk60oKly6oSkXSULmPELZYo+ZM2TNc88Eyj7Zk xPItzDVcJMlZ3cbnoJISaQVoWRn9Jr6kT+4JAwcssVx6QMrIsSyHYGUf94SIwAsvlowZ IEUNiCMqdjBJYa21SHRuYwzZk4zBBVTHlykGEHHragF0K6Y8DrOaNrxoBlsPKGcHyC3I 6Ikg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=YUDfNzOg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d10si30118976pla.135.2019.07.31.01.03.46; Wed, 31 Jul 2019 01:04:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=YUDfNzOg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726888AbfGaIDA (ORCPT + 99 others); Wed, 31 Jul 2019 04:03:00 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:55848 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725866AbfGaIC7 (ORCPT ); Wed, 31 Jul 2019 04:02:59 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 45z5Wh6ggWzB09bK; Wed, 31 Jul 2019 10:02:56 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=YUDfNzOg; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id ckumsCPzUguK; Wed, 31 Jul 2019 10:02:56 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 45z5Wh5d4TzB09bJ; Wed, 31 Jul 2019 10:02:56 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1564560176; bh=urMfCkzEN/XPPc7SqG4losLKhjWS1AUFXYonBDS8tIc=; h=Subject:From:To:Cc:References:Date:In-Reply-To:From; b=YUDfNzOgYerwaUTgkGYUQWXkAUNWw6NartKTZNY/ZpSPpUCRbyki4Yn8kXHFw5kpb U1ld57JoZzua+Kl4joibhHo5INE/QdMNLosHCpYu9bsIO1DTiuDY3R224SSeKnDQdD f2pUO8OHY0np8g/4EWSo6NVw5yEW4TXDF7xhWZX0= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 752CE8B82A; Wed, 31 Jul 2019 10:02:57 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id dwz4ruHw_B_A; Wed, 31 Jul 2019 10:02:57 +0200 (CEST) Received: from [192.168.4.90] (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id C340C8B752; Wed, 31 Jul 2019 10:02:56 +0200 (CEST) Subject: Re: [PATCH] powerpc/kasan: fix early boot failure on PPC32 From: Christophe Leroy To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org References: Message-ID: <2f29b91a-11cd-8385-74b6-d85e515012c3@c-s.fr> Date: Wed, 31 Jul 2019 10:02:56 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 31/07/2019 à 08:01, Christophe Leroy a écrit : > Due to commit 4a6d8cf90017 ("powerpc/mm: don't use pte_alloc_kernel() > until slab is available on PPC32"), pte_alloc_kernel() cannot be used > during early KASAN init. > > Fix it by using memblock_alloc() instead. > > Reported-by: Erhard F. > Fixes: 2edb16efc899 ("powerpc/32: Add KASAN support") > Signed-off-by: Christophe Leroy Cc: stable@vger.kernel.org > --- > arch/powerpc/mm/kasan/kasan_init_32.c | 7 +++++-- > 1 file changed, 5 insertions(+), 2 deletions(-) > > diff --git a/arch/powerpc/mm/kasan/kasan_init_32.c b/arch/powerpc/mm/kasan/kasan_init_32.c > index 0d62be3cba47..74f4555a62ba 100644 > --- a/arch/powerpc/mm/kasan/kasan_init_32.c > +++ b/arch/powerpc/mm/kasan/kasan_init_32.c > @@ -21,7 +21,7 @@ static void kasan_populate_pte(pte_t *ptep, pgprot_t prot) > __set_pte_at(&init_mm, va, ptep, pfn_pte(PHYS_PFN(pa), prot), 0); > } > > -static int kasan_init_shadow_page_tables(unsigned long k_start, unsigned long k_end) > +static int __ref kasan_init_shadow_page_tables(unsigned long k_start, unsigned long k_end) > { > pmd_t *pmd; > unsigned long k_cur, k_next; > @@ -35,7 +35,10 @@ static int kasan_init_shadow_page_tables(unsigned long k_start, unsigned long k_ > if ((void *)pmd_page_vaddr(*pmd) != kasan_early_shadow_pte) > continue; > > - new = pte_alloc_one_kernel(&init_mm); > + if (slab_is_available()) > + new = pte_alloc_one_kernel(&init_mm); > + else > + new = memblock_alloc(PTE_FRAG_SIZE, PTE_FRAG_SIZE); > > if (!new) > return -ENOMEM; >