Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3722961pxf; Mon, 22 Mar 2021 13:21:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwe9rfoD6dn8qLkOIELlhxJxluhlln63YF3cRJZDv17LrtrHIEyVP9/Mfs5vuR29G4gE7ec X-Received: by 2002:a17:906:6703:: with SMTP id a3mr1513925ejp.240.1616444517162; Mon, 22 Mar 2021 13:21:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616444517; cv=none; d=google.com; s=arc-20160816; b=KTpAdJElcDXY7VR2i4VtjV/fNc7kRNs0lgUXFdk2D8NW4EnAtW0G8UjlQsoaWokvqt ZCg5uizmDuR8l9FRia8JAdKdVpF6DhdQiTf0jRijGzlMffm6uaKnHkJNaFDIzYjLdGKq x3aFFBTaAi/dp2joES2nefUc9a6s+mT8NHVkK/O1l9QP5E6GBQ0mEKUU561izBW6q1zO i0PGxjScBEc3ME+Pc7YBtTAHxousxqyYyHHpf83fXdMOJGNvdAneW/rg2kxBps9Ws3DM DfYOZt4b+eKesSOu3Xxi5F0qQdZ4ipEoiQcL693c7uBKziMOoWDAonJaBOW8d5QIyy9G uceg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:from:subject; bh=6NQFxVUjOVDYmXmDkqz8NDdIk4LQy2qScQnNX0tWDVk=; b=qZVd5+lQje9L5JKlbltHD2axfLnM+ns6EU/+CsF0QBEXR+0H4N197r+JKiooC2cOkD 0jBcesmosLvGouTOrLYO6A1Yx0eohpzSQu8iqHQltRRmbYN6AUntVRjBMOESXTtbtSq4 2ZgD1rZPefTNNVjk3LmLr0qRh4O4lP6ZKj9ldyhVFJhphK+Eo/AEPle9tNsDOwABotec NZjlhgEW9hLC389QUwM0megp1vuKDOTNJB2TOVTCYjY+e5wbkyNMwO6SNKdN0ubjT2Oy tMZwptQhxelw2x8EUmBwPnbsPwRIxYuMnAh9/mPLxSN9dQWjFxs+BciNdZDnmEzYQYCv fi+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=siemens.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r12si12420150ejz.5.2021.03.22.13.21.34; Mon, 22 Mar 2021 13:21:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=siemens.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231799AbhCVUUo (ORCPT + 99 others); Mon, 22 Mar 2021 16:20:44 -0400 Received: from gecko.sbs.de ([194.138.37.40]:40423 "EHLO gecko.sbs.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231181AbhCVUUR (ORCPT ); Mon, 22 Mar 2021 16:20:17 -0400 Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by gecko.sbs.de (8.15.2/8.15.2) with ESMTPS id 12MKK63B032536 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 22 Mar 2021 21:20:06 +0100 Received: from [167.87.37.70] ([167.87.37.70]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTP id 12MKF5ct032167; Mon, 22 Mar 2021 21:15:05 +0100 Subject: Re: [PATCH] of/fdt: Make sure no-map does not remove already reserved regions From: Jan Kiszka To: Nicolas Boichat , Rob Herring , Andre Przywara , Phil Elwell Cc: Frank Rowand , devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, Ian Campbell , Grant Likely , Stephen Boyd References: <20190703050827.173284-1-drinkcat@chromium.org> <12b02977-d038-8fc7-d61e-e694a6b90f7b@siemens.com> <5154396c-fffd-8e9d-3e2e-860fff35e9fc@siemens.com> Message-ID: <6a283aef-388d-c300-8304-503bc88a4dcf@siemens.com> Date: Mon, 22 Mar 2021 21:15:05 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.0 MIME-Version: 1.0 In-Reply-To: <5154396c-fffd-8e9d-3e2e-860fff35e9fc@siemens.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22.03.21 19:05, Jan Kiszka wrote: > On 22.03.21 08:58, Jan Kiszka wrote: >> On 03.07.19 07:08, Nicolas Boichat wrote: >>> If the device tree is incorrectly configured, and attempts to >>> define a "no-map" reserved memory that overlaps with the kernel >>> data/code, the kernel would crash quickly after boot, with no >>> obvious clue about the nature of the issue. >>> >>> For example, this would happen if we have the kernel mapped at >>> these addresses (from /proc/iomem): >>> 40000000-41ffffff : System RAM >>> 40080000-40dfffff : Kernel code >>> 40e00000-411fffff : reserved >>> 41200000-413e0fff : Kernel data >>> >>> And we declare a no-map shared-dma-pool region at a fixed address >>> within that range: >>> mem_reserved: mem_region { >>> compatible = "shared-dma-pool"; >>> reg = <0 0x40000000 0 0x01A00000>; >>> no-map; >>> }; >>> >>> To fix this, when removing memory regions at early boot (which is >>> what "no-map" regions do), we need to make sure that the memory >>> is not already reserved. If we do, __reserved_mem_reserve_reg >>> will throw an error: >>> [ 0.000000] OF: fdt: Reserved memory: failed to reserve memory >>> for node 'mem_region': base 0x0000000040000000, size 26 MiB >>> and the code that will try to use the region should also fail, >>> later on. >>> >>> We do not do anything for non-"no-map" regions, as memblock >>> explicitly allows reserved regions to overlap, and the commit >>> that this fixes removed the check for that precise reason. >>> >>> Fixes: 094cb98179f19b7 ("of/fdt: memblock_reserve /memreserve/ regions in the case of partial overlap") >>> Signed-off-by: Nicolas Boichat >>> --- >>> drivers/of/fdt.c | 10 +++++++++- >>> 1 file changed, 9 insertions(+), 1 deletion(-) >>> >>> diff --git a/drivers/of/fdt.c b/drivers/of/fdt.c >>> index cd17dc62a71980a..a1ded43fc332d0c 100644 >>> --- a/drivers/of/fdt.c >>> +++ b/drivers/of/fdt.c >>> @@ -1138,8 +1138,16 @@ int __init __weak early_init_dt_mark_hotplug_memory_arch(u64 base, u64 size) >>> int __init __weak early_init_dt_reserve_memory_arch(phys_addr_t base, >>> phys_addr_t size, bool nomap) >>> { >>> - if (nomap) >>> + if (nomap) { >>> + /* >>> + * If the memory is already reserved (by another region), we >>> + * should not allow it to be removed altogether. >>> + */ >>> + if (memblock_is_region_reserved(base, size)) >>> + return -EBUSY; >>> + >>> return memblock_remove(base, size); >>> + } >>> return memblock_reserve(base, size); >>> } >>> >>> >> >> Likely the wrong patch to blame but hopefully the right audience: >> >> I'm trying to migrate my RPi4 setup to mainline, and this commit breaks >> booting with TF-A (current master) in the loop. Error: >> >> [ 0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd083] >> [ 0.000000] Linux version 5.10.24+ (jan@md1f2u6c) (aarch64-linux-gnu-gcc (GNU Toolchain for the A-profile Architecture 9.2-2019.12 (arm-9.10)) 9.2.1 20191025, GNU ld (GNU Toolchain for the A-profile Architecture 9.2-2019.12 (arm-9.10)1 >> [ 0.000000] Machine model: Raspberry Pi 4 Model B Rev 1.1 >> [ 0.000000] efi: UEFI not found. >> [ 0.000000] OF: fdt: Reserved memory: failed to reserve memory for node 'atf@0': base 0x0000000000000000, size 0 MiB >> >> And then we hang later on when Linux does start to use that memory and >> seems to trigger an exception. >> >> Is there a bug in the upstream RPi4 DT? >> > > FWIW, this is triggering the conflict: > > (arch/arm/boot/dts/bcm283x.dtsi) > > /* firmware-provided startup stubs live here, where the secondary CPUs are > * spinning. > */ > /memreserve/ 0x00000000 0x00001000; > > I strongly suspect this is only needed in case of TF-A-free boot. With > TF-A we have standard PCSI (my motivation to use TF-A in the first > place) - and then this is in conflict with the firmware's reservation. > > Do we need separate DTs for this use case? Or should TF-A account for > this? > Nah, TF-A issue: https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/9316 With that applied, upstream kernel & DT work fine. Jan -- Siemens AG, T RDA IOT Corporate Competence Center Embedded Linux