Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3771979pxf; Mon, 29 Mar 2021 10:57:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyIaWSRHCHehGpiTOHWLLEs3mm39BGy3P9ZYxs6zL2KAxIp2thPunGwEnHm7yyEvxlNRtjq X-Received: by 2002:a05:6402:17af:: with SMTP id j15mr29906574edy.50.1617040627011; Mon, 29 Mar 2021 10:57:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617040627; cv=none; d=google.com; s=arc-20160816; b=DLZ8DHqbYmCbXZEtTh+X0cqeFS5AAqMkf5ap0qia49J5DU1sG358aemXiI88iqxbpY 128cHLkzvlTnKmfKCTar2E3AC1tJw3K6LTI4XUjgDNP+Hu8meF/6oCNoZknhX9CL/+mA +5gLrDVi5Xkc10SJF6orMayT643T1h2dvfPY62OWUOvTlCDemlIaCsSbJ3IWG8kKGBII 4mwUSyzyRUYhp0MqN8rUrlqi/unhTJfwEi4/TbNiHSv2Y4ZCCZbbEBQ4EJfGkI7fSp4Q g2ljx3Mm2Lu0NKObNqZxb2fCvJCFzbUMdJx0nAToIoA90ZTphzaQ420kzocurxYR6ZXa FzLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=N6EnRd/MY7h8IstQCaZRWpBwbfFtnJv4s7DJ21C8TVU=; b=GjFOSWfZXFq620m6L906n+hoFvaNtCvFR1zrUYWx84K2LytKxlbrSY5EKuCKxBtXiL uqSViMu825CfqwAJYjtf5V5FC1+DghqePf7WVl9bcynymvLZ8VtPq4YiQO1NRZKIukcU xWj+TmxBrBzNcCzFbgVXo9k0W3hZAct+Qhh/HM/cY7qOTEcTSrLaOClX5oY+nLrIkwFn Sw3vn4eJbh5V4xWpJDfDs6zm/Q4RZdTIBapOmoFefGFKNWB3JZ3Z8Vp7AGQ1fkHcf3XU 5drsWHaX/aQxZko/acEweeBUvFLnLgR911QfAWlkS32dgMPX99j7IX2Ah7boMbW70Bg8 r9GA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@telliq.com header.s=google header.b=CAYs0tgp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gh5si13510757ejb.479.2021.03.29.10.56.44; Mon, 29 Mar 2021 10:57:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@telliq.com header.s=google header.b=CAYs0tgp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229711AbhC2Rxn (ORCPT + 99 others); Mon, 29 Mar 2021 13:53:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229630AbhC2RxV (ORCPT ); Mon, 29 Mar 2021 13:53:21 -0400 Received: from mail-wm1-x330.google.com (mail-wm1-x330.google.com [IPv6:2a00:1450:4864:20::330]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ED076C061574 for ; Mon, 29 Mar 2021 10:53:20 -0700 (PDT) Received: by mail-wm1-x330.google.com with SMTP id n11-20020a05600c4f8bb029010e5cf86347so8876726wmq.1 for ; Mon, 29 Mar 2021 10:53:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telliq.com; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=N6EnRd/MY7h8IstQCaZRWpBwbfFtnJv4s7DJ21C8TVU=; b=CAYs0tgpe8vK037DR+QKaY/dFao1NgmTdZvmoJDVBWeLeSuPcF3sVB1RqBALma6L8e 60P2lVgiHv00myzkjExiWiTZHHsP7a/koD0WhGQ+zNK1slD/vjgM6DrhEZVhmH2+Tnmu Z/mI+39OQ3DTCUwCqMrlnG5aMbvmKzhNwdyUvJ44OPCCWxE0MdElOpdyvE7VNhXccv/5 HebYIbIELrPYac0N9mRrcLivnzbn51nOkbB2tL/qlB5Q0pwMejygyEGxzUBbSykJ3YuR LLyWHvkBLRHBMbVOTCYKZhA1cUYOPBjFs2k3h6OlZiJnMiAZoytiL8wzI5xn/HtZmzbW zm+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=N6EnRd/MY7h8IstQCaZRWpBwbfFtnJv4s7DJ21C8TVU=; b=fDLpJ6sqcxhlK0GO3UyHXMXXqCQMjIL4gtCtUnr+DhfH1OmpU/FQePaThwtlPOaFiS 9I1GBToqlqVK5Do8XmkoWTffQH1R2Vu7B8SaLB6E5mXgZ9SOlNcEjM0uy37DfmE43rPy j5RyHUeu+jYQzb4w65krXeNQS6lrq2l43yHHPUdkvmNu6+P+INaqbhGTntkzFi+hujZt eWQBhlxT78mLznvXpLHvReJapbEiVP7g2APCxgA3JFhQep4PBjhA6tFOtNFU2TEztHVK yH+1pyFe3BLZGT4lUuXS2J6niKUJH9Dhr0VxEqy0HqVXc8gAutSgPW0WuGzfoCvhfrRI lMVg== X-Gm-Message-State: AOAM5314LZXCAFpq6t+JbMQfIkGHzFF1ENewExUDEEdn+P7Dj57Qx2Vs /lcdzZzePDzFWwSE4QssAX3Y/g== X-Received: by 2002:a7b:c841:: with SMTP id c1mr232796wml.123.1617040399629; Mon, 29 Mar 2021 10:53:19 -0700 (PDT) Received: from emu.mida (static-212-247-121-18.cust.tele2.se. [212.247.121.18]) by smtp.gmail.com with ESMTPSA id q4sm154209wma.20.2021.03.29.10.53.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Mar 2021 10:53:19 -0700 (PDT) From: Jan Kardell To: Linux ARM Cc: linux-kernel@vger.kernel.org, Russell King , linux-omap@vger.kernel.org, Andrew Morton , linux-mm@kvack.org Subject: [PATCH] arm: Define arch_is_kernel_initmem_freed() for lockdep Date: Mon, 29 Mar 2021 19:53:18 +0200 Message-Id: <20210329175318.21393-1-jan.kardell@telliq.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This fixes the warning: WARNING: CPU: 0 PID: 1994 at kernel/locking/lockdep.c:1119 alloc_netdev_mqs+0xb4/0x3b0 This warning is because the check in static_obj() assumes that all memory within [_stext, _end] belongs to static objects. The init section is also part of this range, and freeing it allows the buddy allocator to allocate memory from it. To fix this, define arch_is_kernel_initmem_freed() for arm, it will return 1 if initmem has been freed and the address is in the range [__init_begin, __init_end], and this function is called by the static_obj() function in lockdep. Tested on TI am3352 (Cortex A8). This change is modelled after commit 7a5da02de8d6eafba995 ("locking/lockdep: check for freed initmem in static_obj()") for s390 by Gerald Schaefer Signed-off-by: Jan Kardell --- arch/arm/include/asm/sections.h | 13 +++++++++++++ arch/arm/mm/init.c | 6 +++++- 2 files changed, 18 insertions(+), 1 deletion(-) diff --git a/arch/arm/include/asm/sections.h b/arch/arm/include/asm/sections.h index 700b8bcdf9bd..1dd64c90c1ac 100644 --- a/arch/arm/include/asm/sections.h +++ b/arch/arm/include/asm/sections.h @@ -2,6 +2,8 @@ #ifndef _ASM_ARM_SECTIONS_H #define _ASM_ARM_SECTIONS_H +#define arch_is_kernel_initmem_freed arch_is_kernel_initmem_freed + #include extern char _exiprom[]; @@ -11,6 +13,17 @@ extern char __idmap_text_end[]; extern char __entry_text_start[]; extern char __entry_text_end[]; +extern bool initmem_freed; + +static inline int arch_is_kernel_initmem_freed(unsigned long addr) +{ + if (!initmem_freed) + return 0; + return addr >= (unsigned long)__init_begin && + addr < (unsigned long)__init_end; +} + + static inline bool in_entry_text(unsigned long addr) { return memory_contains(__entry_text_start, __entry_text_end, diff --git a/arch/arm/mm/init.c b/arch/arm/mm/init.c index 828a2561b229..cd7a4273797a 100644 --- a/arch/arm/mm/init.c +++ b/arch/arm/mm/init.c @@ -41,6 +41,8 @@ #include "mm.h" +bool initmem_freed; + #ifdef CONFIG_CPU_CP15_MMU unsigned long __init __clear_cr(unsigned long mask) { @@ -523,8 +525,10 @@ void free_initmem(void) fix_kernmem_perms(); poison_init_mem(__init_begin, __init_end - __init_begin); - if (!machine_is_integrator() && !machine_is_cintegrator()) + if (!machine_is_integrator() && !machine_is_cintegrator()) { + initmem_freed = true; free_initmem_default(-1); + } } #ifdef CONFIG_BLK_DEV_INITRD -- 2.26.2