Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3387109ybp; Sun, 6 Oct 2019 10:48:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqyZoFfnvFYXdzg11G8b+4f27w2k0TCmhnYAIwVmtYOSWjW8XENBzWceWUxjm+/Ts0lDDpi0 X-Received: by 2002:a05:6402:794:: with SMTP id d20mr25377894edy.20.1570384124702; Sun, 06 Oct 2019 10:48:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570384124; cv=none; d=google.com; s=arc-20160816; b=YZG8bKpisNsy4Jp7RW+GO7c3G4sg45z/k+l9lHUqV5Yu+qrARrXKPKrI6bGrs5nTCU RTIo/NPtqbr2HjmLxLZaQbv/dAgvnibs/KyRpBcEvFeBLkMMcGQylmdNGTv/JVkQSjXu ybjmYQgC8/3lXmEcWzWk1DqCdNaWhHvrf2bz1fHBEn4lDMRCm6LzQ61PF0ROQjOjrEN1 YbpW+hRV9WSnamar1iPmTtRrYANfb7TLGEH4vSbIxqmJ9gZbjqaoOwPt+KMqXjZZXOhX APAxLNni6f0TxV+GtaFJOKoVpdvnv9M642JoRNmvqBNQJ2Mj1oidG4hhy1DW/gwdbb14 Cnmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Bp2FR0vwkO49ehMN/tiEELikeTPGH2ynpIJw84abSr4=; b=Bvf8EYBN2jr9vqIQtH8bKklRSUz2fuSjTeCSZrggtkiVc0j/y8u68eVeUEPSsYNqqm ANX1rjLwqbwnXYIqGDtFdtMdo5y4ojEZxuPfdAQU22N9AyXPFdsQE0c67t4rMoTnROaY p3bzXApZ3dw4dy1ft0g6w2zUUzIROASSDyB4gya3rYw9z5qmbnL+Y3/q1h3yLic5K/uT 1o37BCeiO6Rs5223SDLRALA457grYOKdGcawk/bL4Mwovyb7Rc0tR3JOVuzxY5j3in62 yt2tHptSlAWAzjJsuoBhzSbC5tUoVWsyV8dcQN8uYDEn6fVaWjL1YbxwR6WEJqmXEfRU ggzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NbQ0h6me; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a16si6167639ejb.54.2019.10.06.10.48.20; Sun, 06 Oct 2019 10:48:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NbQ0h6me; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731386AbfJFRmt (ORCPT + 99 others); Sun, 6 Oct 2019 13:42:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:42648 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728632AbfJFRmq (ORCPT ); Sun, 6 Oct 2019 13:42:46 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0ED2720862; Sun, 6 Oct 2019 17:42:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383765; bh=uF6LpAxsYE0kGQZyHL/8g2CnZUbyHV5+7kIbwDuFRO0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NbQ0h6meoi3MGsD6KNcOp6nSVwS1zh7+68xA5EODmASjEVpbLZSxmvEqi1aAz7WZE nQ+DqvG4FFrQvySD47dKGA32kTlrikWp1hNJfDlY010n1WtZhSCuIKKwAtwZY6MfNh 8aoHXG+N+M2gweni0krS4BGXDUyNdcr5LYjfGbSE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicholas Piggin , "Aneesh Kumar K.V" , Michael Ellerman , Sasha Levin Subject: [PATCH 5.3 043/166] powerpc/64s/radix: Fix memory hotplug section page table creation Date: Sun, 6 Oct 2019 19:20:09 +0200 Message-Id: <20191006171216.583275848@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171212.850660298@linuxfoundation.org> References: <20191006171212.850660298@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicholas Piggin [ Upstream commit 8f51e3929470942e6a8744061254fdeef646cd36 ] create_physical_mapping expects physical addresses, but creating and splitting these mappings after boot is supplying virtual (effective) addresses. This can be irritated by booting with mem= to limit memory then probing an unused physical memory range: echo > /sys/devices/system/memory/probe This mostly works by accident, firstly because __va(__va(x)) == __va(x) so the virtual address does not get corrupted. Secondly because pfn_pte masks out the upper bits of the pfn beyond the physical address limit, so a pfn constructed with a 0xc000000000000000 virtual linear address will be masked back to the correct physical address in the pte. Fixes: 6cc27341b21a8 ("powerpc/mm: add radix__create_section_mapping()") Signed-off-by: Nicholas Piggin Reviewed-by: Aneesh Kumar K.V Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/20190724084638.24982-1-npiggin@gmail.com Signed-off-by: Sasha Levin --- arch/powerpc/mm/book3s64/radix_pgtable.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/powerpc/mm/book3s64/radix_pgtable.c b/arch/powerpc/mm/book3s64/radix_pgtable.c index b4ca9e95e6781..c5cc16ab1954e 100644 --- a/arch/powerpc/mm/book3s64/radix_pgtable.c +++ b/arch/powerpc/mm/book3s64/radix_pgtable.c @@ -902,7 +902,7 @@ int __meminit radix__create_section_mapping(unsigned long start, unsigned long e return -1; } - return create_physical_mapping(start, end, nid); + return create_physical_mapping(__pa(start), __pa(end), nid); } int __meminit radix__remove_section_mapping(unsigned long start, unsigned long end) -- 2.20.1