Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp669447ybg; Mon, 1 Jun 2020 11:14:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyuRv0W1y9Hk85Wnlaj20fPCOYHH/8j4VR5qFzhhafFwPCNKDB5FPhw0uOiZYEnlz5OViWb X-Received: by 2002:aa7:c489:: with SMTP id m9mr7591512edq.102.1591035248913; Mon, 01 Jun 2020 11:14:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591035248; cv=none; d=google.com; s=arc-20160816; b=d6IbQaN4gdqvmWJmUxaVrKoSfsSdrsz/SSN12PTnqXzOqFrNJNzO/LaT1/Y90cm7JS mnT+8Z5IqKZFwAI+PTw/ImGjDX2MKro6kYh44BIKH+jRo4DRVa0yWajRyrnJEfHgfpeI xOSMwvj78mB9QXGI3jayyvKLTJEn0KUXGweDvc6BPpBAzWzBuxTggEvV45trkyYF5iJs 2r2ldKBWLpwra48S3YMo4W39QahWTQAJJPzbOhZDEUwhwUxYO6g00eQnqhlK6dHY4hzs ZzuojbX5UN0ZY5SThBC2hTQqQ0BNKYVMOtA/BAt4GjFcMMCMJL42SUZXBlqMNrFZc9nL eSbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3eLFMkyMCockat3JQ+6kqBLFrnjlgLmspNP+Q0C9Z00=; b=npXl46qaMqmgSMJ5j2ISKsBkFK9PVFvTyVW0bf07Dy5GhIvNuN/q27+q2MtNPlhp8L WDdwxhh27OxI3z+/XFZOhkTSmPAydHlbjpO+SvAn55EHomrjE44XPvwigG93H8JuydwH KIbjpa+Te8NLzyAHuR4AvnCNs4L48sLvM0+G7xHiR71wkJl9ZzZyGl3J+EHUEG5LZAU6 H2hVgnKU+d95D/uh//aT2tVRgXNJB3HP44DPY3bBQAOdar0LoajR7wBq4Gl4GkNczuLW sV10OSyOX+UoSuqbbLUZD8MqZrTDzTpg7Oqoq5aDOFbrmJ6gYQjTpN4kjXbLDr1UZFjZ jPcg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RyBGr0C4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a24si115495edm.17.2020.06.01.11.13.45; Mon, 01 Jun 2020 11:14:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RyBGr0C4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730679AbgFASLb (ORCPT + 99 others); Mon, 1 Jun 2020 14:11:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:58492 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729098AbgFASLV (ORCPT ); Mon, 1 Jun 2020 14:11:21 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E3C392077D; Mon, 1 Jun 2020 18:11:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591035080; bh=qMbni6eAjeuG2+cWkNxEQwzV+JWizX32l1JotJgiewA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RyBGr0C4e7jt3DS7tlZP38/G8xIEoTa3GqpUtRHO+2lGxcHu6QsTHxOmxkeCtkujw uMJ9wWU4NVbKR4zEYBcZmLSunJSoR+I+Bd0emZ65TYqlS2a6ybGaTPnW2RImqmr8ki kAJqUwUVnC7Kt5gte7556IaBqNML2SWEsNO6ioC8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Helge Deller , Sasha Levin Subject: [PATCH 5.4 106/142] parisc: Fix kernel panic in mem_init() Date: Mon, 1 Jun 2020 19:54:24 +0200 Message-Id: <20200601174048.945137274@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200601174037.904070960@linuxfoundation.org> References: <20200601174037.904070960@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Helge Deller [ Upstream commit bf71bc16e02162388808949b179d59d0b571b965 ] The Debian kernel v5.6 triggers this kernel panic: Kernel panic - not syncing: Bad Address (null pointer deref?) Bad Address (null pointer deref?): Code=26 (Data memory access rights trap) at addr 0000000000000000 CPU: 0 PID: 0 Comm: swapper Not tainted 5.6.0-2-parisc64 #1 Debian 5.6.14-1 IAOQ[0]: mem_init+0xb0/0x150 IAOQ[1]: mem_init+0xb4/0x150 RP(r2): start_kernel+0x6c8/0x1190 Backtrace: [<0000000040101ab4>] start_kernel+0x6c8/0x1190 [<0000000040108574>] start_parisc+0x158/0x1b8 on a HP-PARISC rp3440 machine with this memory layout: Memory Ranges: 0) Start 0x0000000000000000 End 0x000000003fffffff Size 1024 MB 1) Start 0x0000004040000000 End 0x00000040ffdfffff Size 3070 MB Fix the crash by avoiding virt_to_page() and similar functions in mem_init() until the memory zones have been fully set up. Signed-off-by: Helge Deller Cc: stable@vger.kernel.org # v5.0+ Signed-off-by: Sasha Levin --- arch/parisc/mm/init.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/parisc/mm/init.c b/arch/parisc/mm/init.c index ddca8287d43b..3e54484797f6 100644 --- a/arch/parisc/mm/init.c +++ b/arch/parisc/mm/init.c @@ -588,7 +588,7 @@ void __init mem_init(void) > BITS_PER_LONG); high_memory = __va((max_pfn << PAGE_SHIFT)); - set_max_mapnr(page_to_pfn(virt_to_page(high_memory - 1)) + 1); + set_max_mapnr(max_low_pfn); memblock_free_all(); #ifdef CONFIG_PA11 -- 2.25.1