0172-x86-doc-Remove-obvious-weirdnesses-from-the-x86-MM-l.patch 3.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485
  1. From 8ae2a4b32fa54630c9b3c2302aa8faeb5a513e98 Mon Sep 17 00:00:00 2001
  2. From: Peter Zijlstra <[email protected]>
  3. Date: Tue, 5 Dec 2017 13:34:54 +0100
  4. Subject: [PATCH 172/242] x86/doc: Remove obvious weirdnesses from the x86 MM
  5. layout documentation
  6. MIME-Version: 1.0
  7. Content-Type: text/plain; charset=UTF-8
  8. Content-Transfer-Encoding: 8bit
  9. CVE-2017-5754
  10. Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
  11. Signed-off-by: Thomas Gleixner <[email protected]>
  12. Cc: Andy Lutomirski <[email protected]>
  13. Cc: Boris Ostrovsky <[email protected]>
  14. Cc: Borislav Petkov <[email protected]>
  15. Cc: Brian Gerst <[email protected]>
  16. Cc: Dave Hansen <[email protected]>
  17. Cc: David Laight <[email protected]>
  18. Cc: Denys Vlasenko <[email protected]>
  19. Cc: Eduardo Valentin <[email protected]>
  20. Cc: Greg KH <[email protected]>
  21. Cc: H. Peter Anvin <[email protected]>
  22. Cc: Josh Poimboeuf <[email protected]>
  23. Cc: Juergen Gross <[email protected]>
  24. Cc: Linus Torvalds <[email protected]>
  25. Cc: Peter Zijlstra <[email protected]>
  26. Cc: Will Deacon <[email protected]>
  27. Cc: [email protected]
  28. Cc: [email protected]
  29. Cc: [email protected]
  30. Cc: [email protected]
  31. Cc: [email protected]
  32. Signed-off-by: Ingo Molnar <[email protected]>
  33. (cherry picked from commit e8ffe96e5933d417195268478479933d56213a3f)
  34. Signed-off-by: Andy Whitcroft <[email protected]>
  35. Signed-off-by: Kleber Sacilotto de Souza <[email protected]>
  36. (cherry picked from commit d9012133906878a404cf47acc168ff9e4b10e379)
  37. Signed-off-by: Fabian Grünbichler <[email protected]>
  38. ---
  39. Documentation/x86/x86_64/mm.txt | 12 +++---------
  40. 1 file changed, 3 insertions(+), 9 deletions(-)
  41. diff --git a/Documentation/x86/x86_64/mm.txt b/Documentation/x86/x86_64/mm.txt
  42. index 83ca5a3b90ac..63a41671d25b 100644
  43. --- a/Documentation/x86/x86_64/mm.txt
  44. +++ b/Documentation/x86/x86_64/mm.txt
  45. @@ -1,6 +1,4 @@
  46. -<previous description obsolete, deleted>
  47. -
  48. Virtual memory map with 4 level page tables:
  49. 0000000000000000 - 00007fffffffffff (=47 bits) user space, different per mm
  50. @@ -49,8 +47,9 @@ ffffffffffe00000 - ffffffffffffffff (=2 MB) unused hole
  51. Architecture defines a 64-bit virtual address. Implementations can support
  52. less. Currently supported are 48- and 57-bit virtual addresses. Bits 63
  53. -through to the most-significant implemented bit are set to either all ones
  54. -or all zero. This causes hole between user space and kernel addresses.
  55. +through to the most-significant implemented bit are sign extended.
  56. +This causes hole between user space and kernel addresses if you interpret them
  57. +as unsigned.
  58. The direct mapping covers all memory in the system up to the highest
  59. memory address (this means in some cases it can also include PCI memory
  60. @@ -60,9 +59,6 @@ vmalloc space is lazily synchronized into the different PML4/PML5 pages of
  61. the processes using the page fault handler, with init_top_pgt as
  62. reference.
  63. -Current X86-64 implementations support up to 46 bits of address space (64 TB),
  64. -which is our current limit. This expands into MBZ space in the page tables.
  65. -
  66. We map EFI runtime services in the 'efi_pgd' PGD in a 64Gb large virtual
  67. memory window (this size is arbitrary, it can be raised later if needed).
  68. The mappings are not part of any other kernel PGD and are only available
  69. @@ -74,5 +70,3 @@ following fixmap section.
  70. Note that if CONFIG_RANDOMIZE_MEMORY is enabled, the direct mapping of all
  71. physical memory, vmalloc/ioremap space and virtual memory map are randomized.
  72. Their order is preserved but their base will be offset early at boot time.
  73. -
  74. --Andi Kleen, Jul 2004
  75. --
  76. 2.14.2