Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934302AbdDGQln (ORCPT ); Fri, 7 Apr 2017 12:41:43 -0400 Received: from mail-he1eur01on0096.outbound.protection.outlook.com ([104.47.0.96]:59104 "EHLO EUR01-HE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1756250AbdDGQld (ORCPT ); Fri, 7 Apr 2017 12:41:33 -0400 Authentication-Results: virtuozzo.com; dkim=none (message not signed) header.d=none;virtuozzo.com; dmarc=none action=none header.from=virtuozzo.com; Subject: Re: [PATCHv3 8/8] x86/mm: Allow to have userspace mappings above 47-bits To: "Kirill A. Shutemov" , Linus Torvalds , Andrew Morton , , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" References: <4c8cd9a9-2013-2a74-6bea-d7dc7207abb1@virtuozzo.com> <20170407154428.14070-1-kirill.shutemov@linux.intel.com> CC: Andi Kleen , Dave Hansen , Andy Lutomirski , , , From: Dmitry Safonov Message-ID: Date: Fri, 7 Apr 2017 19:37:21 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <20170407154428.14070-1-kirill.shutemov@linux.intel.com> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [195.214.232.6] X-ClientProxiedBy: HE1PR0802CA0011.eurprd08.prod.outlook.com (10.172.123.149) To DB6PR0801MB1736.eurprd08.prod.outlook.com (10.169.227.7) X-MS-Office365-Filtering-Correlation-Id: 9f616d02-9795-4ad8-1a92-08d47dd4f091 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(201703131423075)(201703031133081);SRVR:DB6PR0801MB1736; X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1736;3:pnIRaUiIwN9it+g6oEwcqucRDXWi7eoSky/OEFPRBhRDknrlHryBxO28N4odJcJ6mP/0Jv5NkdHtvVzZqdg0jDojI17h4PzjkJSwPGEVMdJhj4jQ8ewWyt4Wo0tvnYwqb0qsPwV2TzXhT+8n8qH4ZZEGDKOxAuq3rvJORrts0o+i57zKa+BchvHQjXp6sRnE73CXIlz5UvrvlCdLl865JdWFamgJCWYoTictdwK6Lj4qKYYE652N21pN+/VDwtFJcDGbKVKTUuOWi0u+w6Nlzu7fN5yfY5SwfsAn6T7rDlnNrXxRG4NdEckbWmH8acllTD/GLTwsp34NpJFFMlsGZg==;25:a9lohD2YWRzBMmyApIFjuLhc3UkaslnEjTbZwMNNj6QO6LznwNz3gvqDfTxGwbo2hheYmM/L+WhVzfAwZ7MTU0eTkdbh/QgmOjcqbPDf3DuzALUblEPip59v/6p8wrgmoZ9002nVubcd6zreH2WH15Iyxs0muCnyeIDM8CfeLIiFyKSUw5PisMBzeaDGZlEq3zvBJCRmW9Y+mK14LqL5wM5/ZJzdas+NY+TP0ntMdhcT4pdcV86hNuSYkYMKQ8WbRyLMA8qh4Ji6wt1e5VaEM1C83fjsQl0n4iLdy50TzLIpWO3Z1NpSNE1xnZKC0NbK+1vdPfVuBS1N6r92IP6Xqt+x+3K9Pz+acu6vTt4eyT2lnt5goo5nsdCedUFVM7e3WqVmpnLSeJ+S95HiQnZpvHygCXXW4LKPnZlDhWK7CHJD6+J9eMNXiw5ed2QeGCyQJu8T7AJSvOrI7zF6/8bGuA== X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1736;31:lSD9aEsnQXSngF2KJbhqt5FEzttXvhHj+nID+DZnp1RZd22uSHJy3ZWmbdj1s521w/83KicloeSfK49IjrDBwFLE2aOQA4i5GD2K7Hiv6NZXE4l6lhfTipSkeBK93xXKPoRxiYhjF3h5X//OFffpGoskFlMGzCGfM1sqAgR3N3PwxNje+dxP/wJNQoFFWwfIpNFh6hge9WUxIrnviCNkJzrR8Lzm+a9IX7SOVmmfBEVNsUoB5kvmfdMXLYy3t8WOAPliCY70ecc/VhOdAXqHOw==;20:pvLlYTwIGFKelnllelMaGZrCs2DmjchgWWcL7CVgIqanNOzzCeryczJd80SIfXJZhRM0+xWZe8Y7x4MNTwTw6mltUeUcZbuMb3jOMHilphiE/GLvGP9z+nSkkccgoTdJZIlhGeRNEoAlIIqGTbx4xiohNhWpz3xwfJ/nq8+eGiTv6g7VwZsAXkkge48DWPQCs9Ypj+LJt/FfwZoUrOdBloPaXTtLJfm+xPtl1KqKR/QqvV12B3hm+yoqYFuDWlgUTGIBxBZJf50RL9ZovR/9+9LnD3M4i4GOp53/O3fZgdp0x002lekf3BDIqUqT+mL/kGU3ZyaeAukPGT3C1brw1dSX5pKeSkjVHSjgZnvQ1hoihj3H/7Q476O7jkasP9WdpiSxFUi+VWlsnPQ5q9HWCcbTyzHOmP5hDYXhXZGywJs= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(228905959029699); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(6041248)(20161123560025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(20161123562025)(20161123555025)(6072148);SRVR:DB6PR0801MB1736;BCL:0;PCL:0;RULEID:;SRVR:DB6PR0801MB1736; X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1736;4: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 X-Forefront-PRVS: 0270ED2845 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(4630300001)(6009001)(6049001)(39450400003)(39410400002)(39830400002)(39400400002)(52314003)(377454003)(24454002)(7736002)(31686004)(229853002)(4001350100001)(81166006)(42186005)(31696002)(50466002)(36756003)(23746002)(38730400002)(8676002)(86362001)(575784001)(77096006)(90366009)(6246003)(47776003)(6486002)(66066001)(25786009)(33646002)(65956001)(53936002)(4326008)(54356999)(50986999)(53546009)(2950100002)(3846002)(6116002)(2906002)(5660300001)(7416002)(83506001)(230700001)(6666003)(189998001)(76176999)(305945005);DIR:OUT;SFP:1102;SCL:1;SRVR:DB6PR0801MB1736;H:[172.16.25.13];FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1;DB6PR0801MB1736;23:r31ybQUOqaFCYqJ+564v1L0mWbgyeWAS+12?= =?Windows-1252?Q?q4S6duaSsx/ky9eLDWthwv+O6anf2MY7i6INX5o1YqYR0EvNc+G+EmKB?= =?Windows-1252?Q?D9RkI4aESGS27c/GsyavDv8KrssTUma0or/P/C0QP5Fm2OZS0xeL3sA7?= =?Windows-1252?Q?luHi26CVTqhuDJ1LUIMH/6Yr2iZ7AVopM8W9qz7DjLzV6C3spuYrs+em?= =?Windows-1252?Q?ATR9JQ14LsP73SmNNFKEQNRw/7YafMQkpyDw49SsR5L6wL/1hw+Osru/?= =?Windows-1252?Q?Ltca6w4wdpRfbmFdx0fhRDfZzcoV7aarSrxc4/Mot4Yv/dezrixhEVE3?= =?Windows-1252?Q?LW4DPAd9+TrhLAWD6mVWHsBskwMGEzE3qVTFZQeGmhlk0dQeE7b8BNFX?= =?Windows-1252?Q?WYOULIw4FlnjsyVLAVsTHjkPdvG5+vi+Hy30mzG5Bv8efAYsdAVBW/vN?= =?Windows-1252?Q?XQ0nDCzgQc50dxdlpnNvvpNKMkegB28MqOYiN02CwgNb8axmuVS66owe?= =?Windows-1252?Q?KJEPSx63jYu/eQyB4AD0go1ypH3srVOJzQgpp793M5jwOYjYj5ShK45r?= =?Windows-1252?Q?SEA9E/UgKOANGVyBNTqlGiDBEL0kd2Cx1NP8g2wf14VNSnPJAO0TKOZ2?= =?Windows-1252?Q?mNqNTdu7+Hi6oKvDCc5uxZaaOBmqlyoz0/+I+LdHaqOQYD7JZClXCVfH?= =?Windows-1252?Q?eJKWOaBAqmPh/8AZ4n52gMjKIAalXDcP9rNm7FhFefW/oq9qimdYUltq?= =?Windows-1252?Q?8o3ikcIQ9ML5PW3c/PA6cB1SFRcUw/KWLaBKsR1Oukk6t8GP03IYF739?= =?Windows-1252?Q?WMoNPjv6yFivSBnh8KsziKBA2OSZi5ejLgnl+V0y16MF7cwCm+dgNW6Z?= =?Windows-1252?Q?Bqf4qWMhgcrn7eHtE8jmttuoFxvmEkIUqnQPqAnt1TqLgH2s/4gqWnHF?= =?Windows-1252?Q?gwsHI+EgVtEOelFPrySMlN5dzd4gQ2J4lGRT9qfEsXpQv8rqC1UWwIyS?= =?Windows-1252?Q?52bTEvtofrCefsJs8EP9/sePeWMPTpBP2Mk4rzlkvmG+rjZIpyaCeWga?= =?Windows-1252?Q?vMsdWSrO/9d5Wc7SEjhJUYO6x628n5guLsgDDuBD81Nl1tMem2IsQ3nk?= =?Windows-1252?Q?9MA+uaspjnQax/eU9S6Sh43cxySCrDcov62JBE/M8GXWTEYUqDaZkLp/?= =?Windows-1252?Q?qbhASFE8p8Du7s44vILPIxO0cAbOhCfTnOXf3o1hOzzSp9Fbr5jDfZgK?= =?Windows-1252?Q?cKg8Ggrmb0GfJkr8WaMKRckTWoc+qXV7TiobAlUkU56w3r/dGokkOCsH?= =?Windows-1252?Q?sMiTehAJs7QeedRGTGNTJkI4WsU1o1qlBifGe7JZqwe/eD/A=3D?= X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1736;6:5hZbvNJTkZhlrOXYIQWEi9HgyxiOQDaqw5nwsUR4n0KbvXZg4gdv/ty9iv56rCSUapekCayEKCY1hgc1jh9/aqVaaXqtpqD3JhiJtAoDWxF6UiUFcZZ13y+XXNwLuf/9MCclaFaQyts4aP+CeRYpq+W4LeUc9W1/nTpJ+bBriEw37jDi9YLbG++y4QL7LBrhwJiekb5LQoVsy0uCC8DaNusXvv41f+rGg3DmeH92VZ2SF+fXSAzffjyWLEJz0L+A+rh0eeSuC2mkSP6exBY1iSs3nKYEXSuvsxZ8YMWWfzVrdhp7FKN6MQeiaH21PqS6SJsi7pBpqQd45HLGDLaI7WkgEHBu0gZQZcYGdJUHWuK7H0k1k5PEDXR6Z5LlskQBjvzqjcxpzUZSbqy4JkDE7eKzqYdTHAfSldC2lYj0pw7P75w+9rRbwonAU2II21cHR13W9zSCgegxzMKS6j/rqQ==;5:T4tPu134eNeV4zScGgK6m8cXJSyA5hl1n6wcVj5geruenIgskoF4fBijeYCsDEgKCwM5a+0xvATg1Fw9JhHYT8wAsvc061u291SB1k8YywO6Ye4JouN86BZ05c2UCfqTQXzGtwxD/hnTyO+/4LQJcQ==;24:kXmbfmuHkRP0tg5zhH5+qZ70J+Zc1vFBQ7BHvnEkugp7ecAr1bc8AOFrSR5YGd2X12cwCzQii+whAye6o3MtBD7Y8+ylWteSgBTRm0lE730= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;DB6PR0801MB1736;7:yq7zS//fSh7HLxbeyxagL5xvSgYun+QwZZvywIpCdnB/ZBT2VKxCa0AeqVG/sI2VHkareCQ+FxCTx7nS5QtAlDN+kqxxKI2fcVrrTgYv7jFJXb1bNAKFynGWvdLxzpGKQ6P8SglXsC9lVoNKWB7WPh1WOWfz9jAh7cgfcpcreNQnnG/8n2xySsKAfLlBagCmLtiyC3p7/62sTqIS6QE5LwVhuW1xG/jNrYj5AGGNGImOlTiuNRL4qGp78Ue4p5vc8CaEpBhZNCL9gEyM5vapY8kOzo8XlyLzkdrrcCzDnxpPhv5jfmGT53d5cZRJHC6DA6CRSgQpgVcGgwgiof2GUw==;20:EmJm3lZh9fJlpRU/3KnXnPXCVrM+uMbB2Qfxq3Bq+UmvOiTuyWDXMz3V6wfiuK520tzjD8biRsbmqeOURU+My2/qCpRROLIjwAE0GrRj0YIKyMRdtIk6RcCIIZYKs8ukz3wMaCq7fHARcMunGwFoxNk79mAmh6+JWpWC3Lzta84= X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Apr 2017 16:41:27.2881 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1736 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 14010 Lines: 393 On 04/07/2017 06:44 PM, Kirill A. Shutemov wrote: > On x86, 5-level paging enables 56-bit userspace virtual address space. > Not all user space is ready to handle wide addresses. It's known that > at least some JIT compilers use higher bits in pointers to encode their > information. It collides with valid pointers with 5-level paging and > leads to crashes. > > To mitigate this, we are not going to allocate virtual address space > above 47-bit by default. > > But userspace can ask for allocation from full address space by > specifying hint address (with or without MAP_FIXED) above 47-bits. > > If hint address set above 47-bit, but MAP_FIXED is not specified, we try > to look for unmapped area by specified address. If it's already > occupied, we look for unmapped area in *full* address space, rather than > from 47-bit window. > > This approach helps to easily make application's memory allocator aware > about large address space without manually tracking allocated virtual > address space. > > One important case we need to handle here is interaction with MPX. > MPX (without MAWA( extension cannot handle addresses above 47-bit, so we > need to make sure that MPX cannot be enabled we already have VMA above > the boundary and forbid creating such VMAs once MPX is enabled. > > Signed-off-by: Kirill A. Shutemov > Cc: Dmitry Safonov LGTM, Reviewed-by: Dmitry Safonov Thou, I'm not very excited about TASK_SIZE_LOW naming, but I'm not good at naming either, so maybe tglx will help. Anyway, I don't see any problems with code's logic now. I've run it through CRIU ia32 tests, where there is 32/64-bit mmap(), 64-bit mmap() from 32-bit binary, the same with MAP_32BIT and some other not very pleasant corner-cases. That doesn't prove that mmap() works in *all* possible cases, thou. P.S.: JFYI: there is a rule to send new patch versions in a new thread - otherwise the patch can lose maintainers attention. So, they may ask you to resend it. > --- > v3: > - Address Dmitry feedback; > - Make DEFAULT_MAP_WINDOW constant again, introduce TASK_SIZE_LOW > instead, which would task TIF_ADDR32 into account. > --- > arch/x86/include/asm/elf.h | 4 ++-- > arch/x86/include/asm/mpx.h | 9 +++++++++ > arch/x86/include/asm/processor.h | 11 ++++++++--- > arch/x86/kernel/sys_x86_64.c | 30 ++++++++++++++++++++++++++---- > arch/x86/mm/hugetlbpage.c | 27 +++++++++++++++++++++++---- > arch/x86/mm/mmap.c | 6 +++--- > arch/x86/mm/mpx.c | 33 ++++++++++++++++++++++++++++++++- > 7 files changed, 103 insertions(+), 17 deletions(-) > > diff --git a/arch/x86/include/asm/elf.h b/arch/x86/include/asm/elf.h > index d4d3ed456cb7..2501ef7970f9 100644 > --- a/arch/x86/include/asm/elf.h > +++ b/arch/x86/include/asm/elf.h > @@ -250,7 +250,7 @@ extern int force_personality32; > the loader. We need to make sure that it is out of the way of the program > that it will "exec", and that there is sufficient room for the brk. */ > > -#define ELF_ET_DYN_BASE (TASK_SIZE / 3 * 2) > +#define ELF_ET_DYN_BASE (TASK_SIZE_LOW / 3 * 2) > > /* This yields a mask that user programs can use to figure out what > instruction set this CPU supports. This could be done in user space, > @@ -304,7 +304,7 @@ static inline int mmap_is_ia32(void) > } > > extern unsigned long tasksize_32bit(void); > -extern unsigned long tasksize_64bit(void); > +extern unsigned long tasksize_64bit(int full_addr_space); > extern unsigned long get_mmap_base(int is_legacy); > > #ifdef CONFIG_X86_32 > diff --git a/arch/x86/include/asm/mpx.h b/arch/x86/include/asm/mpx.h > index a0d662be4c5b..7d7404756bb4 100644 > --- a/arch/x86/include/asm/mpx.h > +++ b/arch/x86/include/asm/mpx.h > @@ -73,6 +73,9 @@ static inline void mpx_mm_init(struct mm_struct *mm) > } > void mpx_notify_unmap(struct mm_struct *mm, struct vm_area_struct *vma, > unsigned long start, unsigned long end); > + > +unsigned long mpx_unmapped_area_check(unsigned long addr, unsigned long len, > + unsigned long flags); > #else > static inline siginfo_t *mpx_generate_siginfo(struct pt_regs *regs) > { > @@ -94,6 +97,12 @@ static inline void mpx_notify_unmap(struct mm_struct *mm, > unsigned long start, unsigned long end) > { > } > + > +static inline unsigned long mpx_unmapped_area_check(unsigned long addr, > + unsigned long len, unsigned long flags) > +{ > + return addr; > +} > #endif /* CONFIG_X86_INTEL_MPX */ > > #endif /* _ASM_X86_MPX_H */ > diff --git a/arch/x86/include/asm/processor.h b/arch/x86/include/asm/processor.h > index 3cada998a402..aaed58b03ddb 100644 > --- a/arch/x86/include/asm/processor.h > +++ b/arch/x86/include/asm/processor.h > @@ -795,6 +795,7 @@ static inline void spin_lock_prefetch(const void *x) > #define IA32_PAGE_OFFSET PAGE_OFFSET > #define TASK_SIZE PAGE_OFFSET > #define TASK_SIZE_MAX TASK_SIZE > +#define DEFAULT_MAP_WINDOW TASK_SIZE > #define STACK_TOP TASK_SIZE > #define STACK_TOP_MAX STACK_TOP > > @@ -834,7 +835,9 @@ static inline void spin_lock_prefetch(const void *x) > * particular problem by preventing anything from being mapped > * at the maximum canonical address. > */ > -#define TASK_SIZE_MAX ((1UL << 47) - PAGE_SIZE) > +#define TASK_SIZE_MAX ((1UL << __VIRTUAL_MASK_SHIFT) - PAGE_SIZE) > + > +#define DEFAULT_MAP_WINDOW ((1UL << 47) - PAGE_SIZE) > > /* This decides where the kernel will search for a free chunk of vm > * space during mmap's. > @@ -842,12 +845,14 @@ static inline void spin_lock_prefetch(const void *x) > #define IA32_PAGE_OFFSET ((current->personality & ADDR_LIMIT_3GB) ? \ > 0xc0000000 : 0xFFFFe000) > > +#define TASK_SIZE_LOW (test_thread_flag(TIF_ADDR32) ? \ > + IA32_PAGE_OFFSET : DEFAULT_MAP_WINDOW) > #define TASK_SIZE (test_thread_flag(TIF_ADDR32) ? \ > IA32_PAGE_OFFSET : TASK_SIZE_MAX) > #define TASK_SIZE_OF(child) ((test_tsk_thread_flag(child, TIF_ADDR32)) ? \ > IA32_PAGE_OFFSET : TASK_SIZE_MAX) > > -#define STACK_TOP TASK_SIZE > +#define STACK_TOP TASK_SIZE_LOW > #define STACK_TOP_MAX TASK_SIZE_MAX > > #define INIT_THREAD { \ > @@ -870,7 +875,7 @@ extern void start_thread(struct pt_regs *regs, unsigned long new_ip, > * space during mmap's. > */ > #define __TASK_UNMAPPED_BASE(task_size) (PAGE_ALIGN(task_size / 3)) > -#define TASK_UNMAPPED_BASE __TASK_UNMAPPED_BASE(TASK_SIZE) > +#define TASK_UNMAPPED_BASE __TASK_UNMAPPED_BASE(TASK_SIZE_LOW) > > #define KSTK_EIP(task) (task_pt_regs(task)->ip) > > diff --git a/arch/x86/kernel/sys_x86_64.c b/arch/x86/kernel/sys_x86_64.c > index 207b8f2582c7..74d1587b181d 100644 > --- a/arch/x86/kernel/sys_x86_64.c > +++ b/arch/x86/kernel/sys_x86_64.c > @@ -21,6 +21,7 @@ > #include > #include > #include > +#include > > /* > * Align a virtual address to avoid aliasing in the I$ on AMD F15h. > @@ -100,8 +101,8 @@ SYSCALL_DEFINE6(mmap, unsigned long, addr, unsigned long, len, > return error; > } > > -static void find_start_end(unsigned long flags, unsigned long *begin, > - unsigned long *end) > +static void find_start_end(unsigned long addr, unsigned long flags, > + unsigned long *begin, unsigned long *end) > { > if (!in_compat_syscall() && (flags & MAP_32BIT)) { > /* This is usually used needed to map code in small > @@ -120,7 +121,10 @@ static void find_start_end(unsigned long flags, unsigned long *begin, > } > > *begin = get_mmap_base(1); > - *end = in_compat_syscall() ? tasksize_32bit() : tasksize_64bit(); > + if (in_compat_syscall()) > + *end = tasksize_32bit(); > + else > + *end = tasksize_64bit(addr > DEFAULT_MAP_WINDOW); > } > > unsigned long > @@ -132,10 +136,14 @@ arch_get_unmapped_area(struct file *filp, unsigned long addr, > struct vm_unmapped_area_info info; > unsigned long begin, end; > > + addr = mpx_unmapped_area_check(addr, len, flags); > + if (IS_ERR_VALUE(addr)) > + return addr; > + > if (flags & MAP_FIXED) > return addr; > > - find_start_end(flags, &begin, &end); > + find_start_end(addr, flags, &begin, &end); > > if (len > end) > return -ENOMEM; > @@ -171,6 +179,10 @@ arch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0, > unsigned long addr = addr0; > struct vm_unmapped_area_info info; > > + addr = mpx_unmapped_area_check(addr, len, flags); > + if (IS_ERR_VALUE(addr)) > + return addr; > + > /* requested length too big for entire address space */ > if (len > TASK_SIZE) > return -ENOMEM; > @@ -195,6 +207,16 @@ arch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0, > info.length = len; > info.low_limit = PAGE_SIZE; > info.high_limit = get_mmap_base(0); > + > + /* > + * If hint address is above DEFAULT_MAP_WINDOW, look for unmapped area > + * in the full address space. > + * > + * !in_compat_syscall() check to avoid high addresses for x32. > + */ > + if (addr > DEFAULT_MAP_WINDOW && !in_compat_syscall()) > + info.high_limit += TASK_SIZE_MAX - DEFAULT_MAP_WINDOW; > + > info.align_mask = 0; > info.align_offset = pgoff << PAGE_SHIFT; > if (filp) { > diff --git a/arch/x86/mm/hugetlbpage.c b/arch/x86/mm/hugetlbpage.c > index 302f43fd9c28..730f00250acb 100644 > --- a/arch/x86/mm/hugetlbpage.c > +++ b/arch/x86/mm/hugetlbpage.c > @@ -18,6 +18,7 @@ > #include > #include > #include > +#include > > #if 0 /* This is just for testing */ > struct page * > @@ -85,25 +86,38 @@ static unsigned long hugetlb_get_unmapped_area_bottomup(struct file *file, > info.flags = 0; > info.length = len; > info.low_limit = get_mmap_base(1); > + > + /* > + * If hint address is above DEFAULT_MAP_WINDOW, look for unmapped area > + * in the full address space. > + */ > info.high_limit = in_compat_syscall() ? > - tasksize_32bit() : tasksize_64bit(); > + tasksize_32bit() : tasksize_64bit(addr > DEFAULT_MAP_WINDOW); > + > info.align_mask = PAGE_MASK & ~huge_page_mask(h); > info.align_offset = 0; > return vm_unmapped_area(&info); > } > > static unsigned long hugetlb_get_unmapped_area_topdown(struct file *file, > - unsigned long addr0, unsigned long len, > + unsigned long addr, unsigned long len, > unsigned long pgoff, unsigned long flags) > { > struct hstate *h = hstate_file(file); > struct vm_unmapped_area_info info; > - unsigned long addr; > > info.flags = VM_UNMAPPED_AREA_TOPDOWN; > info.length = len; > info.low_limit = PAGE_SIZE; > info.high_limit = get_mmap_base(0); > + > + /* > + * If hint address is above DEFAULT_MAP_WINDOW, look for unmapped area > + * in the full address space. > + */ > + if (addr > DEFAULT_MAP_WINDOW && !in_compat_syscall()) > + info.high_limit += TASK_SIZE_MAX - DEFAULT_MAP_WINDOW; > + > info.align_mask = PAGE_MASK & ~huge_page_mask(h); > info.align_offset = 0; > addr = vm_unmapped_area(&info); > @@ -118,7 +132,7 @@ static unsigned long hugetlb_get_unmapped_area_topdown(struct file *file, > VM_BUG_ON(addr != -ENOMEM); > info.flags = 0; > info.low_limit = TASK_UNMAPPED_BASE; > - info.high_limit = TASK_SIZE; > + info.high_limit = TASK_SIZE_LOW; > addr = vm_unmapped_area(&info); > } > > @@ -135,6 +149,11 @@ hugetlb_get_unmapped_area(struct file *file, unsigned long addr, > > if (len & ~huge_page_mask(h)) > return -EINVAL; > + > + addr = mpx_unmapped_area_check(addr, len, flags); > + if (IS_ERR_VALUE(addr)) > + return addr; > + > if (len > TASK_SIZE) > return -ENOMEM; > > diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c > index 19ad095b41df..199050249d60 100644 > --- a/arch/x86/mm/mmap.c > +++ b/arch/x86/mm/mmap.c > @@ -42,9 +42,9 @@ unsigned long tasksize_32bit(void) > return IA32_PAGE_OFFSET; > } > > -unsigned long tasksize_64bit(void) > +unsigned long tasksize_64bit(int full_addr_space) > { > - return TASK_SIZE_MAX; > + return full_addr_space ? TASK_SIZE_MAX : DEFAULT_MAP_WINDOW; > } > > static unsigned long stack_maxrandom_size(unsigned long task_size) > @@ -140,7 +140,7 @@ void arch_pick_mmap_layout(struct mm_struct *mm) > mm->get_unmapped_area = arch_get_unmapped_area_topdown; > > arch_pick_mmap_base(&mm->mmap_base, &mm->mmap_legacy_base, > - arch_rnd(mmap64_rnd_bits), tasksize_64bit()); > + arch_rnd(mmap64_rnd_bits), tasksize_64bit(0)); > > #ifdef CONFIG_HAVE_ARCH_COMPAT_MMAP_BASES > /* > diff --git a/arch/x86/mm/mpx.c b/arch/x86/mm/mpx.c > index cd44ae727df7..a26a1b373fd0 100644 > --- a/arch/x86/mm/mpx.c > +++ b/arch/x86/mm/mpx.c > @@ -355,10 +355,19 @@ int mpx_enable_management(void) > */ > bd_base = mpx_get_bounds_dir(); > down_write(&mm->mmap_sem); > + > + /* MPX doesn't support addresses above 47-bits yet. */ > + if (find_vma(mm, DEFAULT_MAP_WINDOW)) { > + pr_warn_once("%s (%d): MPX cannot handle addresses " > + "above 47-bits. Disabling.", > + current->comm, current->pid); > + ret = -ENXIO; > + goto out; > + } > mm->context.bd_addr = bd_base; > if (mm->context.bd_addr == MPX_INVALID_BOUNDS_DIR) > ret = -ENXIO; > - > +out: > up_write(&mm->mmap_sem); > return ret; > } > @@ -1038,3 +1047,25 @@ void mpx_notify_unmap(struct mm_struct *mm, struct vm_area_struct *vma, > if (ret) > force_sig(SIGSEGV, current); > } > + > +/* MPX cannot handle addresses above 47-bits yet. */ > +unsigned long mpx_unmapped_area_check(unsigned long addr, unsigned long len, > + unsigned long flags) > +{ > + if (!kernel_managing_mpx_tables(current->mm)) > + return addr; > + if (addr + len <= DEFAULT_MAP_WINDOW) > + return addr; > + if (flags & MAP_FIXED) > + return -ENOMEM; > + > + /* > + * Requested len is larger than whole area we're allowed to map in. > + * Resetting hinting address wouldn't do much good -- fail early. > + */ > + if (len > DEFAULT_MAP_WINDOW) > + return -ENOMEM; > + > + /* Look for unmap area within DEFAULT_MAP_WINDOW */ > + return 0; > +} > -- Dmitry