Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2262606yba; Mon, 15 Apr 2019 08:10:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqxw8VcZDPvPHkBBBUmTHTFqCdes8dou8T03ZbfS3j/JKdnuveAfjUkATA5mp2JQeO/211EN X-Received: by 2002:a17:902:2862:: with SMTP id e89mr57184575plb.203.1555341031717; Mon, 15 Apr 2019 08:10:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555341031; cv=none; d=google.com; s=arc-20160816; b=Us+z2ZodSMhPAgu1PUMIzs9878topef1tFW1bg1xxcZN7OZ+Gheo5rv0eBnELPF+xv 2A+c/sNWu8iB+BKy0gv+cMQHBG4hG53R7F7ma2caeAgfN/7tsM1v7/y1saAZ2/tdhXGg nS5tSnUZuDO1RJOMtTgmUv7hp3lMvs3GuMUm/FC7XFP+n+5hb+22WsrwPpBohvGfju4o WFgFW8ldyzXnUZ+ScmKacBEHI7yC6djHEyngj02RJOscaf/iPwknU0/x54hGUVYEIQ1K wvp+bbPn843gVEtDywyX3dUeUKYc5C0Ej9wlIhH7zpcNKZTakyjM5PIKhEVXtE1rjwZI /UPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=9h/RSB5EhtOQk4HQlgfOLug6aIt3LZ/IeK+mrY/qf1o=; b=vlNnxGZpHS+n3UmiTfeV8TI0OTrb7meIh+9S5plohJ09/vMhQojMsal2ux4roP0NXo r7bGmQPRN2AxJnxJFS8GkGxxPD0WsT9UcC7jh+YmIV5+dhVSb2dXvwIT6EYrpjhgk0ZU j3MIIh7eK6bM8sQS4RyNA3ADvi+jysJ/LdajlPzNNX7YXK6oXC+bcOI0QRnPZmQUtdpn DMd25ZJhVTuZ8EZz8G5SPgo5Nk1Aas01/Jd5st4M2LzznmDU1Rj1IFvcom2reLG11olE fHY5Cs7/ZF8lfTJXgD31MzgKL3ldEvVEcjpKUutqrllVc43kebUSvQQ4amyHfsWI94v4 pB5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o3si9488101pld.61.2019.04.15.08.10.12; Mon, 15 Apr 2019 08:10:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727705AbfDOPJU (ORCPT + 99 others); Mon, 15 Apr 2019 11:09:20 -0400 Received: from smtp5-g21.free.fr ([212.27.42.5]:33614 "EHLO smtp5-g21.free.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727659AbfDOPJS (ORCPT ); Mon, 15 Apr 2019 11:09:18 -0400 Received: from heffalump.sk2.org (unknown [88.186.243.14]) by smtp5-g21.free.fr (Postfix) with ESMTPS id 6AFF45FFD8; Mon, 15 Apr 2019 17:09:15 +0200 (CEST) Received: from steve by heffalump.sk2.org with local (Exim 4.89) (envelope-from ) id 1hG3EQ-0002iC-L5; Mon, 15 Apr 2019 17:09:14 +0200 From: Stephen Kitt To: linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org Cc: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, x86@kernel.org, corbet@lwn.net, bhe@redhat.com, kirill.shutemov@linux.intel.com, dave.hansen@linux.intel.com, alex.popov@linux.com, Stephen Kitt Subject: [PATCH] Fix 56-bit addresses in Documentation/x86/x86_64/mm.txt Date: Mon, 15 Apr 2019 17:08:53 +0200 Message-Id: <20190415150853.10354-1-steve@sk2.org> X-Mailer: git-send-email 2.11.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This fixes a PT typo, and the following 56-bit address-space addresses: * the hole extends from 0100000000000000 to feffffffffffffff * the KASAN shadow memory area stops at fffffbffffffffff (see kasan.h) Signed-off-by: Stephen Kitt --- Documentation/x86/x86_64/mm.txt | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/Documentation/x86/x86_64/mm.txt b/Documentation/x86/x86_64/mm.txt index 804f9426ed17..6cbe652d7a49 100644 --- a/Documentation/x86/x86_64/mm.txt +++ b/Documentation/x86/x86_64/mm.txt @@ -72,7 +72,7 @@ Complete virtual memory map with 5-level page tables Notes: - With 56-bit addresses, user-space memory gets expanded by a factor of 512x, - from 0.125 PB to 64 PB. All kernel mappings shift down to the -64 PT starting + from 0.125 PB to 64 PB. All kernel mappings shift down to the -64 PB starting offset and many of the regions expand to support the much larger physical memory supported. @@ -83,7 +83,7 @@ Notes: 0000000000000000 | 0 | 00ffffffffffffff | 64 PB | user-space virtual memory, different per mm __________________|____________|__________________|_________|___________________________________________________________ | | | | - 0000800000000000 | +64 PB | ffff7fffffffffff | ~16K PB | ... huge, still almost 64 bits wide hole of non-canonical + 0100000000000000 | +64 PB | feffffffffffffff | ~16K PB | ... huge, still almost 64 bits wide hole of non-canonical | | | | virtual memory addresses up to the -64 PB | | | | starting offset of kernel mappings. __________________|____________|__________________|_________|___________________________________________________________ @@ -99,7 +99,7 @@ ____________________________________________________________|___________________ ffd2000000000000 | -11.5 PB | ffd3ffffffffffff | 0.5 PB | ... unused hole ffd4000000000000 | -11 PB | ffd5ffffffffffff | 0.5 PB | virtual memory map (vmemmap_base) ffd6000000000000 | -10.5 PB | ffdeffffffffffff | 2.25 PB | ... unused hole - ffdf000000000000 | -8.25 PB | fffffdffffffffff | ~8 PB | KASAN shadow memory + ffdf000000000000 | -8.25 PB | fffffbffffffffff | ~8 PB | KASAN shadow memory __________________|____________|__________________|_________|____________________________________________________________ | | Identical layout to the 47-bit one from here on: -- 2.11.0