Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp680920iob; Wed, 18 May 2022 10:28:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwslAw+yTpAaiQ6L45jzPdRGShcdUO+BIGSfHrifOvD7N3uJZmnlIOYeESE0llqxTaw960v X-Received: by 2002:a17:902:f7cd:b0:161:7287:11b6 with SMTP id h13-20020a170902f7cd00b00161728711b6mr726812plw.70.1652894936637; Wed, 18 May 2022 10:28:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652894936; cv=none; d=google.com; s=arc-20160816; b=bMpRQOFhaWdCpnZ3gjDXZpM832w7D+hYqkK1GGWRVdXpzUfI1/NGDZuXvxI46aQ/Z4 oYGR9fSpnxZCnTMA3MuNIm4omqbpSIqJv9kErg9bvnxlPWYDhOWEulwoHxXgSLguuBMn Ml+swahQ8RFG9x2DLEdT7F9mEXt5ev2qZDv4oWYH9fAF6Q5PPnCTZ9NKXhSibIPgz5GR Bt01PYQc8OnrhLtL5/YtUx9lp7qcBW2K/bwuAEnG4dS2OgjywPnJmJZoyOXrchaB7V6B 4irdRkbr5l3tZ++KnQgx1myath2XwOZce1aTEy2JewGfLuXj41smtjSc0/zKpyYYx7R1 3UOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=KC+VSE7KS7LImtbZmUUpaEP5W9FXgduJzG9u0ZpeB5Y=; b=esilNwH8G6cij3BR62gFlevD/w7L0XHVFpbU5nw1r7p4c5YmhA7JURnAUaR3oMBl+7 HVlml3hYsJkp/03kvv/yYkRNKwCm+Ab+MnY4vui3I8veOI+15waFebJn86/fJaXrvWeA 1OJoRZznrmy+XGjXxpsgjTS3ss4H1foB6kdO0DNXYrucKgBOI3D48+HT+RasQV5u8ZoU pSXGyGLWy5q30fiPnqOIT3hquF8x63jnffnAWtJX78N78FZSuoGx5kbe98gPyEaeU+q4 o323+GXmDzTjTNis4wut9tlddgSFxV0+8l0gkyew695Yd10CTuBkhW9IqEhwPK3zhxif dQsQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=brv+AGKm; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id n15-20020a63e04f000000b003f613f626absi1774531pgj.102.2022.05.18.10.28.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 May 2022 10:28:56 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=brv+AGKm; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 17B131E38B2; Wed, 18 May 2022 10:28:55 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241113AbiERR2t (ORCPT + 99 others); Wed, 18 May 2022 13:28:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241081AbiERR2s (ORCPT ); Wed, 18 May 2022 13:28:48 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 08B60A0D0C for ; Wed, 18 May 2022 10:28:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1652894928; x=1684430928; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=kpb7BRUtuQc+iJCuUBD1Lroyy3qbPng6bV/1KdEa27o=; b=brv+AGKmhbYnY3r+qLWbhog61Sj/IuwffptSrxZ2po70yBmY8fHc0Jtf VV5pmuGmRlhLxSINtqBLClJfTRoa2Bud5jxNWvkoO3LTtj6kkeQ0k76ll 1mb2ddhvNdFkQOVR8sSyQ7nxL3Ct9SR9KSHVqUt63XI/6gwlIePpVX7qb cHik3O6sRX5nT+6jZwdWI9gluDvF8gTe5BrzecEBMwAYY+O/u/+Pl7iRT +yvTHVA8U+7uRUdmhK8e65dp9qPKRmKvrgMw2K0Hj5ybepIy5qlpOskBd jAa9KXtJXSStbdP5DhtGXXHDmH/FoiVYJJo5CBS5iuObdfYmlGVOyRmWB A==; X-IronPort-AV: E=McAfee;i="6400,9594,10351"; a="251686963" X-IronPort-AV: E=Sophos;i="5.91,235,1647327600"; d="scan'208";a="251686963" Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 May 2022 10:08:18 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.91,235,1647327600"; d="scan'208";a="817538239" Received: from black.fi.intel.com ([10.237.72.28]) by fmsmga006.fm.intel.com with ESMTP; 18 May 2022 10:08:15 -0700 Received: by black.fi.intel.com (Postfix, from userid 1000) id 6DDA3109; Wed, 18 May 2022 20:08:15 +0300 (EEST) Date: Wed, 18 May 2022 20:08:15 +0300 From: "Kirill A. Shutemov" To: Bharata B Rao Cc: Dave Hansen , Andy Lutomirski , Peter Zijlstra , x86@kernel.org, Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , "H . J . Lu" , Andi Kleen , Rick Edgecombe , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [RFCv2 08/10] x86/mm: Make LAM_U48 and mappings above 47-bits mutually exclusive Message-ID: <20220518170815.4ivbuw7d6vmzh3u7@black.fi.intel.com> References: <20220511022751.65540-1-kirill.shutemov@linux.intel.com> <20220511022751.65540-10-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 18, 2022 at 02:13:06PM +0530, Bharata B Rao wrote: > On 5/11/2022 7:57 AM, Kirill A. Shutemov wrote: > > LAM_U48 steals bits above 47-bit for tags and makes it impossible for > > userspace to use full address space on 5-level paging machine. > > > > Make these features mutually exclusive: whichever gets enabled first > > blocks the othe one. > > > > Signed-off-by: Kirill A. Shutemov > > --- > > arch/x86/include/asm/elf.h | 3 ++- > > arch/x86/include/asm/mmu_context.h | 13 +++++++++++++ > > arch/x86/kernel/sys_x86_64.c | 5 +++-- > > arch/x86/mm/hugetlbpage.c | 6 ++++-- > > arch/x86/mm/mmap.c | 9 ++++++++- > > 5 files changed, 30 insertions(+), 6 deletions(-) > > > > diff --git a/arch/x86/include/asm/elf.h b/arch/x86/include/asm/elf.h > > index 29fea180a665..53b96b0c8cc3 100644 > > --- a/arch/x86/include/asm/elf.h > > +++ b/arch/x86/include/asm/elf.h > > @@ -328,7 +328,8 @@ static inline int mmap_is_ia32(void) > > extern unsigned long task_size_32bit(void); > > extern unsigned long task_size_64bit(int full_addr_space); > > extern unsigned long get_mmap_base(int is_legacy); > > -extern bool mmap_address_hint_valid(unsigned long addr, unsigned long len); > > +extern bool mmap_address_hint_valid(struct mm_struct *mm, > > + unsigned long addr, unsigned long len); > > extern unsigned long get_sigframe_size(void); > > > > #ifdef CONFIG_X86_32 > > diff --git a/arch/x86/include/asm/mmu_context.h b/arch/x86/include/asm/mmu_context.h > > index 27516046117a..c8a6d80dfec3 100644 > > --- a/arch/x86/include/asm/mmu_context.h > > +++ b/arch/x86/include/asm/mmu_context.h > > @@ -218,6 +218,19 @@ static inline bool arch_vma_access_permitted(struct vm_area_struct *vma, > > > > unsigned long __get_current_cr3_fast(void); > > > > +#ifdef CONFIG_X86_5LEVEL > > +static inline bool full_va_allowed(struct mm_struct *mm) > > +{ > > + /* LAM_U48 steals VA bits abouve 47-bit for tags */ > > + return mm->context.lam != LAM_U48; > > +} > > +#else > > This is called from X86 common code but appears to be LAM-specific. > What would mm->context.lam contain if X86_FEATURE_LAM isn't set? 0. So full_va_allowed() will always return true. -- Kirill A. Shutemov