From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934427AbdBQOOh (ORCPT ); Fri, 17 Feb 2017 09:14:37 -0500 Received: from mga09.intel.com ([134.134.136.24]:39411 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934090AbdBQOOa (ORCPT ); Fri, 17 Feb 2017 09:14:30 -0500 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.35,172,1484035200"; d="scan'208";a="226554500" From: "Kirill A. Shutemov" To: Linus Torvalds , Andrew Morton , x86@kernel.org, Thomas Gleixner , Ingo Molnar , Arnd Bergmann , "H. Peter Anvin" Cc: Andi Kleen , Dave Hansen , Andy Lutomirski , linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: [PATCHv3 00/33] 5-level paging Date: Fri, 17 Feb 2017 17:12:55 +0300 Message-Id: <20170217141328.164563-1-kirill.shutemov@linux.intel.com> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Here is v3 of 5-level paging patchset. Please review and consider applying. == Overview == x86-64 is currently limited to 256 TiB of virtual address space and 64 TiB of physical address space. We are already bumping into this limit: some vendors offers servers with 64 TiB of memory today. To overcome the limitation upcoming hardware will introduce support for 5-level paging[1]. It is a straight-forward extension of the current page table structure adding one more layer of translation. It bumps the limits to 128 PiB of virtual address space and 4 PiB of physical address space. This "ought to be enough for anybody" ©. == Patches == The patchset is build on top of v4.10-rc8. Current QEMU upstream git supports 5-level paging. Use "-cpu qemu64,+la57" to enable it. Patch 1: Detect la57 feature for /proc/cpuinfo. Patches 2-7: Brings 5-level paging to generic code and convert all architectures to it using Patches 8-19: Convert x86 to properly folded p4d layer using . Patches 20-32: Enabling of real 5-level paging. CONFIG_X86_5LEVEL=y will enable new paging mode. Patch 33: Introduce new prctl(2) handles -- PR_SET_MAX_VADDR and PR_GET_MAX_VADDR. This aims to address compatibility issue. Only supports x86 for now, but should be useful for other archtectures. Git: git://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git la57/v3 == TODO == There is still work to do: - CONFIG_XEN is broken for 5-level paging. Xen for 5-level paging requires more work to get functional. Xen on 4-level paging works, so it's not a regression. - Boot-time switch between 4- and 5-level paging. We assume that distributions will be keen to avoid returning to the i386 days where we shipped one kernel binary for each page table layout. As page table format is the same for 4- and 5-level paging it should be possible to have single kernel binary and switch between them at boot-time without too much hassle. For now I only implemented compile-time switch. This will implemented with separate patchset. == Changelong == v3: - Rebased to v4.10-rc5; - prctl() handles for large address space opt-in; - Xen works for 4-level paging; - EFI boot fixed for both 4- and 5-level paging; - Hibernation fixed for 4-level paging; - kexec() fixed; - Couple of build fixes; v2: - Rebased to v4.10-rc1; - RLIMIT_VADDR proposal; - Fix virtual map and update documentation; - Fix few build errors; - Rework cpuid helpers in boot code; - Fix espfix code to work with 5-level pages; [1] https://software.intel.com/sites/default/files/managed/2b/80/5-level_paging_white_paper.pdf Kirill A. Shutemov (33): x86/cpufeature: Add 5-level paging detection asm-generic: introduce 5level-fixup.h asm-generic: introduce __ARCH_USE_5LEVEL_HACK arch, mm: convert all architectures to use 5level-fixup.h asm-generic: introduce mm: convert generic code to 5-level paging mm: introduce __p4d_alloc() x86: basic changes into headers for 5-level paging x86: trivial portion of 5-level paging conversion x86/gup: add 5-level paging support x86/ident_map: add 5-level paging support x86/mm: add support of p4d_t in vmalloc_fault() x86/power: support p4d_t in hibernate code x86/kexec: support p4d_t x86/efi: handle p4d in EFI pagetables x86/mm/pat: handle additional page table x86/kasan: prepare clear_pgds() to switch to x86/xen: convert __xen_pgd_walk() and xen_cleanmfnmap() to support p4d x86: convert the rest of the code to support p4d_t x86: detect 5-level paging support x86/asm: remove __VIRTUAL_MASK_SHIFT==47 assert x86/mm: define virtual memory map for 5-level paging x86/paravirt: make paravirt code support 5-level paging x86/mm: basic defines/helpers for CONFIG_X86_5LEVEL x86/dump_pagetables: support 5-level paging x86/kasan: extend to support 5-level paging x86/espfix: support 5-level paging x86/mm: add support of additional page table level during early boot x86/mm: add sync_global_pgds() for configuration with 5-level paging x86/mm: make kernel_physical_mapping_init() support 5-level paging x86/mm: add support for 5-level paging for KASLR x86: enable 5-level paging support mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR Documentation/x86/x86_64/mm.txt | 33 +- arch/arc/include/asm/hugepage.h | 1 + arch/arc/include/asm/pgtable.h | 1 + arch/arm/include/asm/pgtable.h | 1 + arch/arm64/include/asm/pgtable-types.h | 4 + arch/avr32/include/asm/pgtable-2level.h | 1 + arch/cris/include/asm/pgtable.h | 1 + arch/frv/include/asm/pgtable.h | 1 + arch/h8300/include/asm/pgtable.h | 1 + arch/hexagon/include/asm/pgtable.h | 1 + arch/ia64/include/asm/pgtable.h | 2 + arch/metag/include/asm/pgtable.h | 1 + arch/mips/include/asm/pgtable-32.h | 1 + arch/mips/include/asm/pgtable-64.h | 1 + arch/mn10300/include/asm/page.h | 1 + arch/nios2/include/asm/pgtable.h | 1 + arch/openrisc/include/asm/pgtable.h | 1 + arch/powerpc/include/asm/book3s/32/pgtable.h | 1 + arch/powerpc/include/asm/book3s/64/pgtable.h | 2 + arch/powerpc/include/asm/nohash/32/pgtable.h | 1 + arch/powerpc/include/asm/nohash/64/pgtable-4k.h | 3 + arch/powerpc/include/asm/nohash/64/pgtable-64k.h | 1 + arch/s390/include/asm/pgtable.h | 1 + arch/score/include/asm/pgtable.h | 1 + arch/sh/include/asm/pgtable-2level.h | 1 + arch/sh/include/asm/pgtable-3level.h | 1 + arch/sparc/include/asm/pgtable_64.h | 1 + arch/tile/include/asm/pgtable_32.h | 1 + arch/tile/include/asm/pgtable_64.h | 1 + arch/um/include/asm/pgtable-2level.h | 1 + arch/um/include/asm/pgtable-3level.h | 1 + arch/unicore32/include/asm/pgtable.h | 1 + arch/x86/Kconfig | 6 + arch/x86/boot/compressed/head_64.S | 23 +- arch/x86/boot/cpucheck.c | 9 + arch/x86/boot/cpuflags.c | 12 +- arch/x86/entry/entry_64.S | 7 +- arch/x86/include/asm/cpufeatures.h | 3 +- arch/x86/include/asm/disabled-features.h | 8 +- arch/x86/include/asm/elf.h | 2 +- arch/x86/include/asm/kasan.h | 9 +- arch/x86/include/asm/kexec.h | 1 + arch/x86/include/asm/mmu.h | 2 + arch/x86/include/asm/mmu_context.h | 1 + arch/x86/include/asm/page_64_types.h | 10 + arch/x86/include/asm/paravirt.h | 65 +++- arch/x86/include/asm/paravirt_types.h | 17 +- arch/x86/include/asm/pgalloc.h | 37 +- arch/x86/include/asm/pgtable-2level_types.h | 1 + arch/x86/include/asm/pgtable-3level_types.h | 1 + arch/x86/include/asm/pgtable.h | 85 ++++- arch/x86/include/asm/pgtable_64.h | 29 +- arch/x86/include/asm/pgtable_64_types.h | 27 ++ arch/x86/include/asm/pgtable_types.h | 42 ++- arch/x86/include/asm/processor.h | 25 +- arch/x86/include/asm/required-features.h | 8 +- arch/x86/include/asm/sparsemem.h | 9 +- arch/x86/include/asm/xen/page.h | 8 +- arch/x86/include/uapi/asm/processor-flags.h | 2 + arch/x86/kernel/espfix_64.c | 12 +- arch/x86/kernel/head64.c | 40 ++- arch/x86/kernel/head_64.S | 63 +++- arch/x86/kernel/machine_kexec_32.c | 4 +- arch/x86/kernel/machine_kexec_64.c | 16 +- arch/x86/kernel/paravirt.c | 13 +- arch/x86/kernel/process.c | 18 + arch/x86/kernel/sys_x86_64.c | 6 +- arch/x86/kernel/tboot.c | 6 +- arch/x86/kernel/vm86_32.c | 6 +- arch/x86/mm/dump_pagetables.c | 51 ++- arch/x86/mm/fault.c | 57 ++- arch/x86/mm/gup.c | 33 +- arch/x86/mm/hugetlbpage.c | 8 +- arch/x86/mm/ident_map.c | 47 ++- arch/x86/mm/init_32.c | 22 +- arch/x86/mm/init_64.c | 269 ++++++++++++-- arch/x86/mm/ioremap.c | 3 +- arch/x86/mm/kasan_init_64.c | 41 ++- arch/x86/mm/kaslr.c | 82 ++++- arch/x86/mm/mmap.c | 4 +- arch/x86/mm/mpx.c | 17 +- arch/x86/mm/pageattr.c | 56 ++- arch/x86/mm/pgtable.c | 38 +- arch/x86/mm/pgtable_32.c | 8 +- arch/x86/platform/efi/efi_64.c | 38 +- arch/x86/power/hibernate_32.c | 7 +- arch/x86/power/hibernate_64.c | 49 ++- arch/x86/realmode/init.c | 2 +- arch/x86/xen/Kconfig | 1 + arch/x86/xen/mmu.c | 433 ++++++++++++++--------- arch/x86/xen/mmu.h | 1 + arch/xtensa/include/asm/pgtable.h | 1 + drivers/misc/sgi-gru/grufault.c | 9 +- fs/binfmt_aout.c | 2 - fs/binfmt_elf.c | 10 +- fs/hugetlbfs/inode.c | 6 +- fs/userfaultfd.c | 6 +- include/asm-generic/4level-fixup.h | 3 +- include/asm-generic/5level-fixup.h | 41 +++ include/asm-generic/pgtable-nop4d-hack.h | 62 ++++ include/asm-generic/pgtable-nop4d.h | 56 +++ include/asm-generic/pgtable-nopud.h | 48 +-- include/asm-generic/pgtable.h | 48 ++- include/asm-generic/tlb.h | 14 +- include/linux/hugetlb.h | 5 +- include/linux/kasan.h | 1 + include/linux/mm.h | 34 +- include/linux/sched.h | 8 + include/trace/events/xen.h | 28 +- include/uapi/linux/prctl.h | 3 + kernel/events/uprobes.c | 5 +- kernel/sys.c | 23 +- lib/ioremap.c | 39 +- mm/gup.c | 46 ++- mm/huge_memory.c | 7 +- mm/hugetlb.c | 29 +- mm/kasan/kasan_init.c | 35 +- mm/memory.c | 230 ++++++++++-- mm/mlock.c | 1 + mm/mmap.c | 20 +- mm/mprotect.c | 26 +- mm/mremap.c | 16 +- mm/nommu.c | 2 +- mm/pagewalk.c | 32 +- mm/pgtable-generic.c | 6 + mm/rmap.c | 13 +- mm/shmem.c | 8 +- mm/sparse-vmemmap.c | 22 +- mm/swapfile.c | 26 +- mm/userfaultfd.c | 23 +- mm/vmalloc.c | 81 +++-- 131 files changed, 2435 insertions(+), 611 deletions(-) create mode 100644 include/asm-generic/5level-fixup.h create mode 100644 include/asm-generic/pgtable-nop4d-hack.h create mode 100644 include/asm-generic/pgtable-nop4d.h -- 2.11.0 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pg0-f70.google.com (mail-pg0-f70.google.com [74.125.83.70]) by kanga.kvack.org (Postfix) with ESMTP id 6129D4405E4 for ; Fri, 17 Feb 2017 09:14:20 -0500 (EST) Received: by mail-pg0-f70.google.com with SMTP id y6so48835000pgy.5 for ; Fri, 17 Feb 2017 06:14:20 -0800 (PST) Received: from mga04.intel.com (mga04.intel.com. [192.55.52.120]) by mx.google.com with ESMTPS id v75si10395841pfa.126.2017.02.17.06.14.18 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 17 Feb 2017 06:14:19 -0800 (PST) From: "Kirill A. Shutemov" Subject: [PATCHv3 00/33] 5-level paging Date: Fri, 17 Feb 2017 17:12:55 +0300 Message-Id: <20170217141328.164563-1-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: owner-linux-mm@kvack.org List-ID: To: Linus Torvalds , Andrew Morton , x86@kernel.org, Thomas Gleixner , Ingo Molnar , Arnd Bergmann , "H. Peter Anvin" Cc: Andi Kleen , Dave Hansen , Andy Lutomirski , linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Here is v3 of 5-level paging patchset. Please review and consider applying. == Overview == x86-64 is currently limited to 256 TiB of virtual address space and 64 TiB of physical address space. We are already bumping into this limit: some vendors offers servers with 64 TiB of memory today. To overcome the limitation upcoming hardware will introduce support for 5-level paging[1]. It is a straight-forward extension of the current page table structure adding one more layer of translation. It bumps the limits to 128 PiB of virtual address space and 4 PiB of physical address space. This "ought to be enough for anybody" A(C). == Patches == The patchset is build on top of v4.10-rc8. Current QEMU upstream git supports 5-level paging. Use "-cpu qemu64,+la57" to enable it. Patch 1: Detect la57 feature for /proc/cpuinfo. Patches 2-7: Brings 5-level paging to generic code and convert all architectures to it using Patches 8-19: Convert x86 to properly folded p4d layer using . Patches 20-32: Enabling of real 5-level paging. CONFIG_X86_5LEVEL=y will enable new paging mode. Patch 33: Introduce new prctl(2) handles -- PR_SET_MAX_VADDR and PR_GET_MAX_VADDR. This aims to address compatibility issue. Only supports x86 for now, but should be useful for other archtectures. Git: git://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git la57/v3 == TODO == There is still work to do: - CONFIG_XEN is broken for 5-level paging. Xen for 5-level paging requires more work to get functional. Xen on 4-level paging works, so it's not a regression. - Boot-time switch between 4- and 5-level paging. We assume that distributions will be keen to avoid returning to the i386 days where we shipped one kernel binary for each page table layout. As page table format is the same for 4- and 5-level paging it should be possible to have single kernel binary and switch between them at boot-time without too much hassle. For now I only implemented compile-time switch. This will implemented with separate patchset. == Changelong == v3: - Rebased to v4.10-rc5; - prctl() handles for large address space opt-in; - Xen works for 4-level paging; - EFI boot fixed for both 4- and 5-level paging; - Hibernation fixed for 4-level paging; - kexec() fixed; - Couple of build fixes; v2: - Rebased to v4.10-rc1; - RLIMIT_VADDR proposal; - Fix virtual map and update documentation; - Fix few build errors; - Rework cpuid helpers in boot code; - Fix espfix code to work with 5-level pages; [1] https://software.intel.com/sites/default/files/managed/2b/80/5-level_paging_white_paper.pdf Kirill A. Shutemov (33): x86/cpufeature: Add 5-level paging detection asm-generic: introduce 5level-fixup.h asm-generic: introduce __ARCH_USE_5LEVEL_HACK arch, mm: convert all architectures to use 5level-fixup.h asm-generic: introduce mm: convert generic code to 5-level paging mm: introduce __p4d_alloc() x86: basic changes into headers for 5-level paging x86: trivial portion of 5-level paging conversion x86/gup: add 5-level paging support x86/ident_map: add 5-level paging support x86/mm: add support of p4d_t in vmalloc_fault() x86/power: support p4d_t in hibernate code x86/kexec: support p4d_t x86/efi: handle p4d in EFI pagetables x86/mm/pat: handle additional page table x86/kasan: prepare clear_pgds() to switch to x86/xen: convert __xen_pgd_walk() and xen_cleanmfnmap() to support p4d x86: convert the rest of the code to support p4d_t x86: detect 5-level paging support x86/asm: remove __VIRTUAL_MASK_SHIFT==47 assert x86/mm: define virtual memory map for 5-level paging x86/paravirt: make paravirt code support 5-level paging x86/mm: basic defines/helpers for CONFIG_X86_5LEVEL x86/dump_pagetables: support 5-level paging x86/kasan: extend to support 5-level paging x86/espfix: support 5-level paging x86/mm: add support of additional page table level during early boot x86/mm: add sync_global_pgds() for configuration with 5-level paging x86/mm: make kernel_physical_mapping_init() support 5-level paging x86/mm: add support for 5-level paging for KASLR x86: enable 5-level paging support mm, x86: introduce PR_SET_MAX_VADDR and PR_GET_MAX_VADDR Documentation/x86/x86_64/mm.txt | 33 +- arch/arc/include/asm/hugepage.h | 1 + arch/arc/include/asm/pgtable.h | 1 + arch/arm/include/asm/pgtable.h | 1 + arch/arm64/include/asm/pgtable-types.h | 4 + arch/avr32/include/asm/pgtable-2level.h | 1 + arch/cris/include/asm/pgtable.h | 1 + arch/frv/include/asm/pgtable.h | 1 + arch/h8300/include/asm/pgtable.h | 1 + arch/hexagon/include/asm/pgtable.h | 1 + arch/ia64/include/asm/pgtable.h | 2 + arch/metag/include/asm/pgtable.h | 1 + arch/mips/include/asm/pgtable-32.h | 1 + arch/mips/include/asm/pgtable-64.h | 1 + arch/mn10300/include/asm/page.h | 1 + arch/nios2/include/asm/pgtable.h | 1 + arch/openrisc/include/asm/pgtable.h | 1 + arch/powerpc/include/asm/book3s/32/pgtable.h | 1 + arch/powerpc/include/asm/book3s/64/pgtable.h | 2 + arch/powerpc/include/asm/nohash/32/pgtable.h | 1 + arch/powerpc/include/asm/nohash/64/pgtable-4k.h | 3 + arch/powerpc/include/asm/nohash/64/pgtable-64k.h | 1 + arch/s390/include/asm/pgtable.h | 1 + arch/score/include/asm/pgtable.h | 1 + arch/sh/include/asm/pgtable-2level.h | 1 + arch/sh/include/asm/pgtable-3level.h | 1 + arch/sparc/include/asm/pgtable_64.h | 1 + arch/tile/include/asm/pgtable_32.h | 1 + arch/tile/include/asm/pgtable_64.h | 1 + arch/um/include/asm/pgtable-2level.h | 1 + arch/um/include/asm/pgtable-3level.h | 1 + arch/unicore32/include/asm/pgtable.h | 1 + arch/x86/Kconfig | 6 + arch/x86/boot/compressed/head_64.S | 23 +- arch/x86/boot/cpucheck.c | 9 + arch/x86/boot/cpuflags.c | 12 +- arch/x86/entry/entry_64.S | 7 +- arch/x86/include/asm/cpufeatures.h | 3 +- arch/x86/include/asm/disabled-features.h | 8 +- arch/x86/include/asm/elf.h | 2 +- arch/x86/include/asm/kasan.h | 9 +- arch/x86/include/asm/kexec.h | 1 + arch/x86/include/asm/mmu.h | 2 + arch/x86/include/asm/mmu_context.h | 1 + arch/x86/include/asm/page_64_types.h | 10 + arch/x86/include/asm/paravirt.h | 65 +++- arch/x86/include/asm/paravirt_types.h | 17 +- arch/x86/include/asm/pgalloc.h | 37 +- arch/x86/include/asm/pgtable-2level_types.h | 1 + arch/x86/include/asm/pgtable-3level_types.h | 1 + arch/x86/include/asm/pgtable.h | 85 ++++- arch/x86/include/asm/pgtable_64.h | 29 +- arch/x86/include/asm/pgtable_64_types.h | 27 ++ arch/x86/include/asm/pgtable_types.h | 42 ++- arch/x86/include/asm/processor.h | 25 +- arch/x86/include/asm/required-features.h | 8 +- arch/x86/include/asm/sparsemem.h | 9 +- arch/x86/include/asm/xen/page.h | 8 +- arch/x86/include/uapi/asm/processor-flags.h | 2 + arch/x86/kernel/espfix_64.c | 12 +- arch/x86/kernel/head64.c | 40 ++- arch/x86/kernel/head_64.S | 63 +++- arch/x86/kernel/machine_kexec_32.c | 4 +- arch/x86/kernel/machine_kexec_64.c | 16 +- arch/x86/kernel/paravirt.c | 13 +- arch/x86/kernel/process.c | 18 + arch/x86/kernel/sys_x86_64.c | 6 +- arch/x86/kernel/tboot.c | 6 +- arch/x86/kernel/vm86_32.c | 6 +- arch/x86/mm/dump_pagetables.c | 51 ++- arch/x86/mm/fault.c | 57 ++- arch/x86/mm/gup.c | 33 +- arch/x86/mm/hugetlbpage.c | 8 +- arch/x86/mm/ident_map.c | 47 ++- arch/x86/mm/init_32.c | 22 +- arch/x86/mm/init_64.c | 269 ++++++++++++-- arch/x86/mm/ioremap.c | 3 +- arch/x86/mm/kasan_init_64.c | 41 ++- arch/x86/mm/kaslr.c | 82 ++++- arch/x86/mm/mmap.c | 4 +- arch/x86/mm/mpx.c | 17 +- arch/x86/mm/pageattr.c | 56 ++- arch/x86/mm/pgtable.c | 38 +- arch/x86/mm/pgtable_32.c | 8 +- arch/x86/platform/efi/efi_64.c | 38 +- arch/x86/power/hibernate_32.c | 7 +- arch/x86/power/hibernate_64.c | 49 ++- arch/x86/realmode/init.c | 2 +- arch/x86/xen/Kconfig | 1 + arch/x86/xen/mmu.c | 433 ++++++++++++++--------- arch/x86/xen/mmu.h | 1 + arch/xtensa/include/asm/pgtable.h | 1 + drivers/misc/sgi-gru/grufault.c | 9 +- fs/binfmt_aout.c | 2 - fs/binfmt_elf.c | 10 +- fs/hugetlbfs/inode.c | 6 +- fs/userfaultfd.c | 6 +- include/asm-generic/4level-fixup.h | 3 +- include/asm-generic/5level-fixup.h | 41 +++ include/asm-generic/pgtable-nop4d-hack.h | 62 ++++ include/asm-generic/pgtable-nop4d.h | 56 +++ include/asm-generic/pgtable-nopud.h | 48 +-- include/asm-generic/pgtable.h | 48 ++- include/asm-generic/tlb.h | 14 +- include/linux/hugetlb.h | 5 +- include/linux/kasan.h | 1 + include/linux/mm.h | 34 +- include/linux/sched.h | 8 + include/trace/events/xen.h | 28 +- include/uapi/linux/prctl.h | 3 + kernel/events/uprobes.c | 5 +- kernel/sys.c | 23 +- lib/ioremap.c | 39 +- mm/gup.c | 46 ++- mm/huge_memory.c | 7 +- mm/hugetlb.c | 29 +- mm/kasan/kasan_init.c | 35 +- mm/memory.c | 230 ++++++++++-- mm/mlock.c | 1 + mm/mmap.c | 20 +- mm/mprotect.c | 26 +- mm/mremap.c | 16 +- mm/nommu.c | 2 +- mm/pagewalk.c | 32 +- mm/pgtable-generic.c | 6 + mm/rmap.c | 13 +- mm/shmem.c | 8 +- mm/sparse-vmemmap.c | 22 +- mm/swapfile.c | 26 +- mm/userfaultfd.c | 23 +- mm/vmalloc.c | 81 +++-- 131 files changed, 2435 insertions(+), 611 deletions(-) create mode 100644 include/asm-generic/5level-fixup.h create mode 100644 include/asm-generic/pgtable-nop4d-hack.h create mode 100644 include/asm-generic/pgtable-nop4d.h -- 2.11.0 -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org