From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id ACD78C369DC for ; Tue, 29 Apr 2025 16:44:09 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A9B236B0008; Tue, 29 Apr 2025 12:44:08 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A4C3E6B000A; Tue, 29 Apr 2025 12:44:08 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8EED66B000C; Tue, 29 Apr 2025 12:44:08 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 716586B0008 for ; Tue, 29 Apr 2025 12:44:08 -0400 (EDT) Received: from smtpin14.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 5961E5C658 for ; Tue, 29 Apr 2025 16:44:08 +0000 (UTC) X-FDA: 83387653776.14.1D0EA50 Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by imf24.hostedemail.com (Postfix) with ESMTP id 9DD91180007 for ; Tue, 29 Apr 2025 16:44:06 +0000 (UTC) Authentication-Results: imf24.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b="pzW/sGuE"; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf24.hostedemail.com: domain of jannh@google.com designates 209.85.128.53 as permitted sender) smtp.mailfrom=jannh@google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1745945046; a=rsa-sha256; cv=none; b=sYcW0BDVFNnowzOdKJ4zo3urSFdo8BcAoTQa1ZMx7DfFvij9pROAYCN7pzUL2RLGmPp+Eb QpESVT7xJQRCjzAnRKbjQmkLg3VavB49p7nGlNQn/p2O+VQgOGITBvTzzg7s8X7vBb1SFn PjQ4jGF7fGnftWYctkxl7ZUe9KcIAiI= ARC-Authentication-Results: i=1; imf24.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b="pzW/sGuE"; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf24.hostedemail.com: domain of jannh@google.com designates 209.85.128.53 as permitted sender) smtp.mailfrom=jannh@google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1745945046; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=8Q+7reQ7Y48tayiXG8kRLfEN8nY/ew2idxVMBKwK9Bk=; b=zDreFuLIqDqbotZzBumbNKvgzJAyEqCntBskQP07xnSntgLnTjtLV3Ul1fn40uism1s6Py U5ZMdx/kmK/wiLhCt/n3FXSwfDVUfAB69z5gIMULtDUxMRjLjRPuEyxbJgBu62WNzrfhnR UaqTcMwUi8yzTHOLXdKimbVqv6Hdygg= Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-43d5f10e1aaso53675e9.0 for ; Tue, 29 Apr 2025 09:44:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1745945045; x=1746549845; darn=kvack.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=8Q+7reQ7Y48tayiXG8kRLfEN8nY/ew2idxVMBKwK9Bk=; b=pzW/sGuEX8zZbZPPjR8z4Afg6bH10+Sab4eW40Z8Hae+X6Mk5bjaFMUXS9Ll3BM0CP suBXjFvnESS6Ml9wB8p2tNbWApRb2jUHM7g+vP48FG+N2O1Z9yHzmtAbMeo+fuflQkN+ kHHvNO6TGdF5BMEtr/Mk+FPOhxCj8StbUnG3ag7wVzuSXPsJMz1+umcHybuAJMtIuZ26 DtdKazgdptIA+JjOpxlBywn/NNqaXEINTuJBbpAfwui8RTLIi6e/J1tfuzpjxX7lRXYV keAiYY918uh82oM8Pf3VY8b+9DVVepHfyhzCaWasw+/QWbuJGcV48fz2xupHcxgUQ2iR rZtg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1745945045; x=1746549845; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=8Q+7reQ7Y48tayiXG8kRLfEN8nY/ew2idxVMBKwK9Bk=; b=a3biWe/Ylzs3RZe3ShpPqSclRM+XQHtqb0AaTFeBFqWezYpqaFHJ3ULBICqKEXb13Z O/qFmxPvKPFfGSNqtw7s2O1annaevmo8bsEGXKwe5Etj/DkBiZ0p4xwNPZtJeYTqvk/7 pjCIl3jcXSl31tcxBwpv/H5i/NpJS76bHstEKD+2rdeBp6R/ybvqb/AfTqZ+tEuYLIsz IFY0HyGt9d+qUd9J9eWRICx8MP/BVRKVn+foh0wdy5dRVZffMOjov5x8bADZh/VYyTAj 61Uz1V1IqX/lBaMxD3Gy8mgx5KYjjxT8RnyzwTtnqDloctOEQZ+/n+ZmaZ8P4S00q1yk FtZQ== X-Forwarded-Encrypted: i=1; AJvYcCU+FmlhxxNuXCxUOwM4XEZb4gqty636SW8eNSDI52Ak6Ks/A5XF/AxJCIG1OUvCAJGr23uvJJ15uA==@kvack.org X-Gm-Message-State: AOJu0YyGc8+cZeBe+J5bgMDfeijgNZhZJ+bD9tGCly3rbOjHgHcMMKqL lxGVKCEK20EUf09BWaWW9JqphimkMOeJPg7TkpdbwPvt2ZbjYXRlQ8XTBbHz3w== X-Gm-Gg: ASbGncvaYL4YcRm/WkZQChSSF7/rDzF4kAmjAp9KZYjYAMhbbsAO/Av2Os6ji5AKOjx LDgzlCXicBkdql2ffVKXYyvKqqw+xdpJLCFgMvIZpwTr6rTp+yrEoJP+DoRy3aO2+tEj11ne2Ch IqugJHH3yGhzsLmwPZuYBKE085DQwVeaU+Gy3N59XYn3a6gQbss6P57eJsJwZ2zMlt8xEf68WJC JSy1i6+iSG+v/CFZa7GJGTsnaZyEgQCzE1G+7PYEX1GsiV/2yvVeLsUX4cLngwAUKXo7XU1Hj53 BtzGdSlXONiYesF3j4ARDXpJzMBWCuRmV1OPyAw= X-Google-Smtp-Source: AGHT+IHj8FRRYMysLKuNm+nK2RZNYOU6P6Y6esGIE0iQ1A63rIVKxzj45a1okqyzM3jfirP/VoxdZQ== X-Received: by 2002:a05:600c:4688:b0:439:8d84:32ff with SMTP id 5b1f17b1804b1-441ad65335dmr1202435e9.3.1745945044815; Tue, 29 Apr 2025 09:44:04 -0700 (PDT) Received: from localhost ([2a00:79e0:9d:4:3989:6246:83f7:7d90]) by smtp.gmail.com with UTF8SMTPSA id ffacd0b85a97d-3a073e5da4dsm14625359f8f.99.2025.04.29.09.44.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 29 Apr 2025 09:44:04 -0700 (PDT) From: Jann Horn To: Alejandro Colomar Cc: linux-man@vger.kernel.org, Andrew Morton , "Liam R . Howlett" , Lorenzo Stoakes , Vlastimil Babka , linux-mm@kvack.org, Jakub Wilk Subject: [PATCH man v2] mmap.2: Document danger of mappings larger than PTRDIFF_MAX Date: Tue, 29 Apr 2025 18:43:59 +0200 Message-ID: <20250429164359.2699330-1-jannh@google.com> X-Mailer: git-send-email 2.49.0.901.g37484f566f-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 9DD91180007 X-Stat-Signature: jgneuk3ditqcxgw1i4oeucnrczid4fr6 X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1745945046-692577 X-HE-Meta: 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 nT/EXpE7 hCeRk5F82ODi5HjFezpz9LBQzpblIm+jKUE1ws3wL9ty9x3nXpI4NGjVlMoLZvCws8D5vbPzbBsVGOnA= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: References: - C99 draft: https://www.open-std.org/jtc1/sc22/wg14/www/docs/n1124.pdf section "6.5.6 Additive operators", paragraph 9 - object size restriction in GCC: https://gcc.gnu.org/legacy-ml/gcc/2011-08/msg00221.html - glibc malloc restricts object size to <=PTRDIFF_MAX in checked_request2size() since glibc v2.30 (released in 2019, as pointed out by Jakub Wilk): https://sourceware.org/cgit/glibc/commit/?id=9bf8e29ca136094f --- man/man2/mmap.2 | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/man/man2/mmap.2 b/man/man2/mmap.2 index caf822103..4bb15699d 100644 --- a/man/man2/mmap.2 +++ b/man/man2/mmap.2 @@ -785,6 +785,25 @@ correspond to added or removed regions of the file is unspecified. An application can determine which pages of a mapping are currently resident in the buffer/page cache using .BR mincore (2). +.P +Unlike typical +.BR malloc (3) +implementations, +.BR mmap () +does not prevent creating objects larger than +.BR PTRDIFF_MAX . +Objects that are larger than +.B PTRDIFF_MAX +only work in limited ways in standard C +(in particular, pointer subtraction results in undefined behavior if the +result would be bigger than +.BR PTRDIFF_MAX ). +On top of that, GCC also assumes that no object is bigger than +.BR PTRDIFF_MAX . +.B PTRDIFF_MAX +is usually half of the address space size; +so for 32-bit processes, +it is usually 0x7fffffff (almost 2 GiB). .\" .SS Using MAP_FIXED safely The only safe use for base-commit: 4c4d9f0f5148caf1271394018d0f7381c1b8b400 -- 2.49.0.901.g37484f566f-goog