Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751942AbdHCVZ0 (ORCPT ); Thu, 3 Aug 2017 17:25:26 -0400 Received: from mx1.redhat.com ([209.132.183.28]:36858 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751746AbdHCVZY (ORCPT ); Thu, 3 Aug 2017 17:25:24 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 1EB532027A Authentication-Results: ext-mx05.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx05.extmail.prod.ext.phx2.redhat.com; spf=fail smtp.mailfrom=aarcange@redhat.com Date: Thu, 3 Aug 2017 23:25:22 +0200 From: Andrea Arcangeli To: Mike Rapoport Cc: Michal Hocko , Andrew Morton , "Dr. David Alan Gilbert" , Pavel Emelyanov , linux-mm , lkml , stable@vger.kernel.org Subject: Re: [PATCH] userfaultfd_zeropage: return -ENOSPC in case mm has gone Message-ID: <20170803212522.GK21775@redhat.com> References: <1501136819-21857-1-git-send-email-rppt@linux.vnet.ibm.com> <20170731122204.GB4878@dhcp22.suse.cz> <20170731133247.GK29716@redhat.com> <20170731134507.GC4829@dhcp22.suse.cz> <20170802123440.GD17905@rapoport-lnx> <20170802155522.GB21775@redhat.com> <20170802162248.GA3476@dhcp22.suse.cz> <20170802164001.GF21775@redhat.com> <20170803172442.GA1026@rapoport-lnx> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170803172442.GA1026@rapoport-lnx> User-Agent: Mutt/1.8.3 (2017-05-23) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Thu, 03 Aug 2017 21:25:24 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1027 Lines: 22 On Thu, Aug 03, 2017 at 08:24:43PM +0300, Mike Rapoport wrote: > Now, seriously, I believe there are not many users of non-cooperative uffd > if at all and it is very unlikely anybody has it in production. > > I'll send a patch with s/ENOSPC/ESRCH in the next few days. Ok. Some more thought on this one, enterprise kernels have been shipped matching the v4.11-v4.12 upstream kernel ABI and I've no time machine to alter the kABI on those installs. If you go ahead with the change, the safest would be that you keep handling -ENOSPC and -ESRCH equally in CRIU code, so there will be no risk of regression in the short term if somebody is playing with an upstream CRIU. The alternative would be add uname -r knowledge. Once it's upstream, I can fixup so further kernel updates will go in sync. I obviously can't make changes that affects the kABI until it's upstream and shipped in a official release so things will be out of sync for a while (and the risk of somebody using ancient kernels will persist for the mid term).