Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp996951pxb; Wed, 6 Apr 2022 06:19:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx99esV8dZKordL2vK1sunWEvNT/+GuoYWx6EpBT7TSzGp/N81Fs2tcYjpTrWDDk9Jqa1ad X-Received: by 2002:a05:6a00:1312:b0:4e1:58c4:ddfd with SMTP id j18-20020a056a00131200b004e158c4ddfdmr8779765pfu.65.1649251187443; Wed, 06 Apr 2022 06:19:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649251187; cv=none; d=google.com; s=arc-20160816; b=f2ftxiFY2xI2MOj8G/rpBD6bKOpPdn8eYdQPFcKz++QxjZZV153YAx1hGQrevb1tF2 K+mk7Bt7ZD560eNOLmAg1HNZIKE2Eho/K092zJe7y6QphmSx8DjOeAI8vMXb5uV6UMjI +S3+cJlDdHXNBA1t0Fy/c8g7juExN3Q+0ml10Qv5RtFjc3jkmQda+OtFq5kMONSB3XPO 1gJ6xEgwQ30Cx2k0bKlfmVjUJ92ESeLIFG0fzS+43yuA2ejR6VuXWdWIoAAT7chHYVRu 9RaHyoa1OPdzXgEqokeMQnpDIiok9egdCrpVN9eTyut0vc0wJXEs9J60UjE4iDGLpzP7 51/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KoxpZUiSZBnEvMKHEa3DU6kbpUsh73Xs2XnPeptI3nI=; b=u1POOpUy1lJTNxKC7pyzS35MYJQlrIPCoUbodGTbplbvE3olT6zJlD6KdbOQBVTRXz OYMDSbkHbVSY9nGljyTeiQdl+YCMzWx/zvcU36v5Ugk2rvt66E6WydleoF7xyE/hgFQF RWhmTcKWLo/IybprKupzpgO3iDDIf7pPcswOSyZTr1Q1ypPdWS/rl66LG20hW27ohepJ Y717G20qpU08obZjb1OYoLoQ6SckaZkTcP+/Os2g12MpsgNCRcV4cwfUlml3nyPxLC3P 3I1PVWBsshXePD/8iLYLkw6/kY3z8S5qhoA2S8E05tSoErGhCv/rnHQEpmO9OWkIPmGY xp3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=N1Bn+W02; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id e13-20020a17090ab38d00b001ca77ffdaa4si4727550pjr.96.2022.04.06.06.19.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 06:19:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=N1Bn+W02; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 0AF505A1C87; Wed, 6 Apr 2022 03:56:53 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1846383AbiDFCEC (ORCPT + 99 others); Tue, 5 Apr 2022 22:04:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45148 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1354936AbiDEKQg (ORCPT ); Tue, 5 Apr 2022 06:16:36 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3848622C; Tue, 5 Apr 2022 03:04:11 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E4087B81C86; Tue, 5 Apr 2022 10:04:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5BD30C385A1; Tue, 5 Apr 2022 10:04:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649153048; bh=3z3jzRHy3464weK3HR2VtlPoQjepKQ2VowKCdolR2nc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=N1Bn+W02k0eBNlR9xJNshEzU3y4tFwqi3R9IF9hpWsxtXbXRv6eYXzloebkLUAxOh Y6cECJzjcklrkCTv+zD28xd5mHRgBzWNUKHuBsOOL0ZflGt/9I7tK19JTurw0dFXC7 OomQ+FRLUjD/vduDBeDS6LgKkm1dcH1fovbHm1O0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Charan Teja Kalla , Michal Hocko , Suren Baghdasaryan , Vlastimil Babka , David Rientjes , Nadav Amit , Andrew Morton , Linus Torvalds Subject: [PATCH 5.10 076/599] Revert "mm: madvise: skip unmapped vma holes passed to process_madvise" Date: Tue, 5 Apr 2022 09:26:10 +0200 Message-Id: <20220405070301.087589272@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070258.802373272@linuxfoundation.org> References: <20220405070258.802373272@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Charan Teja Kalla commit e6b0a7b357659c332231621e4315658d062c23ee upstream. This reverts commit 08095d6310a7 ("mm: madvise: skip unmapped vma holes passed to process_madvise") as process_madvise() fails to return the exact processed bytes in other cases too. As an example: if process_madvise() hits mlocked pages after processing some initial bytes passed in [start, end), it just returns EINVAL although some bytes are processed. Thus making an exception only for ENOMEM is partially fixing the problem of returning the proper advised bytes. Thus revert this patch and return proper bytes advised. Link: https://lkml.kernel.org/r/e73da1304a88b6a8a11907045117cccf4c2b8374.1648046642.git.quic_charante@quicinc.com Fixes: 08095d6310a7ce ("mm: madvise: skip unmapped vma holes passed to process_madvise") Signed-off-by: Charan Teja Kalla Acked-by: Michal Hocko Cc: Suren Baghdasaryan Cc: Vlastimil Babka Cc: David Rientjes Cc: Nadav Amit Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- mm/madvise.c | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-) --- a/mm/madvise.c +++ b/mm/madvise.c @@ -1222,16 +1222,9 @@ SYSCALL_DEFINE5(process_madvise, int, pi while (iov_iter_count(&iter)) { iovec = iov_iter_iovec(&iter); - /* - * do_madvise returns ENOMEM if unmapped holes are present - * in the passed VMA. process_madvise() is expected to skip - * unmapped holes passed to it in the 'struct iovec' list - * and not fail because of them. Thus treat -ENOMEM return - * from do_madvise as valid and continue processing. - */ ret = do_madvise(mm, (unsigned long)iovec.iov_base, iovec.iov_len, behavior); - if (ret < 0 && ret != -ENOMEM) + if (ret < 0) break; iov_iter_advance(&iter, iovec.iov_len); }