From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9F4AAD3E2D0 for ; Tue, 29 Oct 2024 07:50:18 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3450F6B00B2; Tue, 29 Oct 2024 03:50:18 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2CD856B00B3; Tue, 29 Oct 2024 03:50:18 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 0F9196B00B5; Tue, 29 Oct 2024 03:50:18 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id DBB556B00B2 for ; Tue, 29 Oct 2024 03:50:17 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 4E9FD120F78 for ; Tue, 29 Oct 2024 07:50:17 +0000 (UTC) X-FDA: 82725866118.21.518A5E0 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) by imf26.hostedemail.com (Postfix) with ESMTP id 9A90B140002 for ; Tue, 29 Oct 2024 07:49:55 +0000 (UTC) Authentication-Results: imf26.hostedemail.com; dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=aHlYgsje; dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=4YyJOKj1; dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=aHlYgsje; dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=4YyJOKj1; spf=pass (imf26.hostedemail.com: domain of vbabka@suse.cz designates 195.135.223.130 as permitted sender) smtp.mailfrom=vbabka@suse.cz; dmarc=none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1730188003; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=T3tGCR9SyoDmCFVnfF3niXmAN23SQy4Hlr/EAJvteP4=; b=TbGmwRePJ89J4/VI4UKBda7jisZaKW1p2xV+tL69HLDkndt5aQU5xDmNHfYJMdTrndTelN zsERkHRl43I2z7F0Y1gTkfnKi2QvZSs86fRG0Jdij9UUwrHdW1nd0o9HzvQO2ypY+3K+dH I4W8K1MwLWR3NggclzbV4tmI1Tysvb8= ARC-Authentication-Results: i=1; imf26.hostedemail.com; dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=aHlYgsje; dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=4YyJOKj1; dkim=pass header.d=suse.cz header.s=susede2_rsa header.b=aHlYgsje; dkim=pass header.d=suse.cz header.s=susede2_ed25519 header.b=4YyJOKj1; spf=pass (imf26.hostedemail.com: domain of vbabka@suse.cz designates 195.135.223.130 as permitted sender) smtp.mailfrom=vbabka@suse.cz; dmarc=none ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1730188003; a=rsa-sha256; cv=none; b=ldCT4banK7RwEdFadAGhTemS/fwBLu8r/FAniUkrf98gqEE5tjWsbj2/B3PkQ8DFckwF8+ if/CRXX5LcJRbxupBL+fcnBYAdNY8q694zdgaU6pyJWvs566+/m7b31KzoWZv0TNvl+ADu dE3DLi17WuARzvqS/AAabK2q7l3eq4w= Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id F3C6F21F9F; Tue, 29 Oct 2024 07:50:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1730188212; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=T3tGCR9SyoDmCFVnfF3niXmAN23SQy4Hlr/EAJvteP4=; b=aHlYgsjeWCyTIVhHwQvqm12zR7EXAtSfcG1h5IiI7dux1uRqZWwbJuCMiNXw5WwHLWEbrx emQlpkq2UxdLNoL5S83Y7PLBWDPPvCUnYzYQTZJWfkvinRC8O/eABXGXAsxOKQDxsHuMO3 EFsu34ADIIB6QzWItN9+Q4lSSpsBAr8= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1730188212; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=T3tGCR9SyoDmCFVnfF3niXmAN23SQy4Hlr/EAJvteP4=; b=4YyJOKj1L2megsZADnpLDP3KmuNpNuNHDshEWa4kGG2fxE5XojV6IcKP35yeGssDLUhJGr 6/UDE4+5RZZ2RhAA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1730188212; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=T3tGCR9SyoDmCFVnfF3niXmAN23SQy4Hlr/EAJvteP4=; b=aHlYgsjeWCyTIVhHwQvqm12zR7EXAtSfcG1h5IiI7dux1uRqZWwbJuCMiNXw5WwHLWEbrx emQlpkq2UxdLNoL5S83Y7PLBWDPPvCUnYzYQTZJWfkvinRC8O/eABXGXAsxOKQDxsHuMO3 EFsu34ADIIB6QzWItN9+Q4lSSpsBAr8= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1730188212; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:autocrypt:autocrypt; bh=T3tGCR9SyoDmCFVnfF3niXmAN23SQy4Hlr/EAJvteP4=; b=4YyJOKj1L2megsZADnpLDP3KmuNpNuNHDshEWa4kGG2fxE5XojV6IcKP35yeGssDLUhJGr 6/UDE4+5RZZ2RhAA== Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id D60DB136A5; Tue, 29 Oct 2024 07:50:11 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id Jw/qM7OTIGdAfQAAD6G6ig (envelope-from ); Tue, 29 Oct 2024 07:50:11 +0000 Message-ID: Date: Tue, 29 Oct 2024 08:50:11 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH hotfix 6.12 v2 4/8] mm: resolve faulty mmap_region() error path behaviour To: Lorenzo Stoakes Cc: Linus Torvalds , "Liam R. Howlett" , Mark Brown , Andrew Morton , Jann Horn , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Peter Xu , linux-arm-kernel@lists.infradead.org, Catalin Marinas , Will Deacon , Aishwarya TCV References: <438f50c5-8b8c-444f-ae85-10e5151f3f24@lucifer.local> <57mgmdx7wgfwci3yo3ggkmcnm3ujamgkwcccm77ypvmer5tegn@opiq3ceh2uvy> <0b64edb9-491e-4dcd-8dc1-d3c8a336a49b@suse.cz> <1608957a-d138-4401-98ef-7fbe5fb7c387@suse.cz> Content-Language: en-US From: Vlastimil Babka Autocrypt: addr=vbabka@suse.cz; keydata= xsFNBFZdmxYBEADsw/SiUSjB0dM+vSh95UkgcHjzEVBlby/Fg+g42O7LAEkCYXi/vvq31JTB KxRWDHX0R2tgpFDXHnzZcQywawu8eSq0LxzxFNYMvtB7sV1pxYwej2qx9B75qW2plBs+7+YB 87tMFA+u+L4Z5xAzIimfLD5EKC56kJ1CsXlM8S/LHcmdD9Ctkn3trYDNnat0eoAcfPIP2OZ+ 9oe9IF/R28zmh0ifLXyJQQz5ofdj4bPf8ecEW0rhcqHfTD8k4yK0xxt3xW+6Exqp9n9bydiy tcSAw/TahjW6yrA+6JhSBv1v2tIm+itQc073zjSX8OFL51qQVzRFr7H2UQG33lw2QrvHRXqD Ot7ViKam7v0Ho9wEWiQOOZlHItOOXFphWb2yq3nzrKe45oWoSgkxKb97MVsQ+q2SYjJRBBH4 8qKhphADYxkIP6yut/eaj9ImvRUZZRi0DTc8xfnvHGTjKbJzC2xpFcY0DQbZzuwsIZ8OPJCc LM4S7mT25NE5kUTG/TKQCk922vRdGVMoLA7dIQrgXnRXtyT61sg8PG4wcfOnuWf8577aXP1x 6mzw3/jh3F+oSBHb/GcLC7mvWreJifUL2gEdssGfXhGWBo6zLS3qhgtwjay0Jl+kza1lo+Cv BB2T79D4WGdDuVa4eOrQ02TxqGN7G0Biz5ZLRSFzQSQwLn8fbwARAQABzSBWbGFzdGltaWwg QmFia2EgPHZiYWJrYUBzdXNlLmN6PsLBlAQTAQoAPgIbAwULCQgHAwUVCgkICwUWAgMBAAIe AQIXgBYhBKlA1DSZLC6OmRA9UCJPp+fMgqZkBQJkBREIBQkRadznAAoJECJPp+fMgqZkNxIQ ALZRqwdUGzqL2aeSavbum/VF/+td+nZfuH0xeWiO2w8mG0+nPd5j9ujYeHcUP1edE7uQrjOC Gs9sm8+W1xYnbClMJTsXiAV88D2btFUdU1mCXURAL9wWZ8Jsmz5ZH2V6AUszvNezsS/VIT87 AmTtj31TLDGwdxaZTSYLwAOOOtyqafOEq+gJB30RxTRE3h3G1zpO7OM9K6ysLdAlwAGYWgJJ V4JqGsQ/lyEtxxFpUCjb5Pztp7cQxhlkil0oBYHkudiG8j1U3DG8iC6rnB4yJaLphKx57NuQ PIY0Bccg+r9gIQ4XeSK2PQhdXdy3UWBr913ZQ9AI2usid3s5vabo4iBvpJNFLgUmxFnr73SJ KsRh/2OBsg1XXF/wRQGBO9vRuJUAbnaIVcmGOUogdBVS9Sun/Sy4GNA++KtFZK95U7J417/J Hub2xV6Ehc7UGW6fIvIQmzJ3zaTEfuriU1P8ayfddrAgZb25JnOW7L1zdYL8rXiezOyYZ8Fm ZyXjzWdO0RpxcUEp6GsJr11Bc4F3aae9OZtwtLL/jxc7y6pUugB00PodgnQ6CMcfR/HjXlae h2VS3zl9+tQWHu6s1R58t5BuMS2FNA58wU/IazImc/ZQA+slDBfhRDGYlExjg19UXWe/gMcl De3P1kxYPgZdGE2eZpRLIbt+rYnqQKy8UxlszsBNBFsZNTUBCACfQfpSsWJZyi+SHoRdVyX5 J6rI7okc4+b571a7RXD5UhS9dlVRVVAtrU9ANSLqPTQKGVxHrqD39XSw8hxK61pw8p90pg4G /N3iuWEvyt+t0SxDDkClnGsDyRhlUyEWYFEoBrrCizbmahOUwqkJbNMfzj5Y7n7OIJOxNRkB IBOjPdF26dMP69BwePQao1M8Acrrex9sAHYjQGyVmReRjVEtv9iG4DoTsnIR3amKVk6si4Ea X/mrapJqSCcBUVYUFH8M7bsm4CSxier5ofy8jTEa/CfvkqpKThTMCQPNZKY7hke5qEq1CBk2 wxhX48ZrJEFf1v3NuV3OimgsF2odzieNABEBAAHCwXwEGAEKACYCGwwWIQSpQNQ0mSwujpkQ PVAiT6fnzIKmZAUCZAUSmwUJDK5EZgAKCRAiT6fnzIKmZOJGEACOKABgo9wJXsbWhGWYO7mD 8R8mUyJHqbvaz+yTLnvRwfe/VwafFfDMx5GYVYzMY9TWpA8psFTKTUIIQmx2scYsRBUwm5VI EurRWKqENcDRjyo+ol59j0FViYysjQQeobXBDDE31t5SBg++veI6tXfpco/UiKEsDswL1WAr tEAZaruo7254TyH+gydURl2wJuzo/aZ7Y7PpqaODbYv727Dvm5eX64HCyyAH0s6sOCyGF5/p eIhrOn24oBf67KtdAN3H9JoFNUVTYJc1VJU3R1JtVdgwEdr+NEciEfYl0O19VpLE/PZxP4wX PWnhf5WjdoNI1Xec+RcJ5p/pSel0jnvBX8L2cmniYnmI883NhtGZsEWj++wyKiS4NranDFlA HdDM3b4lUth1pTtABKQ1YuTvehj7EfoWD3bv9kuGZGPrAeFNiHPdOT7DaXKeHpW9homgtBxj 8aX/UkSvEGJKUEbFL9cVa5tzyialGkSiZJNkWgeHe+jEcfRT6pJZOJidSCdzvJpbdJmm+eED w9XOLH1IIWh7RURU7G1iOfEfmImFeC3cbbS73LQEFGe1urxvIH5K/7vX+FkNcr9ujwWuPE9b 1C2o4i/yZPLXIVy387EjA6GZMqvQUFuSTs/GeBcv0NjIQi8867H3uLjz+mQy63fAitsDwLmR EP+ylKVEKb0Q2A== In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Rspamd-Action: no action X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 9A90B140002 X-Stat-Signature: dfwz4znrhe7t3fobz4p8ugrkodybq8ks X-Rspam-User: X-HE-Tag: 1730188195-519731 X-HE-Meta: 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 DYeVj9DU XnQPyzNsZRCoxZ0MtzfmitCkl3IHb4ZGjWJHQpq8zJZNphny4OZS5x9Jxm2WZOz4jgZJmACCdV369ynaxM0GoWWJZtw9kWAD+MjS6dfTGPH3f1RFBMIKIUmYdWC+ZIxlcPAYOBmE4NDaxDWpeQWIZAMcpSE97R+v6mbrjCTbDLWIYfQn27pc4RnA0Kxc5OwFf1PcfOtY0/x7spK+NIs1t/7P4ChA4KlKvNm8ez7XfQnDUcMEBf2MZ07IuoEt5c7EYsFE2wg64zYb5KbUJS6MswqyyRWJRpRgbJLfdVg8M0qz+ypYTdCR2l3MiB2yBc8iIb2k+deL/VmFHyfguW2wj79pEjyvKZVMSlOrL5wqkO0/ZbjoGoQlLS4Z6NOL6YxeucUynxfdXCcbh6ts= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 10/28/24 23:14, Lorenzo Stoakes wrote: > On Mon, Oct 28, 2024 at 10:28:47PM +0100, Vlastimil Babka wrote: >> On 10/28/24 22:19, Linus Torvalds wrote: >> > On Mon, 28 Oct 2024 at 11:00, Vlastimil Babka wrote: >> >> >> >> VM_MTE_ALLOWED is also set by arm64's arch_calc_vm_flag_bits(): >> >> >> >> if (system_supports_mte() && (flags & MAP_ANONYMOUS)) >> >> return VM_MTE_ALLOWED; >> > >> > Yeah, but that should just move into arch_validate_flags() too. >> > There's no reason why that's done in a separate place. >> > >> > Linus >> >> Right, and VM_DATA_DEFAULT_FLAGS is only used in do_brk_flags() which is >> also an anonymous VMA, and it doesn't perform arch_validate_flags() anyway. > > Unfortunately we can't do this and have everything work entirely > consistently. Consistently with the current implementation, which seems inconsiscent wrt hugetlbfs. > This is because, while adding a file parameter to arch_validate_flags() > lets us do this shmem check, we can't be sure MAP_ANON was set and we do > not have access to this information at the point of the > arch_validate_flags() check. > > We could check file == NULL, but this then excludes the MAP_ANON | > MAP_HUGETLB case which is (probably accidentally) permitted by > arch_calc_vm_flag_bits() and for the purposes of this fix we probably just > want to keep behaviour identical. > > We could alternatively check the file is shmem _or_ hugetlb but this would > amount to a change in behaviour and not sure we want to go there. > > Anyway I attach a patch that does what you suggest, I actually compiled > this one (!) but don't have a system set up to test it (Mark?) > > If we bring this in it should probably be a separate commit... > > ----8<---- > From 247003cd2a4b5f4fc2dac97f5ef7e473a47f4324 Mon Sep 17 00:00:00 2001 > From: Lorenzo Stoakes > Date: Mon, 28 Oct 2024 22:05:44 +0000 > Subject: [PATCH] mm: perform MTE check within arm64 hook entirely > > It doesn't make sense to have shmem explicitly check this one arch-specific > case, it is arch-specific, so the arch should handle it. We know shmem is a > case in which we want to permit MTE, so simply check for this directly. > > This also fixes the issue with checking arch_validate_flags() early, which > would otherwise break mmap_region(). > > In order to implement this we must pass a file pointer, and additionally > update the sparc code to accept this parameter too. > > We'd ideally like to have eliminated the arch_calc_vm_flag_bits() case, but > we risk inadvertently changing behaviour as we do not have mmap() flags > available at the point of the arch_validate_flags() check and a MAP_ANON | > MAP_HUGETLB case would be accepted for MTE currently, but a MAP_SHARED | > MAP_HUGETLB would not. > > This is likely an oversight but we want to try to keep behaviour identical > to before in this patch. If it's confirmed to be oversight and MAP_SHARED hugetlbfs should be allowed, we could add another is_file_hugepages() condition > So continue to check VM_MTE_ALLOWED which arch_calc_vm_flag_bits() sets if > MAP_ANON. > > Signed-off-by: Lorenzo Stoakes Acked-by: Vlastimil Babka > --- > arch/arm64/include/asm/mman.h | 18 ++++++++++++++---- > arch/sparc/include/asm/mman.h | 5 +++-- > include/linux/mman.h | 2 +- > mm/mmap.c | 4 ++-- > mm/mprotect.c | 2 +- > mm/shmem.c | 3 --- > 6 files changed, 21 insertions(+), 13 deletions(-) > > diff --git a/arch/arm64/include/asm/mman.h b/arch/arm64/include/asm/mman.h > index 9e39217b4afb..44b7c8a1dd67 100644 > --- a/arch/arm64/include/asm/mman.h > +++ b/arch/arm64/include/asm/mman.h > @@ -6,7 +6,9 @@ > > #ifndef BUILD_VDSO > #include > +#include > #include > +#include > > static inline unsigned long arch_calc_vm_prot_bits(unsigned long prot, > unsigned long pkey) > @@ -60,15 +62,23 @@ static inline bool arch_validate_prot(unsigned long prot, > } > #define arch_validate_prot(prot, addr) arch_validate_prot(prot, addr) > > -static inline bool arch_validate_flags(unsigned long vm_flags) > +static inline bool arch_validate_flags(struct file *file, unsigned long vm_flags) > { > if (!system_supports_mte()) > return true; > > - /* only allow VM_MTE if VM_MTE_ALLOWED has been set previously */ > - return !(vm_flags & VM_MTE) || (vm_flags & VM_MTE_ALLOWED); > + if (!(vm_flags & VM_MTE)) > + return true; > + > + if (vm_flags & VM_MTE_ALLOWED) > + return true; > + > + if (shmem_file(file)) > + return true; > + > + return false; > } > -#define arch_validate_flags(vm_flags) arch_validate_flags(vm_flags) > +#define arch_validate_flags(file, vm_flags) arch_validate_flags(file, vm_flags) > > #endif /* !BUILD_VDSO */ > > diff --git a/arch/sparc/include/asm/mman.h b/arch/sparc/include/asm/mman.h > index af9c10c83dc5..d426e1f7c2c1 100644 > --- a/arch/sparc/include/asm/mman.h > +++ b/arch/sparc/include/asm/mman.h > @@ -10,6 +10,7 @@ int sparc_mmap_check(unsigned long addr, unsigned long len); > > #ifdef CONFIG_SPARC64 > #include > +#include > > static inline void ipi_set_tstate_mcde(void *arg) > { > @@ -54,11 +55,11 @@ static inline int sparc_validate_prot(unsigned long prot, unsigned long addr) > return 1; > } > > -#define arch_validate_flags(vm_flags) arch_validate_flags(vm_flags) > +#define arch_validate_flags(file, vm_flags) arch_validate_flags(file, vm_flags) > /* arch_validate_flags() - Ensure combination of flags is valid for a > * VMA. > */ > -static inline bool arch_validate_flags(unsigned long vm_flags) > +static inline bool arch_validate_flags(struct file *file, unsigned long vm_flags) > { > /* If ADI is being enabled on this VMA, check for ADI > * capability on the platform and ensure VMA is suitable > diff --git a/include/linux/mman.h b/include/linux/mman.h > index 8ddca62d6460..82e6488026b7 100644 > --- a/include/linux/mman.h > +++ b/include/linux/mman.h > @@ -117,7 +117,7 @@ static inline bool arch_validate_prot(unsigned long prot, unsigned long addr) > * > * Returns true if the VM_* flags are valid. > */ > -static inline bool arch_validate_flags(unsigned long flags) > +static inline bool arch_validate_flags(struct file *file, unsigned long flags) > { > return true; > } > diff --git a/mm/mmap.c b/mm/mmap.c > index 8462de1ee583..e06171d243ef 100644 > --- a/mm/mmap.c > +++ b/mm/mmap.c > @@ -1504,7 +1504,7 @@ static unsigned long __mmap_region(struct file *file, unsigned long addr, > > #ifdef CONFIG_SPARC64 > /* TODO: Fix SPARC ADI! */ > - WARN_ON_ONCE(!arch_validate_flags(vm_flags)); > + WARN_ON_ONCE(!arch_validate_flags(file, vm_flags)); > #endif > > /* Lock the VMA since it is modified after insertion into VMA tree */ > @@ -1587,7 +1587,7 @@ unsigned long mmap_region(struct file *file, unsigned long addr, > return -EACCES; > > /* Allow architectures to sanity-check the vm_flags. */ > - if (!arch_validate_flags(vm_flags)) > + if (!arch_validate_flags(file, vm_flags)) > return -EINVAL; > > /* Map writable and ensure this isn't a sealed memfd. */ > diff --git a/mm/mprotect.c b/mm/mprotect.c > index 6f450af3252e..c6db98b893fc 100644 > --- a/mm/mprotect.c > +++ b/mm/mprotect.c > @@ -816,7 +816,7 @@ static int do_mprotect_pkey(unsigned long start, size_t len, > } > > /* Allow architectures to sanity-check the new flags */ > - if (!arch_validate_flags(newflags)) { > + if (!arch_validate_flags(vma->vm_file, newflags)) { > error = -EINVAL; > break; > } > diff --git a/mm/shmem.c b/mm/shmem.c > index 4ba1d00fabda..e87f5d6799a7 100644 > --- a/mm/shmem.c > +++ b/mm/shmem.c > @@ -2733,9 +2733,6 @@ static int shmem_mmap(struct file *file, struct vm_area_struct *vma) > if (ret) > return ret; > > - /* arm64 - allow memory tagging on RAM-based files */ > - vm_flags_set(vma, VM_MTE_ALLOWED); > - > file_accessed(file); > /* This is anonymous shared memory if it is unlinked at the time of mmap */ > if (inode->i_nlink) > -- > 2.47.0