Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3896360imm; Mon, 4 Jun 2018 11:02:57 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKkTV8aviPaG0xlL1qzdDFYnDAokbf0mNATMHHnYZjcB+5pBjoPohsRtoWfTEGaaepWWNMH X-Received: by 2002:a17:902:7406:: with SMTP id g6-v6mr22414971pll.90.1528135377013; Mon, 04 Jun 2018 11:02:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528135376; cv=none; d=google.com; s=arc-20160816; b=ZmCD+igGOAuYpCyzE0BnEC9Ywdkz4l/GAJoIkvTZN8JPNCKOzTkF8bWk/nkPPqo3By mp+ZQ8y/q005WeU8o+JqvPmqweOhyZrHKrSKphhslfEz0uUkFvzRxGPA1KJEf2AmxPju LBsafxW1+seE5BjqOHPthq6DUq0MqtLTchLoWqJGSZcb6EG3xHx2mS8kLIDbMN9BzEzZ O0XCsCamB8e01ls3sb5dcjC3WtiR0aVuyfvXjjPkjbwNOngzl6pIpAj8//2eG+fww9wV GL64iHo1tTJ95svFpAmHfIm2S9oR1LMsq1se39Ah+Q0icu+n5MDbJaI83PYuZQYoObCt +BLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=tmmPGfQb2Qfc42TevNsJPsj3OzBChNv7b9DJ4jVVFH4=; b=JMBqXzpNkLR1H+X/r6H4pkcPzY8YSD15vHAQPyEh9c/uMPygPSGbHB0+96rQZsgxaV KXupvRwibBrVdo8YAwSIzgL3K4gehDT6JGX9wlT3C4D2wYVmoR/Y0JCiMrKg2miCGxVc qPbYYWsIak8iLNes/mgYoRMFFJGbopKLiEglyhVl9gyHI4oUA4q1s91fLs8cIdP29GBr SqmlCq70lKszqVbUcGB3XxZd99oOStUouZ/HQyyeSfOpxu2Cm+UBg+/SQ5/ytAT0gEmX BzWNBiRd/9xMBEXw13oErmIs7JCL+yyi31reE9sMMiOhDggyigFEIo2V8NpggN/2vToB dCVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@wdc.com header.s=dkim.wdc.com header.b=lPvaO7vs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n6-v6si47401531pla.12.2018.06.04.11.02.32; Mon, 04 Jun 2018 11:02:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@wdc.com header.s=dkim.wdc.com header.b=lPvaO7vs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751823AbeFDSAG (ORCPT + 99 others); Mon, 4 Jun 2018 14:00:06 -0400 Received: from esa3.hgst.iphmx.com ([216.71.153.141]:37520 "EHLO esa3.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751439AbeFDSAC (ORCPT ); Mon, 4 Jun 2018 14:00:02 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1528135203; x=1559671203; h=from:to:cc:subject:date:message-id:in-reply-to: references; bh=aRLUM8aJ2RDWy0iYeI8xIzaiwZLzV8irU+1UtEVT1I8=; b=lPvaO7vs2RANdCHKDnC2d4bREoKz+4VF9m8wKTrQBQStdghw6iXNmYZW V3K8cMs4kOYaL2Vx2jbn6S4PQlusyb6xncKrZBPDXBOIqC9gcNCKIjrAC 9QLeQ8Tln7EcIuf0/fZlyNUfTW+3Sndi2iin6TN+4pvC5/OokQYxcocO+ WQH0Azuumj5RgkuO+hnTv43dJm/7+mefrYyYpdvRoro8xcDiFBSuF6keq 1lWxGEmCW2NVY4dilOjFLyeL8w7zY2r454QmklHRFFwcSQ4fOKg103mnh OpCULnXDqAlpxzFwB3krELXnhbNHnKK+KyQazpLKlDT03p+lJhuS9dccx g==; X-IronPort-AV: E=Sophos;i="5.49,476,1520870400"; d="scan'208";a="81550576" Received: from uls-op-cesaip02.wdc.com (HELO uls-op-cesaep02.wdc.com) ([199.255.45.15]) by ob1.hgst.iphmx.com with ESMTP; 05 Jun 2018 02:00:01 +0800 Received: from uls-op-cesaip02.wdc.com ([10.248.3.37]) by uls-op-cesaep02.wdc.com with ESMTP; 04 Jun 2018 10:50:04 -0700 Received: from penguito-adamm.sdcorp.global.sandisk.com ([10.11.47.13]) by uls-op-cesaip02.wdc.com with ESMTP; 04 Jun 2018 11:00:01 -0700 From: adam.manzanares@wdc.com To: viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org Cc: axboe@kernel.dk, bcrl@kvack.org, mingo@kernel.org, tglx@linutronix.de, kstewart@linuxfoundation.org, peterz@infradead.org, pombredanne@nexb.com, gregkh@linuxfoundation.org, bigeasy@linutronix.de, rgoldwyn@suse.com, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-aio@kvack.org, linux-api@vger.kernel.org, hch@infradread.org, jmoyer@redhat.com, willy@infradead.org, smfrench@gmail.com, Adam Manzanares Subject: [PATCH 2/2] fs: aio ioprio use ioprio_check_cap ret val Date: Mon, 4 Jun 2018 10:59:57 -0700 Message-Id: <20180604175957.2647-2-adam.manzanares@wdc.com> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180604175957.2647-1-adam.manzanares@wdc.com> References: <20180604175957.2647-1-adam.manzanares@wdc.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Adam Manzanares Previously the value was ignored. Signed-off-by: Adam Manzanares --- fs/aio.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/fs/aio.c b/fs/aio.c index 9527ededa669..134e5b635d64 100644 --- a/fs/aio.c +++ b/fs/aio.c @@ -1443,8 +1443,8 @@ static int aio_prep_rw(struct kiocb *req, struct iocb *iocb) */ ret = ioprio_check_cap(iocb->aio_reqprio); if (ret) { - pr_debug("aio ioprio check cap error\n"); - return -EINVAL; + pr_debug("aio ioprio check cap error: %d\n", ret); + return ret; } req->ki_ioprio = iocb->aio_reqprio; -- 2.17.0