Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3660420imm; Mon, 2 Jul 2018 03:18:49 -0700 (PDT) X-Google-Smtp-Source: AAOMgpck+4B61e73cmrfolxoDhxr040UHTunrzHJK0Vb9vhzaEsd14In3uSQ+cJy7Ucua2DiEvcH X-Received: by 2002:a62:a3d1:: with SMTP id q78-v6mr24511932pfl.5.1530526729356; Mon, 02 Jul 2018 03:18:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530526729; cv=none; d=google.com; s=arc-20160816; b=OFgf5/ATbpTLtUwq8HVJI8tnLP/bCVfM4CVQ236Mv1T520L0LwQq0BLYzKCv5szdTp UOs7wGtrbXUjYwsUwGbo88sREAk+uxLBd7o3MCosxScgQcE4wwAQz/ZYbs+7D4E/SuFc eJIA7JSCOLOZpwS69SM9ng+78uCDj6WGmiir6mT0a9JQZAKpMsd7ep/gCPb6ia7H+sna 1eV8n/Bnx1Bw15rtPAhbvbovWTjsPBRzVKHOMTW9GPn8OtIqYMwwSfgPq9YOmM6KxXYW yt9lcqQeSaTRwz9+bXNWCrKydPsbxDE8zSDdXqyWR7e4iKMIROgN1wTmhEQk01WbvGBC wVZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=srp3mwB2kDWqv8dYoGd8kjMcDs1/JEKnRnsd3qxqjGI=; b=CAMPlI1PfS5yQ/HcfcmjwSUZ23K6qLrd3QnqhDMfvJ0EjMxcVWjCL+IdYygixOhL1z 09bxrlK5+ibQjoOLxQXx2mtGOdQWLn5N31zxHKM+/V4pUpgVKX32kDXu8mkUqk2CYjjy m8qkwkNbdwor4WtgCFPKoUDudzzIKLX3Sx+u95ba5ko7gxVU1kyPIoNUQCfa5opXLYqp EA62D9D4hnzS0KwWl8oyK87E7N2BHH1GezkBOVUm3qfEbMs5KIHXa/Cf/3yBkaPF09J3 Z2Dhr8a7a56Rq8b67U1nIJ/Y0OR6xdzxSB3J9Pwp0NyKecrNISixaO5ZT4WQyksm6jEo yIIQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 32-v6si15395435ple.447.2018.07.02.03.18.35; Mon, 02 Jul 2018 03:18:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965316AbeGBKR3 (ORCPT + 99 others); Mon, 2 Jul 2018 06:17:29 -0400 Received: from mx2.suse.de ([195.135.220.15]:37320 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S965036AbeGBKR1 (ORCPT ); Mon, 2 Jul 2018 06:17:27 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 807AAACCE; Mon, 2 Jul 2018 10:17:25 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 5CE351E3C07; Mon, 2 Jul 2018 12:17:25 +0200 (CEST) Date: Mon, 2 Jul 2018 12:17:25 +0200 From: Jan Kara To: john.hubbard@gmail.com Cc: Matthew Wilcox , Michal Hocko , Christopher Lameter , Jason Gunthorpe , Dan Williams , Jan Kara , linux-mm@kvack.org, LKML , linux-rdma , linux-fsdevel@vger.kernel.org, John Hubbard Subject: Re: [PATCH v2 1/6] mm: get_user_pages: consolidate error handling Message-ID: <20180702101725.esnjyo4zp3726i3n@quack2.suse.cz> References: <20180702005654.20369-1-jhubbard@nvidia.com> <20180702005654.20369-2-jhubbard@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180702005654.20369-2-jhubbard@nvidia.com> User-Agent: NeoMutt/20170912 (1.9.0) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun 01-07-18 17:56:49, john.hubbard@gmail.com wrote: > From: John Hubbard > > An upcoming patch requires a way to operate on each page that > any of the get_user_pages_*() variants returns. > > In preparation for that, consolidate the error handling for > __get_user_pages(). This provides a single location (the "out:" label) > for operating on the collected set of pages that are about to be returned. > > As long every use of the "ret" variable is being edited, rename > "ret" --> "err", so that its name matches its true role. > This also gets rid of two shadowed variable declarations, as a > tiny beneficial a side effect. > > Signed-off-by: John Hubbard This looks nice! You can add: Reviewed-by: Jan Kara Honza > --- > mm/gup.c | 37 ++++++++++++++++++++++--------------- > 1 file changed, 22 insertions(+), 15 deletions(-) > > diff --git a/mm/gup.c b/mm/gup.c > index b70d7ba7cc13..73f0b3316fa7 100644 > --- a/mm/gup.c > +++ b/mm/gup.c > @@ -660,6 +660,7 @@ static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm, > struct vm_area_struct **vmas, int *nonblocking) > { > long i = 0; > + int err = 0; > unsigned int page_mask; > struct vm_area_struct *vma = NULL; > > @@ -685,18 +686,19 @@ static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm, > if (!vma || start >= vma->vm_end) { > vma = find_extend_vma(mm, start); > if (!vma && in_gate_area(mm, start)) { > - int ret; > - ret = get_gate_page(mm, start & PAGE_MASK, > + err = get_gate_page(mm, start & PAGE_MASK, > gup_flags, &vma, > pages ? &pages[i] : NULL); > - if (ret) > - return i ? : ret; > + if (err) > + goto out; > page_mask = 0; > goto next_page; > } > > - if (!vma || check_vma_flags(vma, gup_flags)) > - return i ? : -EFAULT; > + if (!vma || check_vma_flags(vma, gup_flags)) { > + err = -EFAULT; > + goto out; > + } > if (is_vm_hugetlb_page(vma)) { > i = follow_hugetlb_page(mm, vma, pages, vmas, > &start, &nr_pages, i, > @@ -709,23 +711,25 @@ static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm, > * If we have a pending SIGKILL, don't keep faulting pages and > * potentially allocating memory. > */ > - if (unlikely(fatal_signal_pending(current))) > - return i ? i : -ERESTARTSYS; > + if (unlikely(fatal_signal_pending(current))) { > + err = -ERESTARTSYS; > + goto out; > + } > cond_resched(); > page = follow_page_mask(vma, start, foll_flags, &page_mask); > if (!page) { > - int ret; > - ret = faultin_page(tsk, vma, start, &foll_flags, > + err = faultin_page(tsk, vma, start, &foll_flags, > nonblocking); > - switch (ret) { > + switch (err) { > case 0: > goto retry; > case -EFAULT: > case -ENOMEM: > case -EHWPOISON: > - return i ? i : ret; > + goto out; > case -EBUSY: > - return i; > + err = 0; > + goto out; > case -ENOENT: > goto next_page; > } > @@ -737,7 +741,8 @@ static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm, > */ > goto next_page; > } else if (IS_ERR(page)) { > - return i ? i : PTR_ERR(page); > + err = PTR_ERR(page); > + goto out; > } > if (pages) { > pages[i] = page; > @@ -757,7 +762,9 @@ static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm, > start += page_increm * PAGE_SIZE; > nr_pages -= page_increm; > } while (nr_pages); > - return i; > + > +out: > + return i ? i : err; > } > > static bool vma_permits_fault(struct vm_area_struct *vma, > -- > 2.18.0 > -- Jan Kara SUSE Labs, CR