Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp321248yba; Wed, 15 May 2019 01:50:13 -0700 (PDT) X-Google-Smtp-Source: APXvYqxp7XNw7IC3O0vWatNrTEOW3h9ZoCpD7B6xuQDfd1o0TXjnV5za0UB2TkKnrArwpsgbpeMK X-Received: by 2002:a17:902:9693:: with SMTP id n19mr42276422plp.92.1557910212928; Wed, 15 May 2019 01:50:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557910212; cv=none; d=google.com; s=arc-20160816; b=eNqg4kF3kAyiGZ/7HYIvIcgcBew4tXnnlRLDdYjtz8LXVEpWG42FIWIg24uuEnxNUG e/9ZDBQENqvNGQyAKx5tbWhlXlnJ4/x+LAmPNshR4gzBtDX6JtwhXdvT/GjD+W4UCxeT XwHceq70P6F1jEx7GZwVZO5PcI8AeFdOXefuIXPBzsqN6Cj6E9Vtspk2rGqGmFpSo/rh lGf284S6w6dpBSKUa2jt3xOXvQJYJbwFr+nmrgZ/77MVoKz/c1I53MFwH9ypJnM0IdgB 0dO6cOAbcCjmLjcNesDVXlwJLZLwmSCxj3JqFn2kkPBggXCf1E9Yf+3Yb9ga8+ba87DK 9stA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=RBKOGGXjvQMTQzfr1KxZ/9oyUSl618uUSUuLqd4U4J4=; b=fzVQSnX/hVojkbUGm+jgrV8AJvP9spp1ydB94hIlzu+UOoSAodzmr+JcPz6C5RzR0w iivSziPek/UAhbx6cBY0qWcFauOiRdg1mBvxAe6YKJyEgjce8Qvni5UYqyL/cjTDbKmD 8BU1invgq/sZL460UwtKSMY5loj6+Rfkj5GAiuQZivXp3iQcCC4Sqr5C83iLYxGsSs8O a4NZeEjjV7t6brOv63HICViPJkrYr0L2vsMQNnNsbEkzqSe/bE6JkWZV6YVri4bQexKS 4mzni98t1eC59cqgfjZFJw8maBa+Y4btP2wwLaTWK84miDW2VgsqBM+A3WsfeQJGNb7y kvxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=xS6pYk6l; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v21si1236498plo.34.2019.05.15.01.49.57; Wed, 15 May 2019 01:50:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=xS6pYk6l; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726319AbfEOIsg (ORCPT + 99 others); Wed, 15 May 2019 04:48:36 -0400 Received: from forwardcorp1p.mail.yandex.net ([77.88.29.217]:58292 "EHLO forwardcorp1p.mail.yandex.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725912AbfEOIsg (ORCPT ); Wed, 15 May 2019 04:48:36 -0400 Received: from mxbackcorp1j.mail.yandex.net (mxbackcorp1j.mail.yandex.net [IPv6:2a02:6b8:0:1619::162]) by forwardcorp1p.mail.yandex.net (Yandex) with ESMTP id E97EF2E146D; Wed, 15 May 2019 11:48:33 +0300 (MSK) Received: from smtpcorp1o.mail.yandex.net (smtpcorp1o.mail.yandex.net [2a02:6b8:0:1a2d::30]) by mxbackcorp1j.mail.yandex.net (nwsmtp/Yandex) with ESMTP id Q7pQ1sTs55-mXwKadUT; Wed, 15 May 2019 11:48:33 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru; s=default; t=1557910113; bh=RBKOGGXjvQMTQzfr1KxZ/9oyUSl618uUSUuLqd4U4J4=; h=In-Reply-To:Message-ID:From:Date:References:To:Subject:Cc; b=xS6pYk6lclpU7VNMA86o90Cjw5stbFWI+4tB+0YsgkUrheiouBQ8AFz8MpyH3KX6B cYl8QrQFZIGVKhNgLsQ5GI7hC5vZalPybRoqEZphXJ6kxTMy+pJlDcuospumbfhH/6 AX9OFu7taypLf891OGXJ8oBpDBEjmuIz6A49Iw8Q= Authentication-Results: mxbackcorp1j.mail.yandex.net; dkim=pass header.i=@yandex-team.ru Received: from dynamic-red.dhcp.yndx.net (dynamic-red.dhcp.yndx.net [2a02:6b8:0:40c:ed19:3833:7ce1:2324]) by smtpcorp1o.mail.yandex.net (nwsmtp/Yandex) with ESMTPSA id F0Vfe9DM2Y-mXlCWMAt; Wed, 15 May 2019 11:48:33 +0300 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client certificate not present) Subject: Re: mm: use down_read_killable for locking mmap_sem in access_remote_vm To: =?UTF-8?Q?Michal_Koutn=c3=bd?= Cc: akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, oleg@redhat.com References: <20190515083825.GJ13687@blackbody.suse.cz> From: Konstantin Khlebnikov Message-ID: <11ee83c8-5f0f-0950-a588-037bdcf9084e@yandex-team.ru> Date: Wed, 15 May 2019 11:48:32 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <20190515083825.GJ13687@blackbody.suse.cz> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-CA Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 15.05.2019 11:38, Michal Koutn? wrote: > Hi, > making this holder of mmap_sem killable was for the reasons of /proc/... > diagnostics was an idea I was pondeering too. However, I think the > approach of pretending we read 0 bytes is not correct. The API would IMO > need to be extended to allow pass a result such as EINTR to the end > caller. > Why do you think it's safe to return just 0? This function ignores any error like reading from unmapped area and returns only size of successful transfer. It never returned any error codes. > > Michal >