Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp7794417ybc; Fri, 29 Nov 2019 01:05:47 -0800 (PST) X-Google-Smtp-Source: APXvYqynqGL88ZWDufXYjKYmEmbJSfAmv9iUQRU4YDlj9ZOUyzgqYkmnPuQhI8kXemeDPFlfp+EJ X-Received: by 2002:a17:906:14d5:: with SMTP id y21mr18204300ejc.212.1575018347413; Fri, 29 Nov 2019 01:05:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575018347; cv=none; d=google.com; s=arc-20160816; b=lhbCiSrSBLHlCz9stT91kg/pr5gFJ4PZb5S8gaSzHL3BfSnT9fR9iSjFsP2HzJ2jcQ l6VB6XuyUHeRF1lZTc/JQHVYa7PPI1YskgUVsAlPhg5aHX2FDjzh5LZ7dRgY8N94WGaT PI9lItF2OIgBa4k62AWjgsVzpB+/vRpxeFwiPAqoQXIMj6M/6E9jFAVj9TuWpB5cnNI8 PyijZrX+kT0KGGFjWBrI08IOdF7ehifRh2rAyevHOnJ9RUr58z9BDvfcxN6Bgu6Z+iRv rf+yky16gokoXA24LLcv5g8W4PDxXp8WXxTzr2Hpe+eK9zY3XTeELt7V0eu4zPPnRVEx NMHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:from:references:cc:to:subject; bh=U7XvdN6976JhoKaYfbv6sVNAMLFk22n0dgoOSXWcBws=; b=iWcvEILT6sFOcMorM5XA4wFRcwf+vzLT+TlsDnmUGuBP5cT4E2gZ28PaUQXVzH+sWh IAYIpUbJpw2kkNeAurWGZrFVRdNkF4PuhIVg+1Ytl7XJ2ijuoaceee3O6x4QZr4ODAkR /KYnPTJ9YkrYZiwNzltt8Lmc6WZWxnuum0VzyAiYOr8cq+QNyMxM4gLshUSVwCPPnhgm Ru1uL5euls46kIg4URqporw3Q60rKVXgWoJmvmGLGYMCWrRR5f9WByt/P+lFd5w0IQ7o RNRrUAu83XiIcMghTRMrNSzBtmPPThqWbt2UOJJ5JDyx3e/yiCsCFlZdVb3zC3Xc6hfy tORQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o18si13489253ejj.427.2019.11.29.01.05.22; Fri, 29 Nov 2019 01:05:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726709AbfK2JD5 (ORCPT + 99 others); Fri, 29 Nov 2019 04:03:57 -0500 Received: from youngberry.canonical.com ([91.189.89.112]:39014 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725892AbfK2JD4 (ORCPT ); Fri, 29 Nov 2019 04:03:56 -0500 Received: from [82.43.126.140] (helo=[192.168.0.11]) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1iacBs-0002nk-Cr; Fri, 29 Nov 2019 09:03:52 +0000 Subject: Re: [PATCH] [PATCH v2] fsi: fix bogus error returns from cfam_read and cfam_write To: Jeremy Kerr , Joel Stanley , Alistar Popple , Eddie James , Benjamin Herrenschmidt , linux-fsi@lists.ozlabs.org Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org References: <20191122233120.110344-1-colin.king@canonical.com> <20191129032429.817-1-jk@ozlabs.org> From: Colin Ian King Autocrypt: addr=colin.king@canonical.com; prefer-encrypt=mutual; keydata= mQINBE6TJCgBEACo6nMNvy06zNKj5tiwDsXXS+LhT+LwtEsy9EnraKYXAf2xwazcICSjX06e fanlyhB0figzQO0n/tP7BcfMVNG7n1+DC71mSyRK1ZERcG1523ajvdZOxbBCTvTitYOy3bjs +LXKqeVMhK3mRvdTjjmVpWnWqJ1LL+Hn12ysDVVfkbtuIm2NoaSEC8Ae8LSSyCMecd22d9Pn LR4UeFgrWEkQsqROq6ZDJT9pBLGe1ZS0pVGhkRyBP9GP65oPev39SmfAx9R92SYJygCy0pPv BMWKvEZS/7bpetPNx6l2xu9UvwoeEbpzUvH26PHO3DDAv0ynJugPCoxlGPVf3zcfGQxy3oty dNTWkP6Wh3Q85m+AlifgKZudjZLrO6c+fAw/jFu1UMjNuyhgShtFU7NvEzL3RqzFf9O1qM2m uj83IeFQ1FZ65QAiCdTa3npz1vHc7N4uEQBUxyXgXfCI+A5yDnjHwzU0Y3RYS52TA3nfa08y LGPLTf5wyAREkFYou20vh5vRvPASoXx6auVf1MuxokDShVhxLpryBnlKCobs4voxN54BUO7m zuERXN8kadsxGFzItAyfKYzEiJrpUB1yhm78AecDyiPlMjl99xXk0zs9lcKriaByVUv/NsyJ FQj/kmdxox3XHi9K29kopFszm1tFiDwCFr/xumbZcMY17Yi2bQARAQABtCVDb2xpbiBLaW5n IDxjb2xpbi5raW5nQGNhbm9uaWNhbC5jb20+iQI2BBMBCAAhBQJOkyQoAhsDBQsJCAcDBRUK CQgLBRYCAwEAAh4BAheAAAoJEGjCh9/GqAImsBcP9i6C/qLewfi7iVcOwqF9avfGzOPf7CVr n8CayQnlWQPchmGKk6W2qgnWI2YLIkADh53TS0VeSQ7Tetj8f1gV75eP0Sr/oT/9ovn38QZ2 vN8hpZp0GxOUrzkvvPjpH+zdmKSaUsHGp8idfPpZX7XeBO0yojAs669+3BrnBcU5wW45SjSV nfmVj1ZZj3/yBunb+hgNH1QRcm8ZPICpjvSsGFClTdB4xu2AR28eMiL/TTg9k8Gt72mOvhf0 fS0/BUwcP8qp1TdgOFyiYpI8CGyzbfwwuGANPSupGaqtIRVf+/KaOdYUM3dx/wFozZb93Kws gXR4z6tyvYCkEg3x0Xl9BoUUyn9Jp5e6FOph2t7TgUvv9dgQOsZ+V9jFJplMhN1HPhuSnkvP 5/PrX8hNOIYuT/o1AC7K5KXQmr6hkkxasjx16PnCPLpbCF5pFwcXc907eQ4+b/42k+7E3fDA Erm9blEPINtt2yG2UeqEkL+qoebjFJxY9d4r8PFbEUWMT+t3+dmhr/62NfZxrB0nTHxDVIia u8xM+23iDRsymnI1w0R78yaa0Eea3+f79QsoRW27Kvu191cU7QdW1eZm05wO8QUvdFagVVdW Zg2DE63Fiin1AkGpaeZG9Dw8HL3pJAJiDe0KOpuq9lndHoGHs3MSa3iyQqpQKzxM6sBXWGfk EkK5Ag0ETpMkKAEQAMX6HP5zSoXRHnwPCIzwz8+inMW7mJ60GmXSNTOCVoqExkopbuUCvinN 4Tg+AnhnBB3R1KTHreFGoz3rcV7fmJeut6CWnBnGBtsaW5Emmh6gZbO5SlcTpl7QDacgIUuT v1pgewVHCcrKiX0zQDJkcK8FeLUcB2PXuJd6sJg39kgsPlI7R0OJCXnvT/VGnd3XPSXXoO4K cr5fcjsZPxn0HdYCvooJGI/Qau+imPHCSPhnX3WY/9q5/WqlY9cQA8tUC+7mgzt2VMjFft1h rp/CVybW6htm+a1d4MS4cndORsWBEetnC6HnQYwuC4bVCOEg9eXMTv88FCzOHnMbE+PxxHzW 3Gzor/QYZGcis+EIiU6hNTwv4F6fFkXfW6611JwfDUQCAHoCxF3B13xr0BH5d2EcbNB6XyQb IGngwDvnTyKHQv34wE+4KtKxxyPBX36Z+xOzOttmiwiFWkFp4c2tQymHAV70dsZTBB5Lq06v 6nJs601Qd6InlpTc2mjd5mRZUZ48/Y7i+vyuNVDXFkwhYDXzFRotO9VJqtXv8iqMtvS4xPPo 2DtJx6qOyDE7gnfmk84IbyDLzlOZ3k0p7jorXEaw0bbPN9dDpw2Sh9TJAUZVssK119DJZXv5 2BSc6c+GtMqkV8nmWdakunN7Qt/JbTcKlbH3HjIyXBy8gXDaEto5ABEBAAGJAh8EGAEIAAkF Ak6TJCgCGwwACgkQaMKH38aoAiZ4lg/+N2mkx5vsBmcsZVd3ys3sIsG18w6RcJZo5SGMxEBj t1UgyIXWI9lzpKCKIxKx0bskmEyMy4tPEDSRfZno/T7p1mU7hsM4owi/ic0aGBKP025Iok9G LKJcooP/A2c9dUV0FmygecRcbIAUaeJ27gotQkiJKbi0cl2gyTRlolKbC3R23K24LUhYfx4h pWj8CHoXEJrOdHO8Y0XH7059xzv5oxnXl2SD1dqA66INnX+vpW4TD2i+eQNPgfkECzKzGj+r KRfhdDZFBJj8/e131Y0t5cu+3Vok1FzBwgQqBnkA7dhBsQm3V0R8JTtMAqJGmyOcL+JCJAca 3Yi81yLyhmYzcRASLvJmoPTsDp2kZOdGr05Dt8aGPRJL33Jm+igfd8EgcDYtG6+F8MCBOult TTAu+QAijRPZv1KhEJXwUSke9HZvzo1tNTlY3h6plBsBufELu0mnqQvHZmfa5Ay99dF+dL1H WNp62+mTeHsX6v9EACH4S+Cw9Q1qJElFEu9/1vFNBmGY2vDv14gU2xEiS2eIvKiYl/b5Y85Q QLOHWV8up73KK5Qq/6bm4BqVd1rKGI9un8kezUQNGBKre2KKs6wquH8oynDP/baoYxEGMXBg GF/qjOC6OY+U7kNUW3N/A7J3M2VdOTLu3hVTzJMZdlMmmsg74azvZDV75dUigqXcwjE= Message-ID: Date: Fri, 29 Nov 2019 09:03:50 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20191129032429.817-1-jk@ozlabs.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 29/11/2019 03:24, Jeremy Kerr wrote: > Based on a static analysis report and original patch from Colin Ian King > . > > Currently, we may drop error values from cfam_read and cfam_write. This > change returns the actual error on failure, but a partial read/write will > take precedence. > > Addresses-Coverity: ("Unused value") > Fixes: d1dcd6782576 ("fsi: Add cfam char devices") > Reported-by: Colin Ian King > Signed-off-by: Jeremy Kerr > > --- > Colin: thanks for the report and patch. I think this is a more complete > fix, as we want to preseve any partial read/write status if a failure > happens mid-way through an operation. Let me know if you (or the > coverity analysis) have any feedback. Looks good to me. Thanks Jeremy. > > --- > > drivers/fsi/fsi-core.c | 32 ++++++++++++++++++++++---------- > 1 file changed, 22 insertions(+), 10 deletions(-) > > diff --git a/drivers/fsi/fsi-core.c b/drivers/fsi/fsi-core.c > index 71c6f9fef648..3158a78c2e94 100644 > --- a/drivers/fsi/fsi-core.c > +++ b/drivers/fsi/fsi-core.c > @@ -699,6 +699,8 @@ static ssize_t cfam_read(struct file *filep, char __user *buf, size_t count, > if (off > 0xffffffff || count > 0xffffffff || off + count > 0xffffffff) > return -EINVAL; > > + rc = 0; > + > for (total_len = 0; total_len < count; total_len += read_len) { > __be32 data; > > @@ -707,18 +709,22 @@ static ssize_t cfam_read(struct file *filep, char __user *buf, size_t count, > > rc = fsi_slave_read(slave, off, &data, read_len); > if (rc) > - goto fail; > + break; > rc = copy_to_user(buf + total_len, &data, read_len); > if (rc) { > rc = -EFAULT; > - goto fail; > + break; > } > off += read_len; > } > - rc = count; > - fail: > + > + /* if we've read any data, we want that to be returned in > + * preference to an error state */ > + if (total_len) > + rc = total_len; > + > *offset = off; > - return count; > + return rc; > } > > static ssize_t cfam_write(struct file *filep, const char __user *buf, > @@ -736,6 +742,8 @@ static ssize_t cfam_write(struct file *filep, const char __user *buf, > if (off > 0xffffffff || count > 0xffffffff || off + count > 0xffffffff) > return -EINVAL; > > + rc = 0; > + > for (total_len = 0; total_len < count; total_len += write_len) { > __be32 data; > > @@ -745,17 +753,21 @@ static ssize_t cfam_write(struct file *filep, const char __user *buf, > rc = copy_from_user(&data, buf + total_len, write_len); > if (rc) { > rc = -EFAULT; > - goto fail; > + break; > } > rc = fsi_slave_write(slave, off, &data, write_len); > if (rc) > - goto fail; > + break; > off += write_len; > } > - rc = count; > - fail: > + > + /* if we've written any data, we want to indicate that partial write > + * instead of any mid-stream error */ > + if (total_len) > + rc = total_len; > + > *offset = off; > - return count; > + return rc; > } > > static loff_t cfam_llseek(struct file *file, loff_t offset, int whence) >