Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp328166ybt; Fri, 26 Jun 2020 00:00:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw9LtRhdpDkG4MM0mmwZuNSwoKt7wLyIiYMf4A4PUtUtSda8TXW9GEOFn/lPMO8fXbyQfJs X-Received: by 2002:a17:906:1499:: with SMTP id x25mr1302221ejc.406.1593154808356; Fri, 26 Jun 2020 00:00:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593154808; cv=none; d=google.com; s=arc-20160816; b=DrjAGMeYmUt/0sZP5vhGPB+L9Yv24KrNLaEipQuCyVtGogggXcHcgcp/T9fjIdrz8e l7jrJPnkRFY6If2jNOg51FxkGX5Vst6GfwuW8zGrJhXnyHLPrc4OdLXfwMXLiO6aq4MY HVxHmwUjW3zClv2JXwSP2TOEY46ZruIiANFsxK6pwxC6Mme+C3Y02gLudg3EiHI2lRWA btg292U/0uQQGarOzirESlquDmKtRSVKFx3fD9Jw3ramZQDMrzU8jHYMbqHDG3LU3aWf FkFfSyvnlwks02WD0cMcqcOrKPYf2OkG28lU4ufe7gmOYuVUKnRynsyRkjgpZY6aEjc8 4xPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=kNtBtp261FlCxw6BvN9A+R0NT7keLxkPmHummvyM1hw=; b=jk+HVjv8V6MM5dIHFYFfK/AE/u9u1/NtCjwcEnAZTAXL+WdydJ1oAjGD1byfSYyOWE 5C/5IKPO4I6fpfZvmD9HTAZqt7ochs/+Bd1shXiYtuKVX/dMf0npcZCQKZgsJS3Chu7i M0xmcSHXuCy8Cgq082CvkjARLozJVFVsVFGlH9sw27Qs23oRTgbwTWr3zcPZ3hIv9GRs 5Ds5kNla2HwBUkBncqxVxIbjDgeaoHDLpYdm5dnhfbPdWLB1dSSW3H7CweWoAjwOpdjg eublxOd+3q1xL3Ol0BvVdNAssUTQ0vSYNfG4YpU9WUcVl2f1o4QvR6YvK06GyzW2CSSq 4F1A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u4si16865332ejx.88.2020.06.25.23.59.45; Fri, 26 Jun 2020 00:00:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728086AbgFZFwV (ORCPT + 99 others); Fri, 26 Jun 2020 01:52:21 -0400 Received: from mx2.suse.de ([195.135.220.15]:57482 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728012AbgFZFwV (ORCPT ); Fri, 26 Jun 2020 01:52:21 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 28A75AAC3; Fri, 26 Jun 2020 05:52:19 +0000 (UTC) Subject: Re: [PATCH 1/2] xen/privcmd: Corrected error handling path and mark pages dirty To: Souptick Joarder , boris.ostrovsky@oracle.com, sstabellini@kernel.org Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, John Hubbard , Paul Durrant References: <1593054160-12628-1-git-send-email-jrdr.linux@gmail.com> From: =?UTF-8?B?SsO8cmdlbiBHcm/Dnw==?= Message-ID: <9ff52733-6ce0-6bda-8e49-a6908b4ff7dc@suse.com> Date: Fri, 26 Jun 2020 07:52:18 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: <1593054160-12628-1-git-send-email-jrdr.linux@gmail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 25.06.20 05:02, Souptick Joarder wrote: > Previously, if lock_pages() end up partially mapping pages, it used > to return -ERRNO due to which unlock_pages() have to go through > each pages[i] till *nr_pages* to validate them. This can be avoided > by passing correct number of partially mapped pages & -ERRNO separately, > while returning from lock_pages() due to error. > > With this fix unlock_pages() doesn't need to validate pages[i] till > *nr_pages* for error scenario and few condition checks can be ignored. > > As discussed, pages need to be marked as dirty before unpinned it in > unlock_pages() which was oversight. > > Signed-off-by: Souptick Joarder > Cc: John Hubbard > Cc: Boris Ostrovsky > Cc: Paul Durrant > --- > Hi, > > I'm compile tested this, but unable to run-time test, so any testing > help is much appriciated. > > drivers/xen/privcmd.c | 34 +++++++++++++++++++--------------- > 1 file changed, 19 insertions(+), 15 deletions(-) > > diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c > index a250d11..0da417c 100644 > --- a/drivers/xen/privcmd.c > +++ b/drivers/xen/privcmd.c > @@ -580,43 +580,44 @@ static long privcmd_ioctl_mmap_batch( > > static int lock_pages( > struct privcmd_dm_op_buf kbufs[], unsigned int num, > - struct page *pages[], unsigned int nr_pages) > + struct page *pages[], unsigned int nr_pages, int *pinned) unsigned int *pinned, please. > { > unsigned int i; > + int errno = 0, page_count = 0; Please drop the errno variable. It is misnamed (you never assign an errno value to it) and not needed, as you can ... > > for (i = 0; i < num; i++) { > unsigned int requested; > - int pinned; > > + *pinned += page_count; > requested = DIV_ROUND_UP( > offset_in_page(kbufs[i].uptr) + kbufs[i].size, > PAGE_SIZE); > if (requested > nr_pages) > return -ENOSPC; > > - pinned = get_user_pages_fast( > + page_count = get_user_pages_fast( > (unsigned long) kbufs[i].uptr, > requested, FOLL_WRITE, pages); > - if (pinned < 0) > - return pinned; > + if (page_count < 0) { > + errno = page_count; > + return errno; ... just return page_count her, and ... > + } > > - nr_pages -= pinned; > - pages += pinned; > + nr_pages -= page_count; > + pages += page_count; > } > > - return 0; > + return errno; ... leave this as it was. > } > > static void unlock_pages(struct page *pages[], unsigned int nr_pages) > { > unsigned int i; > > - if (!pages) > - return; > - > for (i = 0; i < nr_pages; i++) { > - if (pages[i]) > - put_page(pages[i]); > + if (!PageDirty(page)) > + set_page_dirty_lock(page); page? Not pages[i]? > + put_page(pages[i]); > } > } > > @@ -630,6 +631,7 @@ static long privcmd_ioctl_dm_op(struct file *file, void __user *udata) > struct xen_dm_op_buf *xbufs = NULL; > unsigned int i; > long rc; > + int pinned = 0; > > if (copy_from_user(&kdata, udata, sizeof(kdata))) > return -EFAULT; > @@ -683,9 +685,11 @@ static long privcmd_ioctl_dm_op(struct file *file, void __user *udata) > goto out; > } > > - rc = lock_pages(kbufs, kdata.num, pages, nr_pages); > - if (rc) > + rc = lock_pages(kbufs, kdata.num, pages, nr_pages, &pinned); > + if (rc < 0) { > + nr_pages = pinned; > goto out; > + } > > for (i = 0; i < kdata.num; i++) { > set_xen_guest_handle(xbufs[i].h, kbufs[i].uptr); > Juergen