Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp7874pxk; Tue, 1 Sep 2020 14:34:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxPGfYeeez1RKLqo+4+UIpKto9f+gldz64GLzUy45jz882Y9zZjKrflIJ/lGWUuzW1t6FZC X-Received: by 2002:a50:be82:: with SMTP id b2mr3701444edk.303.1598996045641; Tue, 01 Sep 2020 14:34:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598996045; cv=none; d=google.com; s=arc-20160816; b=VuZ7z1oguH/9k1TfPAC1o57tsRA2aHzlzivIZcqd+XaYt0n1Cs3OKyTxmprYdgsk4h B6zNrvTbbSzfgVySOgnhg6DhNmwxgcVKiVovGISUzMds1Y9aaobv/Apyk/z/71MfNqp6 mEEBjt4mS1+E8w5H2KXK3yv3SzZcc9lsuUASgDoPFxuc6P8BkEUlTK7/Us1IS7KtDMY/ Q+7aSJXTVNKEX5JmievBY+fkj0sTod6jRv+UI3vcBtD9Ele9JwGpMi6KlNQSsZl17EnX m62m1BomH9ooozuS26NqUr2WxCIGzr19BWOwNdPTR6YU920ZGpREaAlZoPX8mn5oNlu1 mVBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=bJ0AvRFOeKaBU0OzseOoDtmXAo41HBvW7nwl0IHgiTM=; b=NwpnG+eriZWT9Z6xL+SZerGLGa3++1WA2jcnoyyErIC8+3P4jPYPgMUVv/+jQTkYfD YDzQjamrGr/1gQwjy5fAgdV4ePqmzO4qmheWNyEd3iKtFrTcEgI+UOROOwutY78dqcM9 /naWVISBLwzh+g66Q0rOZBI1u04p3o54bMepSspJvVhZGKgCbd0u8y2W46l7LmgnYNdL QVo5sWxnqRhsuk+xsvBLb+RDrwmRu1Tp1ZjhpwWYor/4SylXHSPHCHy4VHs1tn5UR3OZ N+TPtSeMI9agt1LZjlopjgv6B5ezqJwO138fZOJmHNijFWsg6db5Xu2oh7hhJGDVlzUb o0ng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=fliXsxSN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i7si1564155ejo.667.2020.09.01.14.33.42; Tue, 01 Sep 2020 14:34:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=fliXsxSN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728563AbgIAVaW (ORCPT + 99 others); Tue, 1 Sep 2020 17:30:22 -0400 Received: from hqnvemgate24.nvidia.com ([216.228.121.143]:7168 "EHLO hqnvemgate24.nvidia.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726521AbgIAVaT (ORCPT ); Tue, 1 Sep 2020 17:30:19 -0400 Received: from hqpgpgate101.nvidia.com (Not Verified[216.228.121.13]) by hqnvemgate24.nvidia.com (using TLS: TLSv1.2, DES-CBC3-SHA) id ; Tue, 01 Sep 2020 14:28:12 -0700 Received: from hqmail.nvidia.com ([172.20.161.6]) by hqpgpgate101.nvidia.com (PGP Universal service); Tue, 01 Sep 2020 14:30:19 -0700 X-PGP-Universal: processed; by hqpgpgate101.nvidia.com on Tue, 01 Sep 2020 14:30:19 -0700 Received: from [10.2.63.6] (10.124.1.5) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 1 Sep 2020 21:30:18 +0000 Subject: Re: [linux-next PATCH v4] drivers/virt/fsl_hypervisor: Fix error handling path To: Souptick Joarder , CC: , , , , , References: <1598995271-6755-1-git-send-email-jrdr.linux@gmail.com> From: John Hubbard Message-ID: Date: Tue, 1 Sep 2020 14:30:18 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <1598995271-6755-1-git-send-email-jrdr.linux@gmail.com> X-Originating-IP: [10.124.1.5] X-ClientProxiedBy: HQMAIL105.nvidia.com (172.20.187.12) To HQMAIL107.nvidia.com (172.20.187.13) Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1; t=1598995692; bh=bJ0AvRFOeKaBU0OzseOoDtmXAo41HBvW7nwl0IHgiTM=; h=X-PGP-Universal:Subject:To:CC:References:From:Message-ID:Date: User-Agent:MIME-Version:In-Reply-To:X-Originating-IP: X-ClientProxiedBy:Content-Type:Content-Language: Content-Transfer-Encoding; b=fliXsxSNeIMqSZY5YVw5jSsPl3+0/o5IRA+9EANbQp/zIWqN7jXavd/VGcgfvvkxY 96SNMi66eENkdctZA7PsGz9omeatFHMhYWr75tqs10szH1gVscU+98pz7KU2gyHubo +GURvE4r+FL3gzEJ8/Qk8smFSd8Jg93BHC5NkcyD00g4+EeskX++jCc/pHNu/LxKR0 u1rdcpHsqZEL8/yW/c0or76mxgBQqYYL4KhiU7F/3eIpSQsh4bc2f91YFuiCQHyREn bamDRByrNDWAnfF+tqYb43UVsy76hNCcqZalzNXlyVeiAjRu5rfovf2WywQnTegb3d 4XHqWpjhWzXhA== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/1/20 2:21 PM, Souptick Joarder wrote: > First, when memory allocation for sg_list_unaligned failed, there > is a bug of calling put_pages() as we haven't pinned any pages. > > Second, if get_user_pages_fast() failed we should unpin num_pinned > pages. > > This will address both. > > As part of these changes, minor update in documentation. > > Fixes: 6db7199407ca ("drivers/virt: introduce Freescale hypervisor > management driver") > Signed-off-by: Souptick Joarder > Reviewed-by: Dan Carpenter > Reviewed-by: John Hubbard > --- This looks good to me. thanks, -- John Hubbard NVIDIA > v2: > Added review tag. > > v3: > Address review comment on v2 from John. > Added review tag. > > v4: > Address another set of review comments from John. > > drivers/virt/fsl_hypervisor.c | 17 ++++++++--------- > 1 file changed, 8 insertions(+), 9 deletions(-) > > diff --git a/drivers/virt/fsl_hypervisor.c b/drivers/virt/fsl_hypervisor.c > index 1b0b11b..46ee0a0 100644 > --- a/drivers/virt/fsl_hypervisor.c > +++ b/drivers/virt/fsl_hypervisor.c > @@ -157,7 +157,7 @@ static long ioctl_memcpy(struct fsl_hv_ioctl_memcpy __user *p) > > unsigned int i; > long ret = 0; > - int num_pinned; /* return value from get_user_pages() */ > + int num_pinned = 0; /* return value from get_user_pages_fast() */ > phys_addr_t remote_paddr; /* The next address in the remote buffer */ > uint32_t count; /* The number of bytes left to copy */ > > @@ -174,7 +174,7 @@ static long ioctl_memcpy(struct fsl_hv_ioctl_memcpy __user *p) > return -EINVAL; > > /* > - * The array of pages returned by get_user_pages() covers only > + * The array of pages returned by get_user_pages_fast() covers only > * page-aligned memory. Since the user buffer is probably not > * page-aligned, we need to handle the discrepancy. > * > @@ -224,7 +224,7 @@ static long ioctl_memcpy(struct fsl_hv_ioctl_memcpy __user *p) > > /* > * 'pages' is an array of struct page pointers that's initialized by > - * get_user_pages(). > + * get_user_pages_fast(). > */ > pages = kcalloc(num_pages, sizeof(struct page *), GFP_KERNEL); > if (!pages) { > @@ -241,7 +241,7 @@ static long ioctl_memcpy(struct fsl_hv_ioctl_memcpy __user *p) > if (!sg_list_unaligned) { > pr_debug("fsl-hv: could not allocate S/G list\n"); > ret = -ENOMEM; > - goto exit; > + goto free_pages; > } > sg_list = PTR_ALIGN(sg_list_unaligned, sizeof(struct fh_sg_list)); > > @@ -250,7 +250,6 @@ static long ioctl_memcpy(struct fsl_hv_ioctl_memcpy __user *p) > num_pages, param.source != -1 ? FOLL_WRITE : 0, pages); > > if (num_pinned != num_pages) { > - /* get_user_pages() failed */ > pr_debug("fsl-hv: could not lock source buffer\n"); > ret = (num_pinned < 0) ? num_pinned : -EFAULT; > goto exit; > @@ -292,13 +291,13 @@ static long ioctl_memcpy(struct fsl_hv_ioctl_memcpy __user *p) > virt_to_phys(sg_list), num_pages); > > exit: > - if (pages) { > - for (i = 0; i < num_pages; i++) > - if (pages[i]) > - put_page(pages[i]); > + if (pages && (num_pinned > 0)) { > + for (i = 0; i < num_pinned; i++) > + put_page(pages[i]); > } > > kfree(sg_list_unaligned); > +free_pages: > kfree(pages); > > if (!ret) >