From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1FDC1C369B8 for ; Tue, 15 Apr 2025 06:44:48 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id C6B9A2800A6; Tue, 15 Apr 2025 02:44:46 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id C1974280073; Tue, 15 Apr 2025 02:44:46 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id ABA632800A6; Tue, 15 Apr 2025 02:44:46 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 8908F280073 for ; Tue, 15 Apr 2025 02:44:46 -0400 (EDT) Received: from smtpin29.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 06E7BC0FFB for ; Tue, 15 Apr 2025 06:44:47 +0000 (UTC) X-FDA: 83335340214.29.522B357 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf29.hostedemail.com (Postfix) with ESMTP id 1168D120011 for ; Tue, 15 Apr 2025 06:44:44 +0000 (UTC) Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b="KHE3t/SC"; dmarc=pass (policy=quarantine) header.from=redhat.com; spf=pass (imf29.hostedemail.com: domain of bhe@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=bhe@redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1744699485; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=SutGNxLhkdu4G6mctAW9YWzgG+lju1obYh/lVOUIxqc=; b=e0Udzoa+zVgNZ1WkJrcXE/7n9QrEUpkAmR8kxYVSr/EiVeB9xM8/+j1i/bKaL3MI0CzBTP 7zFaYqFmUKrYqfIiCySP7IM20cYVpKTPU8YaXXdeHV3ORzvawnEVTDoeAu1h5oZCp2IUqa bpDsKE4fkL5VhvVvO5WmROC88AjU0uk= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1744699485; a=rsa-sha256; cv=none; b=QOKMpjLUNNKglhVfD0iSmHFByKi0r795MysLNSsgo9XlUWFglznPxN3xRP+HiNAv1Sgpte jlCSDFhNS2RuoiemmdRzxjehzoEU9mFZsYKgi+ZRty1hJL/No4/Dp2GMbw8lCmIxsHyK+e k/hOGPY7YVorSbB+JZwK4vgDKUF8bQ4= ARC-Authentication-Results: i=1; imf29.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b="KHE3t/SC"; dmarc=pass (policy=quarantine) header.from=redhat.com; spf=pass (imf29.hostedemail.com: domain of bhe@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=bhe@redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1744699484; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=SutGNxLhkdu4G6mctAW9YWzgG+lju1obYh/lVOUIxqc=; b=KHE3t/SCy01TGUBFmZulTbmB5Ww+y8W3dWGkl8Aiw3ajCOI4aBU0Oho1kHhOO5q0dEcy5o /x/DizxmsZOkvPYzZY6zCANMUQVZoPxzA9CWsxUZUIBm6qUn5YlHZYeBvHP/xNdXmtZ0p7 fOW/2pJxteDsjrVc9bxlwSN3ULWMdmw= Received: from mx-prod-mc-06.mail-002.prod.us-west-2.aws.redhat.com (ec2-35-165-154-97.us-west-2.compute.amazonaws.com [35.165.154.97]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-141-gw7uLWJdOj-6ft0pGCtvow-1; Tue, 15 Apr 2025 02:44:41 -0400 X-MC-Unique: gw7uLWJdOj-6ft0pGCtvow-1 X-Mimecast-MFC-AGG-ID: gw7uLWJdOj-6ft0pGCtvow_1744699479 Received: from mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-06.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id E113A1800361; Tue, 15 Apr 2025 06:44:38 +0000 (UTC) Received: from localhost (unknown [10.72.112.37]) by mx-prod-int-03.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id 96BEC19560AD; Tue, 15 Apr 2025 06:44:37 +0000 (UTC) Date: Tue, 15 Apr 2025 14:44:33 +0800 From: Baoquan He To: linux-mm@kvack.org Cc: akpm@linux-foundation.org, urezki@gmail.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH 5/5] mm/vmalloc.c: return explicit error value in alloc_vmap_area() Message-ID: References: <20250415023952.27850-1-bhe@redhat.com> <20250415023952.27850-6-bhe@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20250415023952.27850-6-bhe@redhat.com> X-Scanned-By: MIMEDefang 3.0 on 10.30.177.12 X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 1168D120011 X-Stat-Signature: bdnu8ataqrozyoetdirykwqu97gq5x51 X-Rspam-User: X-HE-Tag: 1744699484-783378 X-HE-Meta: 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 mt/oVvkW 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 04/15/25 at 10:39am, Baoquan He wrote: > In codes of alloc_vmap_area(), it returns the upper bound 'vend' to > indicate if the allocation is successful or failed. That is not very clear. > > Here change to return explicit error values and check them to judge if > allocation is successful. > > IS_ERR_VALUE already uses unlikely() internally ^^^^^^^^^ Sorry, above line was added mistakenly in log draft, should be removed. > > Signed-off-by: Baoquan He > --- > mm/vmalloc.c | 34 +++++++++++++++++----------------- > 1 file changed, 17 insertions(+), 17 deletions(-) > > diff --git a/mm/vmalloc.c b/mm/vmalloc.c > index 3f38a232663b..5b21cd09b2b4 100644 > --- a/mm/vmalloc.c > +++ b/mm/vmalloc.c > @@ -1715,7 +1715,7 @@ va_clip(struct rb_root *root, struct list_head *head, > */ > lva = kmem_cache_alloc(vmap_area_cachep, GFP_NOWAIT); > if (!lva) > - return -1; > + return -ENOMEM; > } > > /* > @@ -1729,7 +1729,7 @@ va_clip(struct rb_root *root, struct list_head *head, > */ > va->va_start = nva_start_addr + size; > } else { > - return -1; > + return -EINVAL; > } > > if (type != FL_FIT_TYPE) { > @@ -1758,19 +1758,19 @@ va_alloc(struct vmap_area *va, > > /* Check the "vend" restriction. */ > if (nva_start_addr + size > vend) > - return vend; > + return -ERANGE; > > /* Update the free vmap_area. */ > ret = va_clip(root, head, va, nva_start_addr, size); > - if (WARN_ON_ONCE(ret)) > - return vend; > + if (ret) > + return ret; > > return nva_start_addr; > } > > /* > * Returns a start address of the newly allocated area, if success. > - * Otherwise a vend is returned that indicates failure. > + * Otherwise an error value is returned that indicates failure. > */ > static __always_inline unsigned long > __alloc_vmap_area(struct rb_root *root, struct list_head *head, > @@ -1795,14 +1795,13 @@ __alloc_vmap_area(struct rb_root *root, struct list_head *head, > > va = find_vmap_lowest_match(root, size, align, vstart, adjust_search_size); > if (unlikely(!va)) > - return vend; > + return -ENOENT; > > nva_start_addr = va_alloc(va, root, head, size, align, vstart, vend); > - if (nva_start_addr == vend) > - return vend; > > #if DEBUG_AUGMENT_LOWEST_MATCH_CHECK > - find_vmap_lowest_match_check(root, head, size, align); > + if (!IS_ERR_VALUE(nva_start_addr)) > + find_vmap_lowest_match_check(root, head, size, align); > #endif > > return nva_start_addr; > @@ -1932,7 +1931,7 @@ node_alloc(unsigned long size, unsigned long align, > struct vmap_area *va; > > *vn_id = 0; > - *addr = vend; > + *addr = -EINVAL; > > /* > * Fallback to a global heap if not vmalloc or there > @@ -2012,20 +2011,20 @@ static struct vmap_area *alloc_vmap_area(unsigned long size, > } > > retry: > - if (addr == vend) { > + if (IS_ERR_VALUE(addr)) { > preload_this_cpu_lock(&free_vmap_area_lock, gfp_mask, node); > addr = __alloc_vmap_area(&free_vmap_area_root, &free_vmap_area_list, > size, align, vstart, vend); > spin_unlock(&free_vmap_area_lock); > } > > - trace_alloc_vmap_area(addr, size, align, vstart, vend, addr == vend); > + trace_alloc_vmap_area(addr, size, align, vstart, vend, IS_ERR_VALUE(addr)); > > /* > - * If an allocation fails, the "vend" address is > + * If an allocation fails, the error value is > * returned. Therefore trigger the overflow path. > */ > - if (unlikely(addr == vend)) > + if (IS_ERR_VALUE(addr)) > goto overflow; > > va->va_start = addr; > @@ -4753,9 +4752,10 @@ struct vm_struct **pcpu_get_vm_areas(const unsigned long *offsets, > > ret = va_clip(&free_vmap_area_root, > &free_vmap_area_list, va, start, size); > - if (WARN_ON_ONCE(unlikely(ret))) > - /* It is a BUG(), but trigger recovery instead. */ > + if ((unlikely(ret))) { > + WARN_ONCE(1, "%s error: errno (%d)\n", __func__, ret); > goto recovery; > + } > > /* Allocated area. */ > va = vas[area]; > -- > 2.41.0 >