git: 3d8f65fbf8f5 - main - vm/vm_mmap.c: use EXTERROR()
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 16 Jun 2025 15:12:30 UTC
The branch main has been updated by kib:
URL: https://cgit.FreeBSD.org/src/commit/?id=3d8f65fbf8f5922d369f1509863f9c9a1adca26f
commit 3d8f65fbf8f5922d369f1509863f9c9a1adca26f
Author: Konstantin Belousov <kib@FreeBSD.org>
AuthorDate: 2025-06-14 13:54:19 +0000
Commit: Konstantin Belousov <kib@FreeBSD.org>
CommitDate: 2025-06-16 15:12:05 +0000
vm/vm_mmap.c: use EXTERROR()
Reviewed by: markj
Sponsored by: The FreeBSD Foundation
Differential revision: https://reviews.freebsd.org/D50845
---
sys/vm/vm_mmap.c | 50 +++++++++++++++++++++++++-------------------------
1 file changed, 25 insertions(+), 25 deletions(-)
diff --git a/sys/vm/vm_mmap.c b/sys/vm/vm_mmap.c
index 9ba2ec426d7f..46fd212df299 100644
--- a/sys/vm/vm_mmap.c
+++ b/sys/vm/vm_mmap.c
@@ -192,12 +192,12 @@ kern_mmap(struct thread *td, const struct mmap_req *mrp)
check_fp_fn = mrp->mr_check_fp_fn;
if ((prot & ~(_PROT_ALL | PROT_MAX(_PROT_ALL))) != 0) {
- return (SET_ERROR0(EINVAL, "unknown PROT bits"));
+ return (EXTERROR(EINVAL, "unknown PROT bits"));
}
max_prot = PROT_MAX_EXTRACT(prot);
prot = PROT_EXTRACT(prot);
if (max_prot != 0 && (max_prot & prot) != prot) {
- return (SET_ERROR0(ENOTSUP, "prot is not subset of max_prot"));
+ return (EXTERROR(ENOTSUP, "prot is not subset of max_prot"));
}
p = td->td_proc;
@@ -230,7 +230,7 @@ kern_mmap(struct thread *td, const struct mmap_req *mrp)
if (!SV_CURPROC_FLAG(SV_AOUT)) {
if ((len == 0 && p->p_osrel >= P_OSREL_MAP_ANON) ||
((flags & MAP_ANON) != 0 && (fd != -1 || pos != 0))) {
- return (SET_ERROR2(EINVAL,
+ return (EXTERROR(EINVAL,
"offset not zero/fd not -1 for MAP_ANON",
fd, pos));
}
@@ -242,7 +242,7 @@ kern_mmap(struct thread *td, const struct mmap_req *mrp)
if (flags & MAP_STACK) {
if ((fd != -1) || ((prot & (PROT_READ | PROT_WRITE)) !=
(PROT_READ | PROT_WRITE))) {
- return (SET_ERROR1(EINVAL, "MAP_STACK with prot < rw",
+ return (EXTERROR(EINVAL, "MAP_STACK with prot < rw",
prot));
}
flags |= MAP_ANON;
@@ -252,23 +252,23 @@ kern_mmap(struct thread *td, const struct mmap_req *mrp)
MAP_STACK | MAP_NOSYNC | MAP_ANON | MAP_EXCL | MAP_NOCORE |
MAP_PREFAULT_READ | MAP_GUARD | MAP_32BIT |
MAP_ALIGNMENT_MASK)) != 0) {
- return (SET_ERROR0(EINVAL, "reserved flag set"));
+ return (EXTERROR(EINVAL, "reserved flag set"));
}
if ((flags & (MAP_EXCL | MAP_FIXED)) == MAP_EXCL) {
- return (SET_ERROR0(EINVAL, "EXCL without FIXED"));
+ return (EXTERROR(EINVAL, "EXCL without FIXED"));
}
if ((flags & (MAP_SHARED | MAP_PRIVATE)) == (MAP_SHARED |
MAP_PRIVATE)) {
- return (SET_ERROR0(EINVAL, "both SHARED and PRIVATE set"));
+ return (EXTERROR(EINVAL, "both SHARED and PRIVATE set"));
}
if (prot != PROT_NONE &&
(prot & ~(PROT_READ | PROT_WRITE | PROT_EXEC)) != 0) {
- return (SET_ERROR1(EINVAL, "invalid prot", prot));
+ return (EXTERROR(EINVAL, "invalid prot", prot));
}
if ((flags & MAP_GUARD) != 0 && (prot != PROT_NONE || fd != -1 ||
pos != 0 || (flags & ~(MAP_FIXED | MAP_GUARD | MAP_EXCL |
MAP_32BIT | MAP_ALIGNMENT_MASK)) != 0)) {
- return (SET_ERROR0(EINVAL, "GUARD with wrong parameters"));
+ return (EXTERROR(EINVAL, "GUARD with wrong parameters"));
}
/*
@@ -290,7 +290,7 @@ kern_mmap(struct thread *td, const struct mmap_req *mrp)
if (align != 0 && align != MAP_ALIGNED_SUPER &&
(align >> MAP_ALIGNMENT_SHIFT >= sizeof(void *) * NBBY ||
align >> MAP_ALIGNMENT_SHIFT < PAGE_SHIFT)) {
- return (SET_ERROR1(EINVAL, "bad alignment", align));
+ return (EXTERROR(EINVAL, "bad alignment", align));
}
/*
@@ -305,17 +305,17 @@ kern_mmap(struct thread *td, const struct mmap_req *mrp)
*/
addr -= pageoff;
if ((addr & PAGE_MASK) != 0) {
- return (SET_ERROR1(EINVAL, "fixed mapping not aligned",
+ return (EXTERROR(EINVAL, "fixed mapping not aligned",
addr));
}
/* Address range must be all in user VM space. */
if (!vm_map_range_valid(&vms->vm_map, addr, addr + size)) {
- SET_ERROR0(EINVAL, "mapping outside vm_map");
+ EXTERROR(EINVAL, "mapping outside vm_map");
return (EINVAL);
}
if (flags & MAP_32BIT && addr + size > MAP_32BIT_MAX_ADDR) {
- return (SET_ERROR0(EINVAL,
+ return (EXTERROR(EINVAL,
"fixed 32bit mapping does not fit into 4G"));
}
} else if (flags & MAP_32BIT) {
@@ -384,7 +384,7 @@ kern_mmap(struct thread *td, const struct mmap_req *mrp)
goto done;
if ((flags & (MAP_SHARED | MAP_PRIVATE)) == 0 &&
p->p_osrel >= P_OSREL_MAP_FSTRICT) {
- SET_ERROR0(EINVAL, "neither SHARED nor PRIVATE req");
+ EXTERROR(EINVAL, "neither SHARED nor PRIVATE req");
error = EINVAL;
goto done;
}
@@ -1314,7 +1314,7 @@ vm_mmap_vnode(struct thread *td, vm_size_t objsize,
vm_pager_update_writecount(obj, 0, objsize);
}
} else {
- error = SET_ERROR0(EINVAL, "non-reg file");
+ error = EXTERROR(EINVAL, "non-reg file");
goto done;
}
if ((error = VOP_GETATTR(vp, &va, cred)))
@@ -1405,7 +1405,7 @@ vm_mmap_cdev(struct thread *td, vm_size_t objsize, vm_prot_t prot,
(prot & VM_PROT_WRITE) != 0)
return (EACCES);
if ((flags & (MAP_PRIVATE | MAP_COPY)) != 0) {
- return (SET_ERROR0(EINVAL, "cdev mapping must be shared"));
+ return (EXTERROR(EINVAL, "cdev mapping must be shared"));
}
/*
@@ -1432,7 +1432,7 @@ vm_mmap_cdev(struct thread *td, vm_size_t objsize, vm_prot_t prot,
obj = vm_pager_allocate(OBJT_DEVICE, cdev, objsize, prot, *foff,
td->td_ucred);
if (obj == NULL) {
- return (SET_ERROR0(EINVAL,
+ return (EXTERROR(EINVAL,
"cdev driver does not support mmap"));
}
*objp = obj;
@@ -1452,7 +1452,7 @@ vm_mmap(vm_map_t map, vm_offset_t *addr, vm_size_t size, vm_prot_t prot,
boolean_t writecounted;
if (size == 0) {
- return (SET_ERROR0(EINVAL, "zero-sized req"));
+ return (EXTERROR(EINVAL, "zero-sized req"));
}
size = round_page(size);
@@ -1479,7 +1479,7 @@ vm_mmap(vm_map_t map, vm_offset_t *addr, vm_size_t size, vm_prot_t prot,
handle, &foff, &object, &writecounted);
break;
default:
- error = SET_ERROR1(EINVAL, "unsupported backing obj type",
+ error = EXTERROR(EINVAL, "unsupported backing obj type",
handle_type);
break;
}
@@ -1562,7 +1562,7 @@ vm_mmap_object(vm_map_t map, vm_offset_t *addr, vm_size_t size, vm_prot_t prot,
* exec).
*/
if ((foff & PAGE_MASK) != 0) {
- return (SET_ERROR1(EINVAL, "offset not page-aligned", foff));
+ return (EXTERROR(EINVAL, "offset not page-aligned", foff));
}
if ((flags & MAP_FIXED) == 0) {
@@ -1570,7 +1570,7 @@ vm_mmap_object(vm_map_t map, vm_offset_t *addr, vm_size_t size, vm_prot_t prot,
*addr = round_page(*addr);
} else {
if (*addr != trunc_page(*addr)) {
- return (SET_ERROR1(EINVAL,
+ return (EXTERROR(EINVAL,
"non-fixed mapping address not aligned", *addr));
}
fitit = false;
@@ -1578,11 +1578,11 @@ vm_mmap_object(vm_map_t map, vm_offset_t *addr, vm_size_t size, vm_prot_t prot,
if (flags & MAP_ANON) {
if (object != NULL) {
- return (SET_ERROR0(EINVAL,
+ return (EXTERROR(EINVAL,
"anon mapping backed by an object"));
}
if (foff != 0) {
- return (SET_ERROR0(EINVAL,
+ return (EXTERROR(EINVAL,
"anon mapping with non-zero offset"));
}
docow = 0;
@@ -1604,7 +1604,7 @@ vm_mmap_object(vm_map_t map, vm_offset_t *addr, vm_size_t size, vm_prot_t prot,
docow |= MAP_WRITECOUNT;
if (flags & MAP_STACK) {
if (object != NULL) {
- return (SET_ERROR0(EINVAL,
+ return (EXTERROR(EINVAL,
"stack mapping backed by an object"));
}
docow |= MAP_STACK_AREA;
@@ -1686,6 +1686,6 @@ vm_mmap_to_errno(int rv)
}
if ((curthread->td_pflags2 & (TDP2_UEXTERR | TDP2_EXTERR)) ==
TDP2_UEXTERR)
- SET_ERROR1(error, "mach error", rv);
+ EXTERROR(error, "mach error", rv);
return (error);
}