All of lore.kernel.org
 help / color / mirror / Atom feed
From: kernel test robot <lkp@intel.com>
To: kbuild@lists.01.org
Subject: Re: [RFC PATCH] ubd: add io_uring based userspace block driver
Date: Tue, 10 May 2022 12:09:36 +0800	[thread overview]
Message-ID: <202205101111.faCcEO63-lkp@intel.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 23504 bytes --]

CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220509092312.254354-1-ming.lei@redhat.com>
References: <20220509092312.254354-1-ming.lei@redhat.com>
TO: Ming Lei <ming.lei@redhat.com>

Hi Ming,

[FYI, it's a private test report for your RFC patch.]
[auto build test WARNING on axboe-block/for-next]
[also build test WARNING on next-20220509]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]

url:    https://github.com/intel-lab-lkp/linux/commits/Ming-Lei/ubd-add-io_uring-based-userspace-block-driver/20220509-173452
base:   https://git.kernel.org/pub/scm/linux/kernel/git/axboe/linux-block.git for-next
:::::: branch date: 18 hours ago
:::::: commit date: 18 hours ago
config: x86_64-randconfig-c007-20220509 (https://download.01.org/0day-ci/archive/20220510/202205101111.faCcEO63-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project a385645b470e2d3a1534aae618ea56b31177639f)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://github.com/intel-lab-lkp/linux/commit/898085c9876d078827ba8b3447e5d1ae4626d092
        git remote add linux-review https://github.com/intel-lab-lkp/linux
        git fetch --no-tags linux-review Ming-Lei/ubd-add-io_uring-based-userspace-block-driver/20220509-173452
        git checkout 898085c9876d078827ba8b3447e5d1ae4626d092
        # save the config file
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=x86_64 clang-analyzer 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>


clang-analyzer warnings: (new ones prefixed by >>)
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/usb/isp1760/isp1760-hcd.c:2159:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&desc->u.hs.DeviceRemovable[temp], 0xff, temp);
           ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/usb/isp1760/isp1760-hcd.c:2286:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(buf, 0, 4);
                   ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/usb/isp1760/isp1760-hcd.c:2286:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(buf, 0, 4);
                   ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   Suppressed 33 warnings (33 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   48 warnings generated.
   drivers/block/ubd_drv.c:192:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(*bv_addr + bv->bv_offset, pg_addr + *pg_off, len);
                   ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   drivers/block/ubd_drv.c:192:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(*bv_addr + bv->bv_offset, pg_addr + *pg_off, len);
                   ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   drivers/block/ubd_drv.c:194:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(pg_addr + *pg_off, *bv_addr + bv->bv_offset, len);
                   ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   drivers/block/ubd_drv.c:194:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(pg_addr + *pg_off, *bv_addr + bv->bv_offset, len);
                   ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
>> drivers/block/ubd_drv.c:256:4: warning: Value stored to 'off' is never read [clang-analyzer-deadcode.DeadStores]
                           off = 0;
                           ^     ~
   drivers/block/ubd_drv.c:256:4: note: Value stored to 'off' is never read
                           off = 0;
                           ^     ~
>> drivers/block/ubd_drv.c:680:12: warning: Access to field 'flags' results in a dereference of an undefined pointer value (loaded from variable 'io') [clang-analyzer-core.NullDereference]
           io->flags &= ~UBD_IO_FLAG_ACTIVE;
           ~~        ^
   drivers/block/ubd_drv.c:600:2: note: 'io' declared without an initial value
           struct ubd_io *io;
           ^~~~~~~~~~~~~~~~~
   drivers/block/ubd_drv.c:605:2: note: Taking false branch
           pr_devel("%s: receieved: cmd op %d, tag %d, queue %d\n",
           ^
   include/linux/printk.h:548:2: note: expanded from macro 'pr_devel'
           no_printk(KERN_DEBUG pr_fmt(fmt), ##__VA_ARGS__)
           ^
   include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
           if (0)                                          \
           ^
   drivers/block/ubd_drv.c:608:6: note: Assuming the condition is true
           if (!(issue_flags & IO_URING_F_SQE128))
               ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/block/ubd_drv.c:608:2: note: Taking true branch
           if (!(issue_flags & IO_URING_F_SQE128))
           ^
   drivers/block/ubd_drv.c:609:3: note: Control jumps to line 680
                   goto out;
                   ^
   drivers/block/ubd_drv.c:680:12: note: Access to field 'flags' results in a dereference of an undefined pointer value (loaded from variable 'io')
           io->flags &= ~UBD_IO_FLAG_ACTIVE;
           ~~        ^
   drivers/block/ubd_drv.c:854:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           sprintf(disk->disk_name, "ubdb%d", ub->ub_number);
           ^~~~~~~
   drivers/block/ubd_drv.c:854:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           sprintf(disk->disk_name, "ubdb%d", ub->ub_number);
           ^~~~~~~
   drivers/block/ubd_drv.c:1104:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(&ub->dev_info, info, sizeof(*info));
                           ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   drivers/block/ubd_drv.c:1104:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(&ub->dev_info, info, sizeof(*info));
                           ^
   include/linux/fortify-string.h:369:26: note: expanded from macro 'memcpy'
   #define memcpy(p, q, s)  __fortify_memcpy_chk(p, q, s,                  \
                            ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:362:2: note: expanded from macro '__fortify_memcpy_chk'
           __underlying_##op(p, q, __fortify_size);                        \
           ^~~~~~~~~~~~~~~~~
   note: expanded from here
   include/linux/fortify-string.h:45:29: note: expanded from macro '__underlying_memcpy'
   #define __underlying_memcpy     __builtin_memcpy
                                   ^~~~~~~~~~~~~~~~
   Suppressed 42 warnings (39 in non-user code, 3 with check filters).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   31 warnings generated.
   drivers/char/lp.c:923:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&ppdev_cb, 0, sizeof(ppdev_cb));
           ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/char/lp.c:923:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&ppdev_cb, 0, sizeof(ppdev_cb));
           ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro '__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro '__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   Suppressed 30 warnings (30 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   35 warnings generated.
   arch/x86/include/asm/paravirt.h:693:9: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
           return PVOP_ALT_CALLEE0(unsigned long, irq.save_fl, "pushf; pop %%rax;",
                  ^
   arch/x86/include/asm/paravirt_types.h:522:2: note: expanded from macro 'PVOP_ALT_CALLEE0'
           __PVOP_ALT_CALLEESAVE(rettype, op, alt, cond)
           ^
   arch/x86/include/asm/paravirt_types.h:486:2: note: expanded from macro '__PVOP_ALT_CALLEESAVE'
           ____PVOP_ALT_CALL(PVOP_RETVAL(rettype), op.func, alt, cond,     \
           ^
   arch/x86/include/asm/paravirt_types.h:460:3: note: expanded from macro '____PVOP_ALT_CALL'
                   PVOP_CALL_ARGS;                                         \
                   ^

vim +/off +256 drivers/block/ubd_drv.c

898085c9876d07 Ming Lei 2022-05-09  208  
898085c9876d07 Ming Lei 2022-05-09  209  /* copy rq pages to ubdsrv vm address pointed by io->addr */
898085c9876d07 Ming Lei 2022-05-09  210  static int ubd_copy_pages(struct ubd_device *ub, struct request *rq)
898085c9876d07 Ming Lei 2022-05-09  211  {
898085c9876d07 Ming Lei 2022-05-09  212  	struct ubd_queue *ubq = rq->mq_hctx->driver_data;
898085c9876d07 Ming Lei 2022-05-09  213  	struct ubd_io *io = &ubq->ios[rq->tag];
898085c9876d07 Ming Lei 2022-05-09  214  	struct page *pgs[UBD_MAX_PIN_PAGES];
898085c9876d07 Ming Lei 2022-05-09  215  	const bool to_rq = !op_is_write(rq->cmd_flags);
898085c9876d07 Ming Lei 2022-05-09  216  	struct req_iterator req_iter;
898085c9876d07 Ming Lei 2022-05-09  217  	struct bio_vec bv;
898085c9876d07 Ming Lei 2022-05-09  218  	unsigned long start = io->addr, left = rq->__data_len;
898085c9876d07 Ming Lei 2022-05-09  219  	unsigned int idx = 0, pg_len = 0, pg_off = 0;
898085c9876d07 Ming Lei 2022-05-09  220  	int nr_pin = 0;
898085c9876d07 Ming Lei 2022-05-09  221  	void *pg_addr = NULL;
898085c9876d07 Ming Lei 2022-05-09  222  	struct page *curr = NULL;
898085c9876d07 Ming Lei 2022-05-09  223  
898085c9876d07 Ming Lei 2022-05-09  224  	rq_for_each_segment(bv, rq, req_iter) {
898085c9876d07 Ming Lei 2022-05-09  225  		unsigned len, bv_off = bv.bv_offset, bv_len = bv.bv_len;
898085c9876d07 Ming Lei 2022-05-09  226  		void *bv_addr = NULL;
898085c9876d07 Ming Lei 2022-05-09  227  
898085c9876d07 Ming Lei 2022-05-09  228  refill:
898085c9876d07 Ming Lei 2022-05-09  229  		if (pg_len == 0) {
898085c9876d07 Ming Lei 2022-05-09  230  			unsigned int off = 0;
898085c9876d07 Ming Lei 2022-05-09  231  
898085c9876d07 Ming Lei 2022-05-09  232  			if (pg_addr) {
898085c9876d07 Ming Lei 2022-05-09  233  				kunmap_local(pg_addr);
898085c9876d07 Ming Lei 2022-05-09  234  				if (!to_rq)
898085c9876d07 Ming Lei 2022-05-09  235  					set_page_dirty_lock(curr);
898085c9876d07 Ming Lei 2022-05-09  236  				pg_addr = NULL;
898085c9876d07 Ming Lei 2022-05-09  237  			}
898085c9876d07 Ming Lei 2022-05-09  238  
898085c9876d07 Ming Lei 2022-05-09  239  			/* refill pages */
898085c9876d07 Ming Lei 2022-05-09  240  			if (idx >= nr_pin) {
898085c9876d07 Ming Lei 2022-05-09  241  				unsigned int max_pages;
898085c9876d07 Ming Lei 2022-05-09  242  
898085c9876d07 Ming Lei 2022-05-09  243  				ubd_release_pages(ub, pgs, nr_pin);
898085c9876d07 Ming Lei 2022-05-09  244  
898085c9876d07 Ming Lei 2022-05-09  245  				off = start & (PAGE_SIZE - 1);
898085c9876d07 Ming Lei 2022-05-09  246  				max_pages = round_up(off + left, PAGE_SIZE);
898085c9876d07 Ming Lei 2022-05-09  247  				nr_pin = min_t(unsigned, UBD_MAX_PIN_PAGES, max_pages);
898085c9876d07 Ming Lei 2022-05-09  248  				nr_pin = ubd_pin_user_pages(ub, start, pgs,
898085c9876d07 Ming Lei 2022-05-09  249  						nr_pin, to_rq);
898085c9876d07 Ming Lei 2022-05-09  250  				if (nr_pin <= 0)
898085c9876d07 Ming Lei 2022-05-09  251  					return -EINVAL;
898085c9876d07 Ming Lei 2022-05-09  252  				idx = 0;
898085c9876d07 Ming Lei 2022-05-09  253  			}
898085c9876d07 Ming Lei 2022-05-09  254  			pg_off = off;
898085c9876d07 Ming Lei 2022-05-09  255  			pg_len = min(PAGE_SIZE - off, left);
898085c9876d07 Ming Lei 2022-05-09 @256  			off = 0;
898085c9876d07 Ming Lei 2022-05-09  257  			curr = pgs[idx++];
898085c9876d07 Ming Lei 2022-05-09  258  			pg_addr = kmap_local_page(curr);
898085c9876d07 Ming Lei 2022-05-09  259  		}
898085c9876d07 Ming Lei 2022-05-09  260  
898085c9876d07 Ming Lei 2022-05-09  261  		len = ubd_copy_bv(&bv, &bv_addr, pg_addr, &pg_off, &pg_len,
898085c9876d07 Ming Lei 2022-05-09  262  				to_rq);
898085c9876d07 Ming Lei 2022-05-09  263  		/* either one of the two has been consumed */
898085c9876d07 Ming Lei 2022-05-09  264  		WARN_ON_ONCE(bv.bv_len && pg_len);
898085c9876d07 Ming Lei 2022-05-09  265  		start += len;
898085c9876d07 Ming Lei 2022-05-09  266  		left -= len;
898085c9876d07 Ming Lei 2022-05-09  267  
898085c9876d07 Ming Lei 2022-05-09  268  		/* overflow */
898085c9876d07 Ming Lei 2022-05-09  269  		WARN_ON_ONCE(left > rq->__data_len);
898085c9876d07 Ming Lei 2022-05-09  270  		WARN_ON_ONCE(bv.bv_len > bv_len);
898085c9876d07 Ming Lei 2022-05-09  271  		if (bv.bv_len)
898085c9876d07 Ming Lei 2022-05-09  272  			goto refill;
898085c9876d07 Ming Lei 2022-05-09  273  
898085c9876d07 Ming Lei 2022-05-09  274  		bv.bv_len = bv_len;
898085c9876d07 Ming Lei 2022-05-09  275  		bv.bv_offset = bv_off;
898085c9876d07 Ming Lei 2022-05-09  276  	}
898085c9876d07 Ming Lei 2022-05-09  277  	if (pg_addr) {
898085c9876d07 Ming Lei 2022-05-09  278  		kunmap_local(pg_addr);
898085c9876d07 Ming Lei 2022-05-09  279  		if (!to_rq)
898085c9876d07 Ming Lei 2022-05-09  280  			set_page_dirty_lock(curr);
898085c9876d07 Ming Lei 2022-05-09  281  	}
898085c9876d07 Ming Lei 2022-05-09  282  	ubd_release_pages(ub, pgs, nr_pin);
898085c9876d07 Ming Lei 2022-05-09  283  
898085c9876d07 Ming Lei 2022-05-09  284  	WARN_ON_ONCE(left != 0);
898085c9876d07 Ming Lei 2022-05-09  285  
898085c9876d07 Ming Lei 2022-05-09  286  	return 0;
898085c9876d07 Ming Lei 2022-05-09  287  }
898085c9876d07 Ming Lei 2022-05-09  288  

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

             reply	other threads:[~2022-05-10  4:09 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-05-10  4:09 kernel test robot [this message]
  -- strict thread matches above, loose matches on Subject: below --
2022-05-09  9:23 [RFC PATCH] ubd: add io_uring based userspace block driver Ming Lei
2022-05-09 15:10 ` Gabriel Krisman Bertazi
2022-05-10  1:57   ` Ming Lei
2022-05-10  4:22   ` Ziyang Zhang
2022-05-09 16:00 ` Randy Dunlap
2022-05-09 18:11   ` Gabriel Krisman Bertazi
2022-05-09 18:13     ` Jens Axboe
2022-05-09 16:09 ` Jens Axboe
2022-05-10  2:58   ` Ming Lei
2022-05-10  3:29     ` Jens Axboe
2022-05-10  7:38       ` Ming Lei
2022-05-09 18:14 ` Martin Raiber
2022-05-10 12:00 ` kernel test robot
2022-05-16 19:29 ` Stefan Hajnoczi
2022-05-17  1:57   ` Ming Lei
2022-05-17  6:17     ` Stefan Hajnoczi
2022-05-30  7:07 ` Pavel Machek
2022-06-02  3:19   ` Ming Lei
2022-06-06  2:15     ` Gao Xiang

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=202205101111.faCcEO63-lkp@intel.com \
    --to=lkp@intel.com \
    --cc=kbuild@lists.01.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.