Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp3661271ybl; Mon, 19 Aug 2019 23:52:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqz0UkdhuXPwhNxrMayk0+0bQenkKG9c90eJXf98M+Xb8N/UZVfAsRA1RVFpvstqhTRfD3hO X-Received: by 2002:a17:902:9349:: with SMTP id g9mr26337000plp.262.1566283922290; Mon, 19 Aug 2019 23:52:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566283922; cv=none; d=google.com; s=arc-20160816; b=dm7FUw2c77/CZo0sb9VuGNrTnynqlFsCiRr5Rjhtgf5/djtsd2JMGhLSnDuT/9mx/K H97k2nzZFsQCJMgUvYrtQEvQT6/r1uCJC7XnB6P6CeQmnitQsTL3tnxUiYVaQnmknRJ1 E3eD6V9dO7Xud0xoeB+dG67i/dzcMkt+7mg83rcqqqvjp7iFpbObN6QuGBAC0C2bHQlM mal1Wd8FOXm88PLITHjxfExOMLpCzEtBHUvXE3cnI2DTZRX1AciYn8/DbAOi9WZtqcp2 ZRIHIVoLZZMRcEjggFXnnK6D5MwH23RtB/Jzjq4619GwD0jBhFp3VyE7AIp9FftIAwr9 4Y7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=q2Ne9S0hyVHzRe6C9BaIEejVXBxI+aimn7Q68Wt2v04=; b=Q/OVFSFiDXSyzb1nEjwAa6gsOwwvypy1SU7EXu5Ckhj67pT4VxTkEarzORLbmWe+Y6 02387oPRF9nU3uYntQqwC3g7p1Qur9Oj52u8sqPAH/R8TK58Qpl5TkS3etUf+kRB/hkT hZri4nFuFDfigJOJhrFBCO/OhLOx3chHOTZJYUYUPDK547lAiNnk/HZTGeneXQcGFAKf IKlnftFI/6B7vJrJ4Dp6YE7r54mWrlIOv2emWXK6a1NA7sGYbzFiIgiayfSrrzRwVOEd oVoiBTLBf7hLLe1KZtOS8MyD7+rz49S+QMErZ4174h7NZZguh6VenHwgEKr7OOA85ogp nd+w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c14si5836713pjo.88.2019.08.19.23.51.47; Mon, 19 Aug 2019 23:52:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729267AbfHTGu4 (ORCPT + 99 others); Tue, 20 Aug 2019 02:50:56 -0400 Received: from szxga02-in.huawei.com ([45.249.212.188]:3970 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726049AbfHTGu4 (ORCPT ); Tue, 20 Aug 2019 02:50:56 -0400 Received: from DGGEMM402-HUB.china.huawei.com (unknown [172.30.72.56]) by Forcepoint Email with ESMTP id 4DB5C6FFAC624473D35E; Tue, 20 Aug 2019 14:50:52 +0800 (CST) Received: from dggeme762-chm.china.huawei.com (10.3.19.108) by DGGEMM402-HUB.china.huawei.com (10.3.20.210) with Microsoft SMTP Server (TLS) id 14.3.439.0; Tue, 20 Aug 2019 14:50:52 +0800 Received: from architecture4 (10.140.130.215) by dggeme762-chm.china.huawei.com (10.3.19.108) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Tue, 20 Aug 2019 14:50:51 +0800 Date: Tue, 20 Aug 2019 14:50:10 +0800 From: Gao Xiang To: Philip Li CC: Gao Xiang , kbuild test robot , , , , , LKML , , Fang Wei , Miao Xie Subject: Re: [PATCH] staging: erofs: fix an error handling in erofs_readdir() Message-ID: <20190820065010.GG159846@architecture4> References: <20190818031855.9723-1-hsiangkao@aol.com> <201908182116.RRufKUpl%lkp@intel.com> <20190818132503.GA26232@hsiangkao-HP-ZHAN-66-Pro-G1> <20190820065038.GG4479@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20190820065038.GG4479@intel.com> User-Agent: Mutt/1.9.4 (2018-02-28) X-Originating-IP: [10.140.130.215] X-ClientProxiedBy: dggeme703-chm.china.huawei.com (10.1.199.99) To dggeme762-chm.china.huawei.com (10.3.19.108) X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Philip, On Tue, Aug 20, 2019 at 02:50:38PM +0800, Philip Li wrote: > On Sun, Aug 18, 2019 at 09:25:04PM +0800, Gao Xiang wrote: > > On Sun, Aug 18, 2019 at 09:17:52PM +0800, kbuild test robot wrote: > > > Hi Gao, > > > > > > I love your patch! Yet something to improve: > > > > > > [auto build test ERROR on linus/master] > > > [cannot apply to v5.3-rc4 next-20190816] > > > [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] > > > > ... those patches should be applied to staging tree > > since linux-next has not been updated yet... > thanks for the feedback, we will consider this to our todo list. Yes, many confusing reports anyway... (Just my personal suggestion, maybe we can add some hints on the patch email to indicate which tree can be applied successfully for ci in the future...) Thanks, Gao Xiang > > > > > Thanks, > > Gao Xiang > > > > > > > > url: https://github.com/0day-ci/linux/commits/Gao-Xiang/staging-erofs-fix-an-error-handling-in-erofs_readdir/20190818-191344 > > > config: arm64-allyesconfig (attached as .config) > > > compiler: aarch64-linux-gcc (GCC) 7.4.0 > > > reproduce: > > > wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross > > > chmod +x ~/bin/make.cross > > > # save the attached .config to linux build tree > > > GCC_VERSION=7.4.0 make.cross ARCH=arm64 > > > > > > If you fix the issue, kindly add following tag > > > Reported-by: kbuild test robot > > > > > > All errors (new ones prefixed by >>): > > > > > > drivers/staging/erofs/dir.c: In function 'erofs_readdir': > > > >> drivers/staging/erofs/dir.c:110:11: error: 'EFSCORRUPTED' undeclared (first use in this function); did you mean 'FS_NRSUPER'? > > > err = -EFSCORRUPTED; > > > ^~~~~~~~~~~~ > > > FS_NRSUPER > > > drivers/staging/erofs/dir.c:110:11: note: each undeclared identifier is reported only once for each function it appears in > > > > > > vim +110 drivers/staging/erofs/dir.c > > > > > > 85 > > > 86 static int erofs_readdir(struct file *f, struct dir_context *ctx) > > > 87 { > > > 88 struct inode *dir = file_inode(f); > > > 89 struct address_space *mapping = dir->i_mapping; > > > 90 const size_t dirsize = i_size_read(dir); > > > 91 unsigned int i = ctx->pos / EROFS_BLKSIZ; > > > 92 unsigned int ofs = ctx->pos % EROFS_BLKSIZ; > > > 93 int err = 0; > > > 94 bool initial = true; > > > 95 > > > 96 while (ctx->pos < dirsize) { > > > 97 struct page *dentry_page; > > > 98 struct erofs_dirent *de; > > > 99 unsigned int nameoff, maxsize; > > > 100 > > > 101 dentry_page = read_mapping_page(mapping, i, NULL); > > > 102 if (dentry_page == ERR_PTR(-ENOMEM)) { > > > 103 errln("no memory to readdir of logical block %u of nid %llu", > > > 104 i, EROFS_V(dir)->nid); > > > 105 err = -ENOMEM; > > > 106 break; > > > 107 } else if (IS_ERR(dentry_page)) { > > > 108 errln("fail to readdir of logical block %u of nid %llu", > > > 109 i, EROFS_V(dir)->nid); > > > > 110 err = -EFSCORRUPTED; > > > 111 break; > > > 112 } > > > 113 > > > 114 de = (struct erofs_dirent *)kmap(dentry_page); > > > 115 > > > 116 nameoff = le16_to_cpu(de->nameoff); > > > 117 > > > 118 if (unlikely(nameoff < sizeof(struct erofs_dirent) || > > > 119 nameoff >= PAGE_SIZE)) { > > > 120 errln("%s, invalid de[0].nameoff %u", > > > 121 __func__, nameoff); > > > 122 > > > 123 err = -EIO; > > > 124 goto skip_this; > > > 125 } > > > 126 > > > 127 maxsize = min_t(unsigned int, > > > 128 dirsize - ctx->pos + ofs, PAGE_SIZE); > > > 129 > > > 130 /* search dirents at the arbitrary position */ > > > 131 if (unlikely(initial)) { > > > 132 initial = false; > > > 133 > > > 134 ofs = roundup(ofs, sizeof(struct erofs_dirent)); > > > 135 if (unlikely(ofs >= nameoff)) > > > 136 goto skip_this; > > > 137 } > > > 138 > > > 139 err = erofs_fill_dentries(ctx, de, &ofs, nameoff, maxsize); > > > 140 skip_this: > > > 141 kunmap(dentry_page); > > > 142 > > > 143 put_page(dentry_page); > > > 144 > > > 145 ctx->pos = blknr_to_addr(i) + ofs; > > > 146 > > > 147 if (unlikely(err)) > > > 148 break; > > > 149 ++i; > > > 150 ofs = 0; > > > 151 } > > > 152 return err < 0 ? err : 0; > > > 153 } > > > 154 > > > > > > --- > > > 0-DAY kernel test infrastructure Open Source Technology Center > > > https://lists.01.org/pipermail/kbuild-all Intel Corporation > > > >