Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp251245ybg; Fri, 25 Oct 2019 20:42:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqzfsrnKAqQgEMTc4/JDfe8G4J8qdC0FpvPj9aT9DltN4esvq23ZmUrfSFZe2XGhzIuYlXRZ X-Received: by 2002:a17:906:c836:: with SMTP id dd22mr6691209ejb.178.1572061328725; Fri, 25 Oct 2019 20:42:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572061328; cv=none; d=google.com; s=arc-20160816; b=UZHw3YBggpAeRN2CRtU3YnEzJlMaL7TCJNetCaVUAdTm/Nymy/sqey4F3Ww/K7A8D+ vARLx9PDPp7uOTcTNShZ8Oo0Cy7Mw21K2camG+PvJ7qY1rtRa/lvYbJYOigGXFaWXAbm HE7fazdCElOF2jSSHsbWAyE6XhlgwiY/Qzk/daqGc0FSV2E6zFFkiK9bKDC40wR+sNOP ZjFj3bNOED/KiElBFZcXM33uaGp5P4kLjdBaAxom4a7kKBZYB7uhr2cOMhKEtSycYnXC mqz79MuAel5Xkvf8r9YBm1dSRe9GqLvh+P7Gm4EMK7PbFWz1/vf6rfeC+VSGC++zUf5N 3eDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=QKAUsu8Rk5LnbcISzIFxCS8PZCCL0OvgupAEOWTsqkY=; b=GSxk8mMcC6QJi+vVt+Z9B4ZFN/qQEoYKPtc9OqY1gvzDBIplRb5gwMk6aFHiV0PSr0 J7DjyPGHXoh/XYPbYsJkshOWYEeOguq5M4xJGpZ6n71MbNif8bLLbSnF60tfbNNyGjoZ lswg6uS9x6zH5Q8VLSCXkfEHwePj0g80LZWNFKOq/ETVI4t6dG44kWWC93DzePXwdTiY MRcGy6RAuAL0tVSRJq1e2Y81DRZRKMhDiXXqY2yZF4mv9FA1IhNtM63ZL14u2KaMVv7C Pc5dGxYbQYM68TRcNk9alRejYupeqgEom2pFWZ7ihCH2/uqtCtmQ0iqA+OzzGsot/J+j 6u+g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Jo8ATkdN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e23si2838413eda.248.2019.10.25.20.41.32; Fri, 25 Oct 2019 20:42:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Jo8ATkdN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726124AbfJZDkT (ORCPT + 99 others); Fri, 25 Oct 2019 23:40:19 -0400 Received: from mail-pg1-f196.google.com ([209.85.215.196]:34089 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726010AbfJZDkS (ORCPT ); Fri, 25 Oct 2019 23:40:18 -0400 Received: by mail-pg1-f196.google.com with SMTP id k20so2927340pgi.1; Fri, 25 Oct 2019 20:40:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=QKAUsu8Rk5LnbcISzIFxCS8PZCCL0OvgupAEOWTsqkY=; b=Jo8ATkdNe57lEiIERcoSakrJ381O1DYm36kft44vW0pTBz+WbylRD3SXDUL7v3n8KG O5CH+W5mHIxR7/pv4XUo9f3e8Fmf68E6Eb9C5o5jUfqmU9aD+mXBCZY/6i4VBFbvtzQ3 dNAj0nfnEgGI0iDsPG4+L4ofb1Ev/WAdtFTI5IhTnPxbfKpxs7EK41Tf/4i61QFr83sf /cjhLTZpx9BlZ2QR+yZPZDelZC5et5MhSeyoq0cDIQGuP9DMwXINGqx5iUXAmeYKZM5F WmGZe8sv0QgOMuoHV/D6rGQhxGdmHu5OppD5NI2R/SFb3c0sFxgkYDxNqOWZiZIdmlwY 4amA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=QKAUsu8Rk5LnbcISzIFxCS8PZCCL0OvgupAEOWTsqkY=; b=LSaLvrEHsB8fECbGb23pmvD1wrbcBHLrjiqOBG+LWB95BPRKIAQmYATwj3Gp7/UOwN 0yV6s+kA8jJ3pi8cP6h9c0NoIVzz6iLimpNcxjHtY5C4yyj3wZbfSj3sY/pYf2CFvtq6 Fi0YO/mwgwpXnaAANCOuArriPJG+2EH5zGSwmonmSst7GRJJEcYdMT+8N9+GcsqMplJ3 OCeiq4ULn5E4FJeFm34groC6CuExmqBWnc7hSfHcjwLaioiBrdhIiODSXM/ojXrjT7Cg 8eWVYeIg5i4AgZTMlHrYRlMvwkm8mJHfLA8A8P/sPu4bet6E4kv1bq2WqVYCWGa7wBTt Gu4g== X-Gm-Message-State: APjAAAUbh8w4ab72HSHjhyT/GSn9HEhAc77zx+vuAN4k6SE3AZruEw3e 5FkcVD1J1hYU4J3X2KoFtDk= X-Received: by 2002:a17:90a:8c06:: with SMTP id a6mr8267928pjo.135.1572061216112; Fri, 25 Oct 2019 20:40:16 -0700 (PDT) Received: from localhost.localdomain ([221.155.202.134]) by smtp.gmail.com with ESMTPSA id dw6sm3487547pjb.21.2019.10.25.20.40.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Oct 2019 20:40:15 -0700 (PDT) Date: Sat, 26 Oct 2019 12:40:10 +0900 From: Suwan Kim To: shuah Cc: Dan Carpenter , kbuild@lists.01.org, kbuild-all@lists.01.org, linux-kernel@vger.kernel.org, Greg Kroah-Hartman , linux-usb@vger.kernel.org Subject: Re: drivers/usb/usbip/stub_rx.c:505 stub_recv_cmd_submit() error: uninitialized symbol 'nents'. Message-ID: <20191026034010.GA6411@localhost.localdomain> References: <20191022092839.GD10833@kadam> <20191023071120.GA3061@localhost.localdomain> <20191024194500.GD23523@kadam> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 24, 2019 at 04:52:52PM -0600, shuah wrote: > On 10/24/19 1:45 PM, Dan Carpenter wrote: > > On Wed, Oct 23, 2019 at 04:11:20PM +0900, Suwan Kim wrote: > > > On Tue, Oct 22, 2019 at 12:28:39PM +0300, Dan Carpenter wrote: > > > > tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master > > > > head: 7d194c2100ad2a6dded545887d02754948ca5241 > > > > commit: ea44d190764b4422af4d1c29eaeb9e69e353b406 usbip: Implement SG support to vhci-hcd and stub driver > > > > date: 7 weeks ago > > > > > > > > If you fix the issue, kindly add following tag > > > > Reported-by: kbuild test robot > > > > Reported-by: Dan Carpenter > > > > > > > > New smatch warnings: > > > > drivers/usb/usbip/stub_rx.c:505 stub_recv_cmd_submit() error: uninitialized symbol 'nents'. > > > > > > > > Old smatch warnings: > > > > drivers/usb/usbip/stub_rx.c:450 stub_recv_xbuff() error: uninitialized symbol 'ret'. > > > > > > > > # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea44d190764b4422af4d1c29eaeb9e69e353b406 > > > > git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git > > > > git remote update linus > > > > git checkout ea44d190764b4422af4d1c29eaeb9e69e353b406 > > > > vim +/nents +505 drivers/usb/usbip/stub_rx.c > > > > > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 453 static void stub_recv_cmd_submit(struct stub_device *sdev, > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 454 struct usbip_header *pdu) > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 455 { > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 456 struct stub_priv *priv; > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 457 struct usbip_device *ud = &sdev->ud; > > > > 2d8f4595d1f275 drivers/staging/usbip/stub_rx.c Max Vozeler 2011-01-12 458 struct usb_device *udev = sdev->udev; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 459 struct scatterlist *sgl = NULL, *sg; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 460 void *buffer = NULL; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 461 unsigned long long buf_len; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 462 int nents; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 463 int num_urbs = 1; > > > > c6688ef9f29762 drivers/usb/usbip/stub_rx.c Shuah Khan 2017-12-07 464 int pipe = get_pipe(sdev, pdu); > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 465 int use_sg = pdu->u.cmd_submit.transfer_flags & URB_DMA_MAP_SG; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 466 int support_sg = 1; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 467 int np = 0; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 468 int ret, i; > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 469 > > > > 635f545a7e8be7 drivers/usb/usbip/stub_rx.c Shuah Khan 2017-12-07 470 if (pipe == -1) > > > > 635f545a7e8be7 drivers/usb/usbip/stub_rx.c Shuah Khan 2017-12-07 471 return; > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 472 > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 473 priv = stub_priv_alloc(sdev, pdu); > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 474 if (!priv) > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 475 return; > > > > 4d7b5c7f8ad49b drivers/staging/usbip/stub_rx.c Takahiro Hirofuchi 2008-07-09 476 > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 477 buf_len = (unsigned long long)pdu->u.cmd_submit.transfer_buffer_length; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 478 > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 479 /* allocate urb transfer buffer, if needed */ > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 480 if (buf_len) { > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 481 if (use_sg) { > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 482 sgl = sgl_alloc(buf_len, GFP_KERNEL, &nents); > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 483 if (!sgl) > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 484 goto err_malloc; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 485 } else { > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 486 buffer = kzalloc(buf_len, GFP_KERNEL); > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 487 if (!buffer) > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 488 goto err_malloc; > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 489 } > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 490 } > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 491 > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 492 /* Check if the server's HCD supports SG */ > > > > ea44d190764b44 drivers/usb/usbip/stub_rx.c Suwan Kim 2019-08-28 493 if (use_sg && !udev->bus->sg_tablesize) { > > > > > > > > Smatch thinks "use_sg" can be true when "buf_len" is zero. It's hard > > > > to tell if Smatch is right or wrong without more context... > > > > > > This is a bit strange. The meaning of "use_sg" is that client will > > > use scatter-gather and client's urb->num_sgs is not zero. And buffer > > > length should not be zero. > > > > > > usb_sg and buf_len are both client-dependent variables, so I think > > > if they have wrong value in the server side, the client must have > > > sent use_sg and buf_len with incorrect values. > > > > > > Did this error occur when compiling? > > > > Smatch is doing static analysis, yes. > > > > > If then, Did Smatch also consider vhci tx side? > > > > I'm not really sure... I can't reproduce the warning because on my > > system Smatch doesn't parse usbip_recv() correctly so it ends up > > silencing that warning. :/ > > > > Hi Suwan, > > This is a problem that needs fixing. nents > > /* allocate urb transfer buffer, if needed */ > if (buf_len) { > if (use_sg) { > sgl = sgl_alloc(buf_len, GFP_KERNEL, &nents); > > nents gets initialized here by sgl_alloc() > > if (!sgl) > goto err_malloc; > } else { > buffer = kzalloc(buf_len, GFP_KERNEL); > if (!buffer) > goto err_malloc; > } > } > > /* Check if the server's HCD supports SG */ > if (use_sg && !udev->bus->sg_tablesize) { > /* > * If the server's HCD doesn't support SG, break a single SG > * request into several URBs and map each SG list entry to > * corresponding URB buffer. The previously allocated SG > * list is stored in priv->sgl (If the server's HCD support > SG, > * SG list is stored only in urb->sg) and it is used as an > * indicator that the server split single SG request into > * several URBs. Later, priv->sgl is used by stub_complete() > and > * stub_send_ret_submit() to reassemble the divied URBs. > */ > support_sg = 0; > num_urbs = nents; > > I think nents will be valid here. Is there need for this additional > check here? You can fold this into the previous use_sg check, right > after the sg_alloc() success, I would think. Or Is it your intention to check as follows? I think this looks good. ... int nents = 0 ... /* allocate urb transfer buffer, if needed */ if (buf_len) { if (use_sg) { sgl = sgl_alloc(buf_len, GFP_KERNEL, &nents); if (!sgl) goto err_malloc; } else { buffer = kzalloc(buf_len, GFP_KERNEL); if (!buffer) goto err_malloc; } } /* Additional check here */ if (use_sg && !nents) { err_message; goto err_urbs; } /* Check if the server's HCD supports SG */ if (use_sg && !udev->bus->sg_tablesize) { Regards, Suwan Kim