Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1649655pxk; Fri, 2 Oct 2020 15:31:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw/GjG2J4CuI9zcQOU2D6KqLK0FTRn0PHVFtal4Sx/Z4MLNUkBfEO5/Y1D5lVvlGZNkXDFf X-Received: by 2002:a05:6402:202a:: with SMTP id ay10mr5109672edb.36.1601677912943; Fri, 02 Oct 2020 15:31:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601677912; cv=none; d=google.com; s=arc-20160816; b=V1cCZ4YOGhNRMIygyBPRNI49sIpfmMPjYTQscEGJvQfyojTq4qnlmnynVwON3cBXih IqFVsF8XhtxwWLJCfvILRvneo0hMs0MnSTuy5eVWTFAQFQBOHbNiBwGcTXNKaD2mEf6n GPH/QN1sgQ8WIn7PWeVe2de+WiXRQTX8OJgr/iZslE9XZhdV0sxii1sFMxx5Id70DPs9 +VbNrs9sS5yLTtmN697VdMkr336e6XZy2LwEgoHnDB5INk4+m32JEXQ+kMnX+49iwgsA i6kX1sRnNAEccF/1PDL7wLNX/81wgaE3M1ZoOUfxyBtLpJUNjIi6G8kUHbCL4PwYtUwV OlLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=gvSN5WMat9GN0GCWXdmQOMDN2JAZxikuvNZzRUSDHLQ=; b=qdxYPncUZoiF3gnAWEw/aoa+2l84iBXZrKUBKqwt1UI53LEV/Ln87mRNro4ZvlHSZe lSy306b/+n3ce6jNI8ghUR4Z6mt5+VOTt2NdmNSarp6gGWhAwpwRXUdIqE86xxLzq6CM ngAOYFoR+JOYInTTnw2zVoilBG8h5fbGPYGZGLbefBnSHU9PEMDUFsPzVh8n8BMYvGbJ T18i8ec9hhDZEjNzHcb1Xwjn91RVJKMHbaK1AgcD2Tkm3UAidRnBri1mFdxxiY3vk8G3 kq2UaZyz6ahYrzmV69Wn0eVgXGsQKIP2+JBBWmsXWDlzJG1WW3yel6Gq121r4BqqSCHo XbWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t17si2086068ejs.679.2020.10.02.15.31.30; Fri, 02 Oct 2020 15:31:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725786AbgJBW2c (ORCPT + 99 others); Fri, 2 Oct 2020 18:28:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44306 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725283AbgJBW2c (ORCPT ); Fri, 2 Oct 2020 18:28:32 -0400 Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2620:137:e000::1:9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0A718C0613D0; Fri, 2 Oct 2020 15:28:32 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:601:9f00:477::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 75BFB11E4824E; Fri, 2 Oct 2020 15:11:42 -0700 (PDT) Date: Fri, 02 Oct 2020 15:28:29 -0700 (PDT) Message-Id: <20201002.152829.1002796270145913943.davem@davemloft.net> To: colyli@suse.de Cc: linux-block@vger.kernel.org, linux-nvme@lists.infradead.org, netdev@vger.kernel.org, open-iscsi@googlegroups.com, linux-scsi@vger.kernel.org, ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org, chaitanya.kulkarni@wdc.com, cleech@redhat.com, hch@lst.de, amwang@redhat.com, eric.dumazet@gmail.com, hare@suse.de, idryomov@gmail.com, jack@suse.com, jlayton@kernel.org, axboe@kernel.dk, lduncan@suse.com, michaelc@cs.wisc.edu, mskorzhinskiy@solarflare.com, philipp.reisner@linbit.com, sagi@grimberg.me, vvs@virtuozzo.com, vbabka@suse.com Subject: Re: [PATCH v10 0/7] Introduce sendpage_ok() to detect misused sendpage in network related drivers From: David Miller In-Reply-To: <20201002082734.13925-1-colyli@suse.de> References: <20201002082734.13925-1-colyli@suse.de> X-Mailer: Mew version 6.8 on Emacs 27.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [2620:137:e000::1:9]); Fri, 02 Oct 2020 15:11:43 -0700 (PDT) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Coly Li Date: Fri, 2 Oct 2020 16:27:27 +0800 > As Sagi Grimberg suggested, the original fix is refind to a more common > inline routine: > static inline bool sendpage_ok(struct page *page) > { > return (!PageSlab(page) && page_count(page) >= 1); > } > If sendpage_ok() returns true, the checking page can be handled by the > concrete zero-copy sendpage method in network layer. Series applied. > The v10 series has 7 patches, fixes a WARN_ONCE() usage from v9 series, ... I still haven't heard from you how such a fundamental build failure was even possible. If the v9 patch series did not even compile, how in the world did you perform functional testing of these changes? Please explain this to me, instead of just quietly fixing it and posting an updated series. Thank you.