Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp385783ybx; Wed, 6 Nov 2019 02:12:48 -0800 (PST) X-Google-Smtp-Source: APXvYqx+qe+p9KcQyRL8lgKh33A5wxSOrlSTOlpVPR3Lar6TyLmNYGBhrhb3v36hq870BbyvgCSt X-Received: by 2002:a50:b6cb:: with SMTP id f11mr1647828ede.299.1573035168205; Wed, 06 Nov 2019 02:12:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573035168; cv=none; d=google.com; s=arc-20160816; b=GkkVkKSWXXNyOlywOhnDyTTawhjG1AWQ5JdipM1IcqKVXgRsy+7PfEw0HhyHGtG/BM 5SoXuZ2pOkYWNUxPzvQa5te6CVIqQ0sdoj1qK5m/szOagQzNC5ZiWhAhmtKOjH7onj+R rxg5wP+OwCEvmqliCsVSoAkmU4Ppgxykt+j+WvYxYBWNC0ko5/HqUvntiMK925iGux0I MR7ls8lVrQPOxMcgPuVbcwR35rMuU6nBGCc8OgeCGutV4f3WXg9wITd0+0c5nZOkH1fq uvRwvbpR3Xz/0+0uL34Xa8WpCEaPdaIK+KPfUXY5EVuaZvDOdYWiEPTJ6bLuJHBXcEhc kMkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject; bh=35qyS4ZPOEnsWy1vjNAJ4QEWldGHiXEs14mQZhx5E5o=; b=dc/JI49VMNcdex/DvWZcI7gF2B9N+5xdlr7kh592VN7fthkVQnZKTcvQtkZatH/3mW 3jpCxUaLLdgl7ShUZ2Y6f9u3kResPX14JYR4SNZ5ftOH3CWkPn5QOgcnh1lWsmNX68+3 kWLF6IIDi2nq7aavTS37wL+vbc/wmD2JOHwuzY2pV1WbcZRjQKfNKHThvD6W3BR0aINC WEdznjNpZ281T6HNrxyGyNND54ne2pI9NJ6n2UT8hIK90uSB0HCSxDunQViwrjGj49Ko hEGfztk2gr9zviXRKy1Ct2QxhJXMLGRkEcBVTfTwy6w5CgmiSwvj2lXZI2+r4FsXLZNM yLTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j18si12171265eda.278.2019.11.06.02.12.18; Wed, 06 Nov 2019 02:12:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727363AbfKFKMM (ORCPT + 99 others); Wed, 6 Nov 2019 05:12:12 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:26722 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726891AbfKFKMM (ORCPT ); Wed, 6 Nov 2019 05:12:12 -0500 Received: from pps.filterd (m0098409.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id xA6A63ht051306 for ; Wed, 6 Nov 2019 05:12:11 -0500 Received: from e06smtp01.uk.ibm.com (e06smtp01.uk.ibm.com [195.75.94.97]) by mx0a-001b2d01.pphosted.com with ESMTP id 2w3v4d85qe-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 06 Nov 2019 05:12:11 -0500 Received: from localhost by e06smtp01.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 6 Nov 2019 10:12:09 -0000 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp01.uk.ibm.com (192.168.101.131) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 6 Nov 2019 10:12:06 -0000 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id xA6AC45R42205354 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 6 Nov 2019 10:12:05 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D4510A405B; Wed, 6 Nov 2019 10:12:04 +0000 (GMT) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 73814A4059; Wed, 6 Nov 2019 10:12:03 +0000 (GMT) Received: from [9.199.158.77] (unknown [9.199.158.77]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 6 Nov 2019 10:12:03 +0000 (GMT) Subject: Re: [bug report] ext4: Add support for blocksize < pagesize in dioread_nolock To: Dan Carpenter Cc: linux-ext4@vger.kernel.org, "Theodore Ts'o" , Jan Kara , Matthew Bobrowski References: <20191106082505.GA31923@mwanda> From: Ritesh Harjani Date: Wed, 6 Nov 2019 15:42:02 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20191106082505.GA31923@mwanda> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 19110610-4275-0000-0000-0000037B41BE X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19110610-4276-0000-0000-0000388E8EFD Message-Id: <20191106101203.73814A4059@d06av23.portsmouth.uk.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-11-06_02:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=840 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1911060102 Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Thanks Dan for reporting this. On 11/6/19 1:55 PM, Dan Carpenter wrote: > Hello Ritesh Harjani, > > The patch c8cc88163f40: "ext4: Add support for blocksize < pagesize > in dioread_nolock" from Oct 16, 2019, leads to the following static > checker warning: > > fs/ext4/inode.c:2390 mpage_process_page() error: 'io_end_vec' dereferencing possible ERR_PTR() > fs/ext4/inode.c:2557 mpage_map_and_submit_extent() error: 'io_end_vec' dereferencing possible ERR_PTR() > fs/ext4/inode.c:3677 ext4_end_io_dio() error: 'io_end_vec' dereferencing possible ERR_PTR() ext4_end_io_dio func is removed on recent ext4 master branch. It got removed in ext4 iomap DIO patches. So my patch (which is based on today's ext4 master branch) does not covers for ext4_end_io_dio(). -ritesh