From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 64207C00140 for ; Wed, 24 Aug 2022 05:35:33 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BB4A0940008; Wed, 24 Aug 2022 01:35:32 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B6470940007; Wed, 24 Aug 2022 01:35:32 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A2BE4940008; Wed, 24 Aug 2022 01:35:32 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 93942940007 for ; Wed, 24 Aug 2022 01:35:32 -0400 (EDT) Received: from smtpin23.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 6B5931C6DD7 for ; Wed, 24 Aug 2022 05:35:32 +0000 (UTC) X-FDA: 79833373704.23.83947B6 Received: from verein.lst.de (verein.lst.de [213.95.11.211]) by imf01.hostedemail.com (Postfix) with ESMTP id BAD2140037 for ; Wed, 24 Aug 2022 05:35:31 +0000 (UTC) Received: by verein.lst.de (Postfix, from userid 2407) id 9F8B568AA6; Wed, 24 Aug 2022 07:35:27 +0200 (CEST) Date: Wed, 24 Aug 2022 07:35:27 +0200 From: Christoph Hellwig To: Dan Carpenter Cc: kbuild@lists.01.org, Christoph Hellwig , lkp@intel.com, kbuild-all@lists.01.org, Linux Memory Management List , David Sterba , Nikolay Borisov , Johannes Thumshirn Subject: Re: [linux-next:master 2079/2594] fs/btrfs/volumes.c:6546 __btrfs_map_block() error: we previously assumed 'mirror_num_p' could be null (see line 6373) Message-ID: <20220824053527.GA18584@lst.de> References: <202208240734.u4Y7Q6sW-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <202208240734.u4Y7Q6sW-lkp@intel.com> User-Agent: Mutt/1.5.17 (2007-11-01) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1661319332; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=kAYrvELnR39Vzh8qTelFW6UP2r0dO9uiWmEA3LLGH4A=; b=di1GsHbLIZhgLjSEDgKC80gf3GROv/wHeHS2w7AT4oJi0TT3rQUdw+Ets03CltUs+TF8nT 79XK+wW/Xsoy6aH+tNRFsX7Tc0TDhvvfHMgVeAi957+44TsvCOe8jytl25TycaCoBDKosB 0yJI741SJd1Y+f4rqghwuE0U+kT1tUs= ARC-Authentication-Results: i=1; imf01.hostedemail.com; dkim=none; dmarc=none; spf=none (imf01.hostedemail.com: domain of hch@lst.de has no SPF policy when checking 213.95.11.211) smtp.mailfrom=hch@lst.de ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1661319332; a=rsa-sha256; cv=none; b=eica0XQXDE/tCCdtn9UYoOWG7xu/gVtgOtyjlNQfBU+CNwTrVRul2jm7/tkqkiu9UWGJRQ QD7DeGYz2h5r5Z7vbykV7OeKabm7b5ssKGe2W88bp/9H5jt0ERgaHaEb+sDBlOMVxLxNY0 heS89UVN8edC1EWAu9afapVQ5kUAMi0= X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: BAD2140037 X-Rspam-User: Authentication-Results: imf01.hostedemail.com; dkim=none; dmarc=none; spf=none (imf01.hostedemail.com: domain of hch@lst.de has no SPF policy when checking 213.95.11.211) smtp.mailfrom=hch@lst.de X-Stat-Signature: qcx97yezdup3jojmwjuxyumnrfgoohs5 X-HE-Tag: 1661319331-189137 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed, Aug 24, 2022 at 08:28:26AM +0300, Dan Carpenter wrote: > tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master > head: 05477f3653b82d8b3bcf39d2937d9893124976db > commit: 51bf2819055847ce90006a368f8d2c07f408dd33 [2079/2594] btrfs: make the btrfs_io_context allocation in __btrfs_map_block optional > config: nios2-randconfig-m031-20220824 (https://download.01.org/0day-ci/archive/20220824/202208240734.u4Y7Q6sW-lkp@intel.com/config) > compiler: nios2-linux-gcc (GCC) 12.1.0 > > If you fix the issue, kindly add following tag where applicable > Reported-by: kernel test robot > Reported-by: Dan Carpenter > > New smatch warnings: The calling convention implies that either smap and mirror_num_p are both NULL or neither. We could add an extra check to shut up the validator if this really helps.