[RFC 1/2] block: Introduce the UFQ I/O scheduler
Alexei Starovoitov
alexei.starovoitov at gmail.com
Fri Mar 27 07:21:56 PDT 2026
On Fri, Mar 27, 2026 at 4:49 AM Chengkaitao <pilgrimtao at gmail.com> wrote:
>
> +
> +__bpf_kfunc bool bpf_request_put(struct request *rq)
> +{
> + if (req_ref_put_and_test(rq))
> + return false;
> +
> + return true;
> +}
...
> +BTF_ID_FLAGS(func, bpf_request_put)
I bet you knew this is not safe and despite that you still
decided to hack it this way.
This corner cutting is a red flag for this patchset and
your link list patches.
Since you got caught doing this you need to prove much harder
that you know what you're doing and there are no other safety issues.
More information about the linux-riscv
mailing list