Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4418919imu; Sat, 19 Jan 2019 09:02:14 -0800 (PST) X-Google-Smtp-Source: ALg8bN4pkMbQO9MMGvBewxOwTGYWWJL+p24T+kUGrqzlvcCTjtm5V+vj9zuwHV9hDLa+w0fuFrLQ X-Received: by 2002:a62:5793:: with SMTP id i19mr23984549pfj.49.1547917334080; Sat, 19 Jan 2019 09:02:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547917334; cv=none; d=google.com; s=arc-20160816; b=E2CmRzIfOMa55ul7CANbStoUBubeIyUmn0c/SYfMJDjUCPzy/quT07Jfu//T1bvmBH mVRE6dXe/sACXY7UpXtS67TB26++SALVrIYwHiXaZcsgxmZ0KpC4kE3BOO8jRuVNNoHI IpI4s4gNzf6DRFhrAvcemsWMbrVoLm1a/3jbEsKdy948P49qCLRz+U/S7tqJLMcHSCPm vup/0wv1e7VdMsvSa1T4JER1wqnaRLh0VwlHwb/9qmfh0vGnleuwdV5Iw1gDRJbYxAQx d6YRihFzoEmfaIx1l8gYNuHFM17LZgFEIgjfty4hrzd5hcOo+nCALHwZyURmKUN0YWuL 4uLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:user-agent:content-disposition :mime-version:message-id:cc:to:from:date; bh=frT8z8qs0Y1xfjHvYenoOy544jbx/bAxG9T7FaSTPoU=; b=hLZHtIzXet2WJYbp7LgLAo6UT23C66kj0ihiSUrZAhc5fito/zdydoAkn7y9q2bYvs Lor/inPgQC8KDRZm0IeZhh1gbu2w2ZBUQNOSPeW/bXHdwwIkPHvwnBP4eJRSyvIhBP9h tHPE+j2UIOXT4hi615S48hsSqID/eiS0g9EwcXnHYF9hijDQOxhiy5XDsz38Qitr8xB6 k6Lwa6Nh5sfuVQ6O7Z4qtjmm7KMA80q+00mDlo4kntFP2wRLRA3QSqe+gzEzDTQJ1efA HGCGL4SVcbnANC2kmTzMrwC/VMhiPST1XTw4Z4aPBh8hyZOF4SCJLV0+p9m+F+LcbTu7 vsLA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e125si7523376pfe.14.2019.01.19.09.01.55; Sat, 19 Jan 2019 09:02:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728612AbfASRAQ (ORCPT + 99 others); Sat, 19 Jan 2019 12:00:16 -0500 Received: from bout01.mta.xmission.com ([166.70.11.15]:37437 "EHLO bout01.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726779AbfASRAQ (ORCPT ); Sat, 19 Jan 2019 12:00:16 -0500 Received: from mx03.mta.xmission.com ([166.70.13.213]) by bout01.mta.xmission.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.87) (envelope-from ) id 1gktyU-0004K2-Ra; Sat, 19 Jan 2019 10:00:02 -0700 Received: from plesk14-shared.xmission.com ([166.70.198.161] helo=plesk14.xmission.com) by mx03.mta.xmission.com with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.87) (envelope-from ) id 1gktyU-0004z9-3t; Sat, 19 Jan 2019 10:00:02 -0700 Received: from hacktheplanet (unknown [73.58.156.101]) by plesk14.xmission.com (Postfix) with ESMTPSA id 6E3C7212F61; Sat, 19 Jan 2019 17:00:00 +0000 (UTC) Date: Sat, 19 Jan 2019 11:59:53 -0500 From: Scott Bauer To: David Kozub Cc: linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, hch@infradead.org, jonathan.derrick@intel.com Message-ID: <20190119165953.GA12171@hacktheplanet> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) X-XM-SPF: eid=1gktyU-0004z9-3t;;;mid=<20190119165953.GA12171@hacktheplanet>;;;hst=mx03.mta.xmission.com;;;ip=166.70.198.161;;;frm=sbauer@plzdonthack.me;;;spf=none X-SA-Exim-Connect-IP: 166.70.198.161 X-SA-Exim-Mail-From: sbauer@plzdonthack.me X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on sa06.xmission.com X-Spam-Level: * X-Spam-Status: No, score=1.7 required=8.0 tests=ALL_TRUSTED,BAYES_40, DCC_CHECK_NEGATIVE,FAKE_REPLY_C,T_TM2_M_HEADER_IN_MSG,T_TooManySym_01, XMSubLong,XM_UncommonTLD01 autolearn=disabled version=3.4.2 X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * -0.0 BAYES_40 BODY: Bayes spam probability is 20 to 40% * [score: 0.3276] * 0.7 XMSubLong Long Subject * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa06 1397; Body=1 Fuz1=1 Fuz2=1] * 0.5 XM_UncommonTLD01 Less-common TLD * 0.0 T_TooManySym_01 4+ unique symbols in subject * 1.5 FAKE_REPLY_C No description available. X-Spam-DCC: XMission; sa06 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: *;David Kozub X-Spam-Relay-Country: X-Spam-Timing: total 446 ms - load_scoreonly_sql: 0.06 (0.0%), signal_user_changed: 3.4 (0.8%), b_tie_ro: 2.4 (0.5%), parse: 0.81 (0.2%), extract_message_metadata: 3.3 (0.8%), get_uri_detail_list: 0.64 (0.1%), tests_pri_-1000: 3.0 (0.7%), tests_pri_-950: 1.37 (0.3%), tests_pri_-900: 1.22 (0.3%), tests_pri_-90: 25 (5.7%), check_bayes: 23 (5.1%), b_tokenize: 4.8 (1.1%), b_tok_get_all: 4.5 (1.0%), b_comp_prob: 7 (1.6%), b_tok_touch_all: 3.4 (0.8%), b_finish: 1.20 (0.3%), tests_pri_0: 393 (88.2%), check_dkim_signature: 0.68 (0.2%), check_dkim_adsp: 148 (33.2%), poll_dns_idle: 141 (31.6%), tests_pri_10: 2.3 (0.5%), tests_pri_500: 10 (2.2%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH v2 09/16] block: sed-opal: split generation of bytestring header and content X-Spam-Flag: No X-SA-Exim-Version: 4.2.1 (built Thu, 05 May 2016 13:38:54 -0600) X-SA-Exim-Scanned: Yes (on mx03.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 17, 2019 at 09:31:49PM +0000, David Kozub wrote: > - > - memcpy(&cmd->cmd[cmd->pos], bytestring, len); > + start = &cmd->cmd[cmd->pos]; > cmd->pos += len; This is somewhat pendatic, but it helps me review patches if we keep things together. Since we're no longer doing the memcpy in this function, can we please move the cmd->pos += len to the location where we actually do the memcpy. I'm willing to be told to get over it if other reviewers don't like that approach, but if no one cares please move it. > + return start; > +} > > +static void add_token_bytestring(int *err, struct opal_dev *cmd, > + const u8 *bytestring, size_t len) > +{ > + u8 *start; > + > + start = add_bytestring_header(err, cmd, len); > + if (!start) > + return; > + memcpy(start, bytestring, len); Do the above here instead. > 2.20.1 > >