Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp802042ybe; Fri, 13 Sep 2019 06:36:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqxIv7HPZk0kEcusCFXnoG90R6DObX/McezmpEOFaQCVVz+rczh2vYqgjCe/npDQ8q/IeDu0 X-Received: by 2002:a50:f00c:: with SMTP id r12mr48109869edl.274.1568381800748; Fri, 13 Sep 2019 06:36:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568381800; cv=none; d=google.com; s=arc-20160816; b=Uc7/p5F68M8YeDcN/1FwlMbknx3PZXSUtK+30I+jtXl9oB8InKKlz5Abd8H7+1FnG0 xfdwuhwfVMAS7n35l4ED0iTMO0D7MQfCUai+IWxuImhxYCpTr2Ip/Pok7M9CRu3C484z aKEi4/+ElTVeJ7Ky4yofj/KYlTVFpFKBrPOWsda51wjImvnkdOsZ856WLE4d40riX16b 1a0HqOGFu6INg8WIzJrINXIoZ2g/pWJ1POUpm7tCUlAtIQ0kKxeFLaR6IQ7uqgCNTRap tVC7bwjWPzZ4/eEWOfZ+y0AoFdnizNNL7KITLwRtT+d7fESuxDBc7xaXkbyy896wGzT1 fuAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=91o85K5BkNJMST8fIJhC0Z9Ui0zVslvMk4UAVAWjHjY=; b=JGLPATkV09+IzFgXhX5Gj4aQUIqNKkdXL5YVBROP1d7gLkodnjmUye+ehb6GwyGS73 kK/0aCbgg9LClY6CJsI4NA6u/4qHqUvLZks0t0tx/zxk5tHqzJlrbIVPY5DLKP8GQScY kE67tj+/3Hz9Smv4Qx0Bjsrkjs5sZ3Pl4t1wg3pzxWG9iWIQ/ELSF2EoKudI3t1URjgV Knhg58JB0ChdbTy/x3uIRdy48Pj3uBH36tiW/ho0Vnj+VpDGvcAQTPqT0FJcYAdU24eh XEikps9Qs3EondEPTi7q/tGLWToXFsBUBI8cAX/oPKh1UFNhD1ys2BXLh+0nORjqhfT5 /G1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wSeRaVlf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id na3si15083805ejb.137.2019.09.13.06.36.17; Fri, 13 Sep 2019 06:36:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wSeRaVlf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391718AbfIMNbX (ORCPT + 99 others); Fri, 13 Sep 2019 09:31:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:41038 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389074AbfIMNO7 (ORCPT ); Fri, 13 Sep 2019 09:14:59 -0400 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 93214206BB; Fri, 13 Sep 2019 13:14:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568380498; bh=F1LQPQ4943RvaxStbHaOxpfq/L5t+tyLc3hDL/XQhyE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wSeRaVlf/Q1RJjDz1uo0ikdhXuCy9D8QAeKVLr8UwUFZE6hLwfWJAcahgZ6iAnJhV fTXTrBDmwDtfxcnCucUNorMV0o1jIBKkUeRpz8Tfl9oxtl4SoDoGSrdQpKtZ8qtVZb VcUxGVFCpBWmcMlW9j19RGfyyiOicKTq6ty9GO+4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Coly Li , Jens Axboe , Sasha Levin Subject: [PATCH 4.19 085/190] bcache: replace hard coded number with BUCKET_GC_GEN_MAX Date: Fri, 13 Sep 2019 14:05:40 +0100 Message-Id: <20190913130606.345944203@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190913130559.669563815@linuxfoundation.org> References: <20190913130559.669563815@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 149d0efada7777ad5a5242b095692af142f533d8 ] In extents.c:bch_extent_bad(), number 96 is used as parameter to call btree_bug_on(). The purpose is to check whether stale gen value exceeds BUCKET_GC_GEN_MAX, so it is better to use macro BUCKET_GC_GEN_MAX to make the code more understandable. Signed-off-by: Coly Li Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- drivers/md/bcache/extents.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/md/bcache/extents.c b/drivers/md/bcache/extents.c index c809724e6571e..9560043666999 100644 --- a/drivers/md/bcache/extents.c +++ b/drivers/md/bcache/extents.c @@ -553,7 +553,7 @@ static bool bch_extent_bad(struct btree_keys *bk, const struct bkey *k) for (i = 0; i < KEY_PTRS(k); i++) { stale = ptr_stale(b->c, k, i); - btree_bug_on(stale > 96, b, + btree_bug_on(stale > BUCKET_GC_GEN_MAX, b, "key too stale: %i, need_gc %u", stale, b->c->need_gc); -- 2.20.1