Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1932154pxu; Sun, 13 Dec 2020 08:01:06 -0800 (PST) X-Google-Smtp-Source: ABdhPJzrTHHioqC6lcwww8GB5vh9GIp6K7a7MSqUwinKjfYV4YMGyxRTRdgakjyBOicpiTjuAZ/Z X-Received: by 2002:a17:906:7fca:: with SMTP id r10mr19356096ejs.24.1607875265859; Sun, 13 Dec 2020 08:01:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607875265; cv=none; d=google.com; s=arc-20160816; b=Ur2LTrF5KL3mo12EEDdKxjgto/Gyr/lY2Miwbu3yZvXd1wnBDnDgi5tbRJLB8/yXWb jNAqezt1eRd8x3KVnzxuMkBzwmTCfY59fyL7U/IFh1jZkvow9nL9Sw9SVxY4DoyE0VUf 845h2G7UOeqrNRXCV24g6pp27nYN2MsFEeTDkzFkSiQiRkq3lsnGX53S4Y9IBORYItkc LJfmK3bofLbR+vwxPpXtE93mET8vjLSxsI5aE5wSeKwIhZQ/Bz3KEvCGK4n/vds5TFkS u5X45aeOVp0KRGGRlfXzg0Uxefxl+ZWGijQ4LMbPSaLdrZgGPOBpDrGffWIYnOsderXl 10Hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=PJHtWEAaq9mILAH7ZOu8et1GbzEeBq8r2vbaNO9BgGg=; b=LbzsDPhfPf9u6eHymxK8hmuUj81rt7CMkzt4aVoLpJZFVKCH3pygYffeSnIorvME+J lb04tCXPYEoTPFV6S+YzhQfYhZTzqSiK1QVoAX05kb9QWIY+ZsVG6rsNz5B2fj5tjeXI Al5P9jTvXgW2zyNGA/27/Dkt5rQxj+rPVdeYEdnauVODIsifFFaG1Iuc1tllHwl8COrS b6k1eL/BH8/V5Ag8X8riwvRozwpZERgKY0371V7qRuvaPVsByW9FFR/WVNyvMQGhBB5k RqE4MchnSF8gtL7N6aoFFYNhE+emqhB09smsKwvbuCOQNgW7d2JofAqPdxQSdO+tb+Rj /PLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=D84HDMRw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d3si8889610edo.149.2020.12.13.08.00.43; Sun, 13 Dec 2020 08:01:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=D84HDMRw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437004AbgLLQOm (ORCPT + 99 others); Sat, 12 Dec 2020 11:14:42 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:43167 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2436489AbgLLQOf (ORCPT ); Sat, 12 Dec 2020 11:14:35 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1607789587; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=PJHtWEAaq9mILAH7ZOu8et1GbzEeBq8r2vbaNO9BgGg=; b=D84HDMRw7Me/scjOnhXWwy8pH9jilqmsTE1iogvhaN/90GEhqqb53yoYqcSv3YjtgHA9zR XinrGP/vIgWxlKYVjjyvB0NzqdiELH2mwVf8D2AjEpGRBc7ffuavSVd0iO75jaylGFRQLq IZ9LFFp29dncPnaFjUobyJqAnClP+4w= Received: from mail-pl1-f200.google.com (mail-pl1-f200.google.com [209.85.214.200]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-289-2fe2pk4IOr6gaZoToaqNMQ-1; Sat, 12 Dec 2020 11:13:05 -0500 X-MC-Unique: 2fe2pk4IOr6gaZoToaqNMQ-1 Received: by mail-pl1-f200.google.com with SMTP id c8so6802359plo.13 for ; Sat, 12 Dec 2020 08:13:05 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=PJHtWEAaq9mILAH7ZOu8et1GbzEeBq8r2vbaNO9BgGg=; b=cZp3DhCJPYOvFMsvUkOfJPMQNvF4vtqSdxE1RIKYAp9BCnT41x+9ovFmFYxgDP4O2+ j6lPkpyXOBVJgh7Amir1+fe8887TNQZ2k+vCs967HKxAe+jFp00VsTXdISJ4+unNaYLd 0Juiw/avW/2ER5yiw22ctJtFG9NvEn+VZnBcu4rl4IVneTHb5IlLkJT5kQVMNOKtpnxJ 3lyRyWiiM+7k2q5DMFExOyA7ns5Qc055Q3imV+MFnKB+JDoJQHhidn11xu9B98wdV1mZ z+90FJAKUt1QuItsd3s7hUwR+pS1U0grZmjwnjp9wAIyGQP0Ejoof8iEukuvHkdUvb9P B5RQ== X-Gm-Message-State: AOAM5330UWj6G1xuznrKE64NZgWWNcjvGKdgqzMYZVCyw3DsAfgnv8dH BMIdYOQYA862LPOFPenl+K6U78ODdesxZ/g7wU8IpmGfJ0c0D+0iWdd2//avYiB/6I5kPRJqfgs GMxXi3/2AcZ/agOGJBAhaxNJb X-Received: by 2002:a17:902:b496:b029:da:d356:be8c with SMTP id y22-20020a170902b496b02900dad356be8cmr15659234plr.56.1607789584335; Sat, 12 Dec 2020 08:13:04 -0800 (PST) X-Received: by 2002:a17:902:b496:b029:da:d356:be8c with SMTP id y22-20020a170902b496b02900dad356be8cmr15659214plr.56.1607789584018; Sat, 12 Dec 2020 08:13:04 -0800 (PST) Received: from xiangao.remote.csb ([209.132.188.80]) by smtp.gmail.com with ESMTPSA id k14sm14479519pfp.132.2020.12.12.08.13.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 12 Dec 2020 08:13:03 -0800 (PST) Date: Sun, 13 Dec 2020 00:12:53 +0800 From: Gao Xiang To: chenlei0x@gmail.com Cc: darrick.wong@oracle.com, linux-xfs@vger.kernel.org, linux-kernel@vger.kernel.org, Lei Chen Subject: Re: [PATCH] xfs: clean code for setting bma length in xfs_bmapi_write Message-ID: <20201212161253.GA94979@xiangao.remote.csb> References: <1607777297-22269-1-git-send-email-lennychen@tencent.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <1607777297-22269-1-git-send-email-lennychen@tencent.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Dec 12, 2020 at 08:48:17PM +0800, chenlei0x@gmail.com wrote: > From: Lei Chen > > xfs_bmapi_write may need alloc blocks when it encounters a hole > or delay extent. When setting bma.length, it does not need comparing > MAXEXTLEN and the length that the caller wants, because > xfs_bmapi_allocate will handle every thing properly for bma.length. > > Signed-off-by: Lei Chen > --- > fs/xfs/libxfs/xfs_bmap.c | 13 +------------ > 1 file changed, 1 insertion(+), 12 deletions(-) > > diff --git a/fs/xfs/libxfs/xfs_bmap.c b/fs/xfs/libxfs/xfs_bmap.c > index dcf56bc..e1b6ac6 100644 > --- a/fs/xfs/libxfs/xfs_bmap.c > +++ b/fs/xfs/libxfs/xfs_bmap.c > @@ -4417,18 +4417,7 @@ struct xfs_iread_state { > bma.wasdel = wasdelay; > bma.offset = bno; > bma.flags = flags; > - > - /* > - * There's a 32/64 bit type mismatch between the > - * allocation length request (which can be 64 bits in > - * length) and the bma length request, which is > - * xfs_extlen_t and therefore 32 bits. Hence we have to > - * check for 32-bit overflows and handle them here. > - */ > - if (len > (xfs_filblks_t)MAXEXTLEN) > - bma.length = MAXEXTLEN; > - else > - bma.length = len; > + bma.length = len; After refering to the definition of struct xfs_bmalloca, so I think bma.length is still a xfs_extlen_t ===> uint32_t, so I'm afraid the commit a99ebf43f49f ("xfs: fix allocation length overflow in xfs_bmapi_write()") and the reason for adding this is still valid for now? Thanks, Gao Xiang