Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp2404rwi; Tue, 25 Oct 2022 19:08:31 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6/rlhRvQhMPpUMVxYKrEQHi3tsihmdcIhkqKlvAlyhxc92cIt8kUSh6BiBcqLOz08qdhxq X-Received: by 2002:a17:907:a0e:b0:780:72bb:5ce4 with SMTP id bb14-20020a1709070a0e00b0078072bb5ce4mr35399928ejc.234.1666750111025; Tue, 25 Oct 2022 19:08:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666750111; cv=none; d=google.com; s=arc-20160816; b=ZXyGno3HhJEsY5wWvNj/f1m7T4BT9eDSw1R3PSx29nbM0Sv1u2A2D/W9LuNOf0AWCH DzVMNYSQxP5ba/nW1ijGO9N1UwW/5hPXZMJfqltCj8BCI0iHHSGboekzOw+8HEgtRw8X Ehtuh9vUIED+mWAEnVs2uSJnTmq1ifl0Orvo8YPI5ifpK7cTQbUxOg560ETDmpKui/N7 bsecWS2eNfTwP7XOYn4k/MadpniUW0L0DFFYKjNBAVsy90/BqhBA9rRN6t/IY+k4yHSJ FKvs4RmTkE5y6LAom5AeuLjPYymWbrFxDgEPXN8OAaYDiMOE6RW5Rhi6yNIhxVi7q/Zx bXDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=9Y7yxUvZnzNRypoDo4QwIr3SMBA/tTmjj7jbkx/Nvak=; b=d8gGYb+iskk4D2YeGQMV0cKLYEYqXfvbAR4Hor8mSe21uG+rM6pm1jMSAZkwxni72D ZplW57u8LNl9wws8t6NdJ24O7jdzJjSlg6vfnq9WoGTbVFQRtZ8Co+tj/Sip8dhdy3Vk 6rXhxombK95fCeXrn69otzVDGTUrRUkfFB8VyyC5UCcDILLF/scalwvcCStcuU0BiwhP 5cZZZLGb6ko6n1wgTa7D/yG/tRk/nEg6Y1RGuGU338J0odkMwH6iP3pbFdgoHA3mfOzt 8GYxj40mJv1VJACH4n/8aPJE0168C9hyfq4ScEDWJu2435G5XO/HRhywe+8BIaCx/vP3 FIfA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m3-20020a1709066d0300b007877f3132d9si3897975ejr.438.2022.10.25.19.08.05; Tue, 25 Oct 2022 19:08:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232575AbiJZBri (ORCPT + 99 others); Tue, 25 Oct 2022 21:47:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60298 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231455AbiJZBrg (ORCPT ); Tue, 25 Oct 2022 21:47:36 -0400 Received: from mail.nfschina.com (unknown [124.16.136.209]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6D6A1A8359; Tue, 25 Oct 2022 18:47:35 -0700 (PDT) Received: from localhost (unknown [127.0.0.1]) by mail.nfschina.com (Postfix) with ESMTP id 340BF1E80C9B; Wed, 26 Oct 2022 09:46:09 +0800 (CST) X-Virus-Scanned: amavisd-new at test.com Received: from mail.nfschina.com ([127.0.0.1]) by localhost (mail.nfschina.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uhCTPFNFdbLS; Wed, 26 Oct 2022 09:46:06 +0800 (CST) Received: from localhost.localdomain (unknown [219.141.250.2]) (Authenticated sender: zeming@nfschina.com) by mail.nfschina.com (Postfix) with ESMTPA id 351C71E80C9A; Wed, 26 Oct 2022 09:46:06 +0800 (CST) From: Li zeming To: neilb@suse.de Cc: bvanassche@acm.org, jlayton@kernel.org, linux-kernel@vger.kernel.org, reiserfs-devel@vger.kernel.org, song@kernel.org, willy@infradead.org Subject: Re: [PATCH] reiserfs: journal: Increase jl pointer check Date: Wed, 26 Oct 2022 09:47:26 +0800 Message-Id: <20221026014727.3020-1-zeming@nfschina.com> X-Mailer: git-send-email 2.18.2 In-Reply-To: <166673341340.7585.173987927705263434@noble.neil.brown.name> References: <166673341340.7585.173987927705263434@noble.neil.brown.name> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I'm sorry, I think __GFP_NOFAIL should be like this: The __GFP_NOFAIL flag will cause memory to be allocated an infinite number of times until the allocation is successful, but it is best to use it only for very necessary code, and try not to use it. I'm not sure alloc_journal_list function is a very important function here. If it is, this patch ignores it and does not consider it anymore __GFP_NOFAIL allocatiIon problem.