Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp542858ybj; Tue, 5 May 2020 03:29:43 -0700 (PDT) X-Google-Smtp-Source: APiQypIPma0lLZUYy4MyfsSMmNb7nHEVA+njv1o5KmhYSqNd9lGx4rZITd5IPJfLXbfkHdbuynWq X-Received: by 2002:a17:907:20f7:: with SMTP id rh23mr1932275ejb.71.1588674582935; Tue, 05 May 2020 03:29:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588674582; cv=none; d=google.com; s=arc-20160816; b=FDt2/01YY67O2MCbT5nHmUQ4HtqxEsA/NNl8M7ZZcGUwns8eI9nVx+Vfy1eBILD3g+ DDAOLIplTPTYb6namxM42dyIvyohjsK+Hj/2is0nqcQnTPG8flsacL1XrIi0hNyq4Nvp 7x9hsqgnJ7ckPmUWJuBBh8+ma9fy1uFXh7qKhPJt0R1ONYuDz116ZS/zVs1PvJPAxAvN Dx8keNoL+22zHmVDpuPJHv2OqRMD+8xiUH2s86b0IxeU7EpHSrOgpjnP+4XZrR/sjyW8 9+nIEY5k+ppFEsrEH1aMJTIjdBLF+G0/I/E19OJnxqE7gJAzbj2uE9TvwAXrnVrjNB8p GplQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=sO2rJc+1yzJ8GlqJqDU3CftVhAjRi8qCungOHaNGXVA=; b=mcKGa1pG81BlMrS8id9qhFOtMn/RnCHoBsCvXbjBSWmG9jHvIxWQiB1psSfcM+JqC8 BnifePX+pkMp8OcPdB1CmP5bk6DdHEH6GyHMRP0vAUmMvIb4Fsi0VHwOe7cMg6jF6ARW 2XmlDZgXBZI/VBo8LypxzZZ9Q42oyAqrJUIyk3DIoXzmwWq+SkrrXHNHkc65KpWtsNQQ bIvvmDFbN9g0wUfwmvfyPV4rnVVbU7yffOziBtwUOgqRQ99P1N22dskWggg5yLIH9rgE VCc/cCD6p6O1wzcj5z77SOUS8JwI+EXITUT0pqnfuQhqQcgCBwGvcdgKEyyP4zQz12Um gdHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ks2si880665ejb.445.2020.05.05.03.29.19; Tue, 05 May 2020 03:29:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728233AbgEEK3R (ORCPT + 99 others); Tue, 5 May 2020 06:29:17 -0400 Received: from verein.lst.de ([213.95.11.211]:34546 "EHLO verein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725766AbgEEK3R (ORCPT ); Tue, 5 May 2020 06:29:17 -0400 Received: by verein.lst.de (Postfix, from userid 2407) id 518BB68C4E; Tue, 5 May 2020 12:29:14 +0200 (CEST) Date: Tue, 5 May 2020 12:29:14 +0200 From: Christoph Hellwig To: Ritesh Harjani Cc: Christoph Hellwig , linux-ext4@vger.kernel.org, viro@zeniv.linux.org.uk, jack@suse.cz, tytso@mit.edu, adilger@dilger.ca, amir73il@gmail.com, linux-fsdevel@vger.kernel.org, linux-unionfs@vger.kernel.org Subject: Re: [PATCH 07/11] iomap: fix the iomap_fiemap prototype Message-ID: <20200505102914.GA15815@lst.de> References: <20200427181957.1606257-1-hch@lst.de> <20200427181957.1606257-8-hch@lst.de> <20200501233402.5101BAE045@d06av26.portsmouth.uk.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200501233402.5101BAE045@d06av26.portsmouth.uk.ibm.com> User-Agent: Mutt/1.5.17 (2007-11-01) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Sat, May 02, 2020 at 05:04:01AM +0530, Ritesh Harjani wrote: > > > On 4/27/20 11:49 PM, Christoph Hellwig wrote: >> iomap_fiemap should take u64 start and len arguments, just like the >> ->fiemap prototype. >> >> Signed-off-by: Christoph Hellwig > > hmm.. I guess, > it's only ->fiemap ops in inode_operations which has > start and len arguments as u64. > > While such other ops in struct file_operations have the > arguments of type loff_t. (e.g. ->fallocate, -->llseek etc). > > But sure to match the ->fiemap prototype, this patch looks ok to me. Yes, fiemap is rather weird here, but it matches the ioctl prototype, so I'd rather pass it on to the method where fiemap_prep will catch anything that overflows s_maxbytes due to the signeness of loff_t.