From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from aserp2130.oracle.com ([141.146.126.79]:56672 "EHLO aserp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934054AbeGFSgg (ORCPT ); Fri, 6 Jul 2018 14:36:36 -0400 Date: Fri, 6 Jul 2018 21:26:46 +0300 From: Dan Carpenter To: Matthew Wilcox Cc: linux-fsdevel@vger.kernel.org, kernel-janitors@vger.kernel.org Subject: Re: [PATCH] xarray: unlock on error in xa_alloc() Message-ID: <20180706182645.orttu3jjiox3v6kn@mwanda> References: <20180706172101.vvp3fv3l244y2p7w@kili.mountain> <20180706175130.GA7259@bombadil.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180706175130.GA7259@bombadil.infradead.org> Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Fri, Jul 06, 2018 at 10:51:30AM -0700, Matthew Wilcox wrote: > On Fri, Jul 06, 2018 at 08:21:01PM +0300, Dan Carpenter wrote: > > We need to unlock on this error path. > > > > Fixes: 29a6bfc32eb2 ("xarray: Track free entries in an XArray") > > Signed-off-by: Dan Carpenter > > --- > > > > There "UINT_MAX + 1" is an integer overflow and is equal to zero but I > > don't know what was intended there. > > Ah. I didn't realise UINT_MAX was defined as ~0U. I had intended > UINT_MAX + 1UL. ie 0x10000000UL on 64-bit and 0 on 32-bit. > I will push a Smatch check so that the wrap around on 32 bit systems will generate a warning. regards, dan carpenter