Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2364113imu; Thu, 24 Jan 2019 11:26:47 -0800 (PST) X-Google-Smtp-Source: ALg8bN5+pPVzdmfHr3qb4sYuKEh+DN2y0W9G9mY5tYwdnLApG56a0eiGdDzUZYQrAvW48q+iBKz0 X-Received: by 2002:a62:3141:: with SMTP id x62mr7722664pfx.12.1548358007174; Thu, 24 Jan 2019 11:26:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548358007; cv=none; d=google.com; s=arc-20160816; b=HtmbBb4tDixf0TG8+JPsyg08YQKNB2IzJiKCAxfak0k89QprdJxh7YGkWjOPeipkJ4 0Od7hXkt17seMOKAo4kjCeii5bssxCkYfH1gbl4OR5dc+WuumWKma6t8wRU8/nBWIBQs E10ZhFm0/gseUm0NBHmPnFej26HlzYv0idTiVBGJVQ3d8/rvLPiB61ZRYdCXVbmQLdJe DcUwbHbFzacb1O5HI6SncpF5zO0x4ZegEARJHD69uvoYA0o7XAXjS0OGdnYRbAtZmvFp qkto6OXinOFvpbqOa3rtkXbdZNIVBjMGsBlvCYzH+KtXk88QsIQpKvzKgUUDfPrdN2eZ WmOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=laxf8Yu8bKsaD6eb14Vd9nRLuy9azU/jP6l6udK0m/s=; b=kkhIc/LPI+VZHunJ1LMJUvV2gwyqrhElssvm5ZvdQRqf1v++5EvN/q2uWuZ8Rk3h+A aP4DjJfsruBJX1ORbJzLn0EDylu9kCTlRvAnxTk7/flgJ02/P4YCxi10QCK/4ita8Ukn 6TXSPL2fdTao0J8eYJMy5aTye3cpcDMvHkrVIgZzLq0IsClf96hPetsSTaWtpnJM/5I6 EjmfODicXtHeq8Z1wsHfVY7JDq1KbrDIHcVffrLnuY78nQIMR/2Spiob2RG9U1ZBFQKf LP8rEJpiRXUJw9COKkWPMr0SE1StEEkqN8Lrze/yyjp2mtuaAEur0rbMvT84BXwLM/Cb pUew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zW00VC8G; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w5si22008327plz.419.2019.01.24.11.26.31; Thu, 24 Jan 2019 11:26:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zW00VC8G; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730066AbfAXTYT (ORCPT + 99 others); Thu, 24 Jan 2019 14:24:19 -0500 Received: from mail.kernel.org ([198.145.29.99]:49472 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729546AbfAXTYS (ORCPT ); Thu, 24 Jan 2019 14:24:18 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 98035218FE; Thu, 24 Jan 2019 19:24:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548357857; bh=4cgeGGF4S4hahsg+q8cIJFLfXq5SH8Dfo4MSVMRKQKo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zW00VC8Gff0Ym60dJbCicK4fZTJ03tdYS38xW4r5s63ws1Prd/uMNC6ACbSfJXNSt qu0ZwUO25JKSP4frFxyBWfOjJV9F2HX+pVsysD00+hwntV5AGB6oeqYhXXE0aOU+2a ktX5hJ5PBF8IZXaBUdU0vmW+uFX34xRR6X2lUNV0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chao Yu , Jaegeuk Kim , Ben Hutchings Subject: [PATCH 4.4 013/104] f2fs: avoid unneeded loop in build_sit_entries Date: Thu, 24 Jan 2019 20:19:02 +0100 Message-Id: <20190124190156.334017387@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190124190154.968308875@linuxfoundation.org> References: <20190124190154.968308875@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Chao Yu commit d600af236da51d9e3b90d21a23f95b820bd02e2f upstream. When building each sit entry in cache, firstly, we will load it from sit page, and then check all entries in sit journal, if there is one updated entry in journal, cover cached entry with the journaled one. Actually, most of check operation is unneeded since we only need to update cached entries with journaled entries in batch, so changing the flow as below for more efficient: 1. load all sit entries into cache from sit pages; 2. update sit entries with journal. Signed-off-by: Chao Yu Signed-off-by: Jaegeuk Kim [bwh: Backported to 4.4: - Keep using curseg->curseg_mutex for serialisation - Use sum instead of journal - Don't add f2fs_discard_en() condition] Signed-off-by: Ben Hutchings Signed-off-by: Greg Kroah-Hartman --- fs/f2fs/segment.c | 44 ++++++++++++++++++++++++++++---------------- 1 file changed, 28 insertions(+), 16 deletions(-) --- a/fs/f2fs/segment.c +++ b/fs/f2fs/segment.c @@ -2145,22 +2145,11 @@ static void build_sit_entries(struct f2f struct f2fs_sit_entry sit; struct page *page; - mutex_lock(&curseg->curseg_mutex); - for (i = 0; i < sits_in_cursum(sum); i++) { - if (le32_to_cpu(segno_in_journal(sum, i)) - == start) { - sit = sit_in_journal(sum, i); - mutex_unlock(&curseg->curseg_mutex); - goto got_it; - } - } - mutex_unlock(&curseg->curseg_mutex); - page = get_current_sit_page(sbi, start); sit_blk = (struct f2fs_sit_block *)page_address(page); sit = sit_blk->entries[SIT_ENTRY_OFFSET(sit_i, start)]; f2fs_put_page(page, 1); -got_it: + check_block_count(sbi, start, &sit); seg_info_from_raw_sit(se, &sit); @@ -2168,13 +2157,36 @@ got_it: memcpy(se->discard_map, se->cur_valid_map, SIT_VBLOCK_MAP_SIZE); sbi->discard_blks += sbi->blocks_per_seg - se->valid_blocks; - if (sbi->segs_per_sec > 1) { - struct sec_entry *e = get_sec_entry(sbi, start); - e->valid_blocks += se->valid_blocks; - } + if (sbi->segs_per_sec > 1) + get_sec_entry(sbi, start)->valid_blocks += + se->valid_blocks; } start_blk += readed; } while (start_blk < sit_blk_cnt); + + mutex_lock(&curseg->curseg_mutex); + for (i = 0; i < sits_in_cursum(sum); i++) { + struct f2fs_sit_entry sit; + struct seg_entry *se; + unsigned int old_valid_blocks; + + start = le32_to_cpu(segno_in_journal(sum, i)); + se = &sit_i->sentries[start]; + sit = sit_in_journal(sum, i); + + old_valid_blocks = se->valid_blocks; + + check_block_count(sbi, start, &sit); + seg_info_from_raw_sit(se, &sit); + + memcpy(se->discard_map, se->cur_valid_map, SIT_VBLOCK_MAP_SIZE); + sbi->discard_blks += old_valid_blocks - se->valid_blocks; + + if (sbi->segs_per_sec > 1) + get_sec_entry(sbi, start)->valid_blocks += + se->valid_blocks - old_valid_blocks; + } + mutex_unlock(&curseg->curseg_mutex); } static void init_free_segmap(struct f2fs_sb_info *sbi)