Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp2833938ybg; Mon, 28 Oct 2019 03:12:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqwCPfUhTgzBbDIlog0TDd3mumm4nbAPOHCbVu66lsMz/JOVmn15tl0sd7SQ8Ge+XpNFSnD+ X-Received: by 2002:a50:c2c2:: with SMTP id u2mr18792351edf.133.1572257523662; Mon, 28 Oct 2019 03:12:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572257523; cv=none; d=google.com; s=arc-20160816; b=L19HhwGF7EHR2Sw7guQLsyAaNASPSEqjz+rV5C2zb4PWpmWsINygPIE62lmknQ/C7v FknIhmGzIZtGdW8/Wm7KHxrAO/MyyxwBrQRwK1aKmWNrUdawg+zDfrz420DHIKK5apv3 RCEboFxqpQ6z150T63IkINdP7nstU+JQv+tiuqRHurRxZGJyZhM+AK8Lceim4GU815xx EsLeYUfOctoNXQ5O341MNitkxzdTrw1jR/IiBN3zGzy5dPMX1a5GYZE6oE3fuI47Lpws /yx4JvEJjzoiyMBSHTKME+4FD4qSgFlMqmt/j32LvHu+hXMLbhziLDsYfItv5pq259Yq HrWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=GYLFseFAeVZwsxPBuZwIbKMZui1BnewxZc1LJwU8RD4=; b=nZcKlsPQGVc+j8OWazdU4z9TBhpQxlI7+j2Ak5Acz5avQyFIaumVXNZNefT+WjvD1J pmhf5eHZJ4fHXK1dZLidDBCpk3Kf+h1psIjI8zE0HauiqFna2oxEveNugpYYauDwV4O8 SybZTJxZkQiuLhqejDv3wmKIainfOGOLQ7N5FNPYAju2Ha9ltxXc3Cmpm9Fbd7wj/Nl6 8x0x9MXX8zbqjAEI/2jlEY0enFtvAEeMuKdwJTsvaWqgfsWKYhn3x7+grnMLCgzoLl3D e28zdb0k5s4ARPPna8kM++WTvLbQ+usXKgMrfHzvjl6cSxuyuDsCeAqAVjWRUp7PQaLm Ibeg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=C8RNtT6B; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r5si5124230eja.353.2019.10.28.03.11.29; Mon, 28 Oct 2019 03:12:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=C8RNtT6B; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732275AbfJ0V0R (ORCPT + 99 others); Sun, 27 Oct 2019 17:26:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:48182 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732891AbfJ0V0O (ORCPT ); Sun, 27 Oct 2019 17:26:14 -0400 Received: from localhost (100.50.158.77.rev.sfr.net [77.158.50.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 59DE9222C9; Sun, 27 Oct 2019 21:26:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572211573; bh=6nO+AR2fnfay1owM09QIsyt2LwsgCbKrNTQqyfGoboI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=C8RNtT6BBnF5crZNc+omWp9St6e3QF3CZ1pXt35WdEuGT304XtUL9CXDNWBZwWWon t6G1RNSR9mw4O++XFa20Su5QIgVaIvQvxFDFWZ490DyqqXJ0x05lUo1k7GgVmWpM7w 6f915cxXRRX+qj4SNVUkeiHuQO+xS3ob6qE1Btns= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Josef Bacik , David Sterba Subject: [PATCH 5.3 183/197] btrfs: dont needlessly create extent-refs kernel thread Date: Sun, 27 Oct 2019 22:01:41 +0100 Message-Id: <20191027203406.352458705@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191027203351.684916567@linuxfoundation.org> References: <20191027203351.684916567@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Sterba commit 80ed4548d0711d15ca51be5dee0ff813051cfc90 upstream. The patch 32b593bfcb58 ("Btrfs: remove no longer used function to run delayed refs asynchronously") removed the async delayed refs but the thread has been created, without any use. Remove it to avoid resource consumption. Fixes: 32b593bfcb58 ("Btrfs: remove no longer used function to run delayed refs asynchronously") CC: stable@vger.kernel.org # 5.2+ Reviewed-by: Josef Bacik Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/ctree.h | 2 -- fs/btrfs/disk-io.c | 6 ------ 2 files changed, 8 deletions(-) --- a/fs/btrfs/ctree.h +++ b/fs/btrfs/ctree.h @@ -908,8 +908,6 @@ struct btrfs_fs_info { struct btrfs_workqueue *fixup_workers; struct btrfs_workqueue *delayed_workers; - /* the extent workers do delayed refs on the extent allocation tree */ - struct btrfs_workqueue *extent_workers; struct task_struct *transaction_kthread; struct task_struct *cleaner_kthread; u32 thread_pool_size; --- a/fs/btrfs/disk-io.c +++ b/fs/btrfs/disk-io.c @@ -2036,7 +2036,6 @@ static void btrfs_stop_all_workers(struc btrfs_destroy_workqueue(fs_info->readahead_workers); btrfs_destroy_workqueue(fs_info->flush_workers); btrfs_destroy_workqueue(fs_info->qgroup_rescan_workers); - btrfs_destroy_workqueue(fs_info->extent_workers); /* * Now that all other work queues are destroyed, we can safely destroy * the queues used for metadata I/O, since tasks from those other work @@ -2242,10 +2241,6 @@ static int btrfs_init_workqueues(struct max_active, 2); fs_info->qgroup_rescan_workers = btrfs_alloc_workqueue(fs_info, "qgroup-rescan", flags, 1, 0); - fs_info->extent_workers = - btrfs_alloc_workqueue(fs_info, "extent-refs", flags, - min_t(u64, fs_devices->num_devices, - max_active), 8); if (!(fs_info->workers && fs_info->delalloc_workers && fs_info->submit_workers && fs_info->flush_workers && @@ -2256,7 +2251,6 @@ static int btrfs_init_workqueues(struct fs_info->endio_freespace_worker && fs_info->rmw_workers && fs_info->caching_workers && fs_info->readahead_workers && fs_info->fixup_workers && fs_info->delayed_workers && - fs_info->extent_workers && fs_info->qgroup_rescan_workers)) { return -ENOMEM; }