Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp912426pxa; Sat, 22 Aug 2020 04:36:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8rP1EnGtPeElm2PTtKnEdNdyFdGKEDWuMeiiuHe+ftXGppLlL2zxAleGGzfhPui0dnRNs X-Received: by 2002:a17:906:c7d3:: with SMTP id dc19mr6940623ejb.495.1598096169275; Sat, 22 Aug 2020 04:36:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598096169; cv=none; d=google.com; s=arc-20160816; b=gvBSXE/OVPt0eFX2sDmaXgf6SLnHM3uHPZTOF2iqvpE0ifIQ40rgECO6tvTsqZGRwE TYdOq6FMln2K+HSuZMYc6t/hs+XbGGFJQ17PJB15HfjoK+IOfcw6+WQj+dtdGRlViV8z hM0HyAYz9hfBBkmfmns5WvoTteufuT1NSjTMoIsbwjyS/O2EiQia4xCJ0jfE3dZ6Xqqg yl0W2/R0xdci3Wv7v0xTQadeYWnAXKLLXZ1374TZwcXJUMev73MFHWPbT4x4IHQIrHcf oWq2r4/7pG+7c7oUAktC0+fiL/Xzh5JvF56wjGKUTQChVaum4avFCFOU0QEu80WURosa REDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=sBSrCREw7iV6UUm6KKETVDl0mwpxm3K7fbLURRyVoak=; b=d2+x0q3QmBzRoWPcuvGGQSvK2ijzcAFESjOV3Ah8EcDmu+F7F64Rh0srH+74s8xfow iQjGr9Az+l83bCN6wQnr+yjbR+9XFPR9Jl7G/qRSdvcV6GIyeBF3lIwAKCpWQoVRd1WX LGqEh3wmB5QPzx3EssZKdNHPh7iGLpDd6SxOVIKNHnfvY4wlZjVyi9go1dcVMzFG1FKi qNNx7CvjXcnoycoiUKVY91ki0aHaXQX6m1276PI7+ZAZEUQ24+xfHClCexDg2FhSDEys RvfhoW+urZ1SBnGusutaa4FBkflG1hUS1kyooQCPtw5bjkWpF6vF5USsBvy15k5QqiLF EM4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=VKtE2fya; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t2si3185529eji.602.2020.08.22.04.35.45; Sat, 22 Aug 2020 04:36:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=VKtE2fya; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727956AbgHVLfD (ORCPT + 99 others); Sat, 22 Aug 2020 07:35:03 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:62566 "EHLO mx0b-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727113AbgHVLe7 (ORCPT ); Sat, 22 Aug 2020 07:34:59 -0400 Received: from pps.filterd (m0127361.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 07MBXZBH142775; Sat, 22 Aug 2020 07:34:51 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding; s=pp1; bh=sBSrCREw7iV6UUm6KKETVDl0mwpxm3K7fbLURRyVoak=; b=VKtE2fyatc/RLvKLO7oTuCkUsU90QeLxvF6mFkHmuhk3tyL1UkdK63+EjKiSYmLSep5N dr6Z162gLOxbS0vbscV4R8S4XXqnb+LOZwEp9NC4+NORzW+EUx41ycQfF/PjJAkDuBiy lPOA/i7ejOgsNf4G9zU8DYqyi3HuleDYPfn1C4hTnpyKaxmxX4+QAzU2ArUD0XEFdGYB BQ7ZN9U/u5yQVlu16n84/scCVCTcddltSrKvqZ7oRfq700Bh7IdIXs3qcmttw30GnGKK lz2sltPZ+/Qo2Jz+axXxNdQZAW+W+yBlTe8MCsybGiLK0fiCg3Rksm+wWqySeUM/Q37i Mw== Received: from ppma04ams.nl.ibm.com (63.31.33a9.ip4.static.sl-reverse.com [169.51.49.99]) by mx0a-001b2d01.pphosted.com with ESMTP id 332x6gc4c0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 22 Aug 2020 07:34:51 -0400 Received: from pps.filterd (ppma04ams.nl.ibm.com [127.0.0.1]) by ppma04ams.nl.ibm.com (8.16.0.42/8.16.0.42) with SMTP id 07MBXfpt021892; Sat, 22 Aug 2020 11:34:49 GMT Received: from b06cxnps4075.portsmouth.uk.ibm.com (d06relay12.portsmouth.uk.ibm.com [9.149.109.197]) by ppma04ams.nl.ibm.com with ESMTP id 332utsrar9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 22 Aug 2020 11:34:49 +0000 Received: from d06av21.portsmouth.uk.ibm.com (d06av21.portsmouth.uk.ibm.com [9.149.105.232]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 07MBYl6O27787744 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 22 Aug 2020 11:34:47 GMT Received: from d06av21.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 13F3952052; Sat, 22 Aug 2020 11:34:47 +0000 (GMT) Received: from localhost.localdomain.com (unknown [9.199.33.217]) by d06av21.portsmouth.uk.ibm.com (Postfix) with ESMTP id A35E75204E; Sat, 22 Aug 2020 11:34:45 +0000 (GMT) From: Ritesh Harjani To: linux-ext4@vger.kernel.org Cc: jack@suse.cz, tytso@mit.edu, Dan Williams , Anju T Sudhakar , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Ritesh Harjani Subject: [PATCHv2 1/3] ext4: Refactor ext4_overwrite_io() to take ext4_map_blocks as argument Date: Sat, 22 Aug 2020 17:04:35 +0530 Message-Id: <057a08972f818c035621a9fd3ff870bedcdf5e83.1598094830.git.riteshh@linux.ibm.com> X-Mailer: git-send-email 2.25.4 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.235,18.0.687 definitions=2020-08-22_07:2020-08-21,2020-08-22 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 mlxlogscore=834 clxscore=1015 malwarescore=0 priorityscore=1501 lowpriorityscore=0 phishscore=0 impostorscore=0 suspectscore=1 spamscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2006250000 definitions=main-2008220125 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Refactor ext4_overwrite_io() to take struct ext4_map_blocks as it's function argument with m_lblk and m_len filled from caller There should be no functionality change in this patch. Signed-off-by: Ritesh Harjani --- fs/ext4/file.c | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/fs/ext4/file.c b/fs/ext4/file.c index 2a01e31a032c..84f73ed91af2 100644 --- a/fs/ext4/file.c +++ b/fs/ext4/file.c @@ -188,26 +188,22 @@ ext4_extending_io(struct inode *inode, loff_t offset, size_t len) } /* Is IO overwriting allocated and initialized blocks? */ -static bool ext4_overwrite_io(struct inode *inode, loff_t pos, loff_t len) +static bool ext4_overwrite_io(struct inode *inode, struct ext4_map_blocks *map) { - struct ext4_map_blocks map; unsigned int blkbits = inode->i_blkbits; - int err, blklen; + loff_t end = (map->m_lblk + map->m_len) << blkbits; + int err, blklen = map->m_len; - if (pos + len > i_size_read(inode)) + if (end > i_size_read(inode)) return false; - map.m_lblk = pos >> blkbits; - map.m_len = EXT4_MAX_BLOCKS(len, pos, blkbits); - blklen = map.m_len; - - err = ext4_map_blocks(NULL, inode, &map, 0); + err = ext4_map_blocks(NULL, inode, map, 0); /* * 'err==len' means that all of the blocks have been preallocated, * regardless of whether they have been initialized or not. To exclude * unwritten extents, we need to check m_flags. */ - return err == blklen && (map.m_flags & EXT4_MAP_MAPPED); + return err == blklen && (map->m_flags & EXT4_MAP_MAPPED); } static ssize_t ext4_generic_write_checks(struct kiocb *iocb, @@ -407,6 +403,7 @@ static ssize_t ext4_dio_write_checks(struct kiocb *iocb, struct iov_iter *from, { struct file *file = iocb->ki_filp; struct inode *inode = file_inode(file); + struct ext4_map_blocks map; loff_t offset; size_t count; ssize_t ret; @@ -420,6 +417,9 @@ static ssize_t ext4_dio_write_checks(struct kiocb *iocb, struct iov_iter *from, count = ret; if (ext4_extending_io(inode, offset, count)) *extend = true; + + map.m_lblk = offset >> inode->i_blkbits; + map.m_len = EXT4_MAX_BLOCKS(count, offset, inode->i_blkbits); /* * Determine whether the IO operation will overwrite allocated * and initialized blocks. @@ -427,7 +427,7 @@ static ssize_t ext4_dio_write_checks(struct kiocb *iocb, struct iov_iter *from, * in file_modified(). */ if (*ilock_shared && (!IS_NOSEC(inode) || *extend || - !ext4_overwrite_io(inode, offset, count))) { + !ext4_overwrite_io(inode, &map))) { inode_unlock_shared(inode); *ilock_shared = false; inode_lock(inode); -- 2.25.4