Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp242203pxf; Wed, 10 Mar 2021 05:29:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJxhs/eENYRWciHLwqs/tyD8YWmHvx1oz/abyIRWlaltEMgwKTl1GWzv9VLxWCqLjyzgk4eL X-Received: by 2002:a17:907:162b:: with SMTP id hb43mr3727815ejc.41.1615382950326; Wed, 10 Mar 2021 05:29:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615382950; cv=none; d=google.com; s=arc-20160816; b=YxWc3nNaop/zpKyCPhatiQYRX2fN9RV8RUUSt+lf83NfEEEhafcOnpp8Gr1ltoRDp3 AvqIWJUgwGjdRp3HZvXg4qXuwVZqp8RFpfnhir4Tnf4pKEXw/io7oHRCEZlYQ8lAwddU C8XzsjiYx0/tD3gQ7g0rRGL1HF2FQ7R23zaYPuH+JRaUyBueKkWfcHENQ1IZ+gTTWR0+ 7L+7TYGxoVKopjO/8Jtk4P+2LniPvu8AODT475LZTAIz5KltiePr/a6wD2xCV1a3ufzf KU9KsvJq1ltB7CuGtUlXflpRFXqD7GTuLFFvIUAXTUoCaHM7w1tooRHT3Mwb9+KQrs/s eGEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=q4SQNqZJ5JYSJ1RfuiyHxckTKnx9Jq3Gqc8p6Zg1xBk=; b=MI+k8Eqkza7DU831fOJzR6OwlLyGQsgbBVlkMk13s5+032rKAJR9pi1/ArAwqSQdID oT8IZCAwdI2EYGMi5qWBUxYaHxa08AEiJ+64x8m4NhERBXhaPgdBzBt45anNDRwvxtGn 9zkFO2N5gcPWr6uGU8sXA7ZDtkJc66AXriT7NK813yFKaZPdrvag2M2OXqbqXI0vLj/2 9sEWLj+1T0irsw+8UK9A/AfFtlmBe+n9BOmiWsrgLm+In1t4c/h8Zys4yinpTtUJLcRI TxGqHX7kGwgPEYDBuq+RkWvPOVj56Dsb7jQFlqYIa5ZM0XD8n03V3C3XuT2lQZ0s/rQb rILg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=FEMKDTqf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m19si11667220eds.451.2021.03.10.05.28.47; Wed, 10 Mar 2021 05:29:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=FEMKDTqf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233957AbhCJN1y (ORCPT + 99 others); Wed, 10 Mar 2021 08:27:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:46646 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230341AbhCJNZG (ORCPT ); Wed, 10 Mar 2021 08:25:06 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8D5EC64FF3; Wed, 10 Mar 2021 13:25:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1615382705; bh=RVbWkd5wmIFp6TpqM+zM9VZdZVT/rO/PtHbttAA3IR4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FEMKDTqfc+1fwQN7ZISA6WI1F9UgWgxulljyDvDenlifnHhEF7/n3EFJh8HE1crbu tM084EcAC9oHSkyEiMTVUQMA+oZAtOKcXlHxhTgRGvD4RpoIyAiKEL2WtAepPZCDKc MBrKE0/S8RDICSEtZdEfwTNGYUZPSsWwUsCehiAo= From: gregkh@linuxfoundation.org To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ira Weiny , David Sterba Subject: [PATCH 4.14 02/20] btrfs: fix raid6 qstripe kmap Date: Wed, 10 Mar 2021 14:24:39 +0100 Message-Id: <20210310132320.590212468@linuxfoundation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210310132320.512307035@linuxfoundation.org> References: <20210310132320.512307035@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman From: Ira Weiny commit d70cef0d46729808dc53f145372c02b145c92604 upstream. When a qstripe is required an extra page is allocated and mapped. There were 3 problems: 1) There is no corresponding call of kunmap() for the qstripe page. 2) There is no reason to map the qstripe page more than once if the number of bits set in rbio->dbitmap is greater than one. 3) There is no reason to map the parity page and unmap it each time through the loop. The page memory can continue to be reused with a single mapping on each iteration by raid6_call.gen_syndrome() without remapping. So map the page for the duration of the loop. Similarly, improve the algorithm by mapping the parity page just 1 time. Fixes: 5a6ac9eacb49 ("Btrfs, raid56: support parity scrub on raid56") CC: stable@vger.kernel.org # 4.4.x: c17af96554a8: btrfs: raid56: simplify tracking of Q stripe presence CC: stable@vger.kernel.org # 4.4.x Signed-off-by: Ira Weiny Reviewed-by: David Sterba Signed-off-by: David Sterba Signed-off-by: Greg Kroah-Hartman --- fs/btrfs/raid56.c | 21 ++++++++++----------- 1 file changed, 10 insertions(+), 11 deletions(-) --- a/fs/btrfs/raid56.c +++ b/fs/btrfs/raid56.c @@ -2360,16 +2360,21 @@ static noinline void finish_parity_scrub SetPageUptodate(p_page); if (has_qstripe) { + /* RAID6, allocate and map temp space for the Q stripe */ q_page = alloc_page(GFP_NOFS | __GFP_HIGHMEM); if (!q_page) { __free_page(p_page); goto cleanup; } SetPageUptodate(q_page); + pointers[rbio->real_stripes - 1] = kmap(q_page); } atomic_set(&rbio->error, 0); + /* Map the parity stripe just once */ + pointers[nr_data] = kmap(p_page); + for_each_set_bit(pagenr, rbio->dbitmap, rbio->stripe_npages) { struct page *p; void *parity; @@ -2379,16 +2384,8 @@ static noinline void finish_parity_scrub pointers[stripe] = kmap(p); } - /* then add the parity stripe */ - pointers[stripe++] = kmap(p_page); - if (has_qstripe) { - /* - * raid6, add the qstripe and call the - * library function to fill in our p/q - */ - pointers[stripe++] = kmap(q_page); - + /* RAID6, call the library function to fill in our P/Q */ raid6_call.gen_syndrome(rbio->real_stripes, PAGE_SIZE, pointers); } else { @@ -2409,12 +2406,14 @@ static noinline void finish_parity_scrub for (stripe = 0; stripe < nr_data; stripe++) kunmap(page_in_rbio(rbio, stripe, pagenr, 0)); - kunmap(p_page); } + kunmap(p_page); __free_page(p_page); - if (q_page) + if (q_page) { + kunmap(q_page); __free_page(q_page); + } writeback: /*