Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp19522pxb; Wed, 30 Mar 2022 21:40:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwGtNRjEx/vwzq08CO/YikBAJsiA6k0lkRMpKBEmyIKdbZoif2K+perWUHub52fm2cv5VaW X-Received: by 2002:a17:902:708c:b0:156:1aa7:e8d5 with SMTP id z12-20020a170902708c00b001561aa7e8d5mr3461940plk.11.1648701647263; Wed, 30 Mar 2022 21:40:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648701647; cv=none; d=google.com; s=arc-20160816; b=NRqO0GEMKq3TpZpEsOahjCac1+VLP2RdkvTs3Q2jENqO8zzwEtkScSsbV16qEXzhFW Qyr5cYbblBrnCKzXtlFfjujMfdDN3/88L5YMbIYZxjiwGRVs84ZoLSaqgY1PiUEDC5lp +xN3oALq3QYPo/QYqihOVqBqExFjsMJCWDj65ZqgehuYeRiavsnnN/nPCYtHKGQjKO9s 9OwDnVP0hs/m3jvTl4iOGfUB1OzTnlIv5zSGRWaaLchtbp08THBqrx3oRfBY8aYl/KhV BouZcKYTA7YqNS27lFObolR7A/xaskEFvHp+cFLyitkaobFvkLiAjdZirCJtDpQT6hKk xvkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=aPI4O6rZekOwwzDJk6521jDM98U1L9YNufQc+1VaZUU=; b=LaDT/tvvEy5w2XNM2hBLxsqJyBVx+3Iqqa+GF9S/jn+SkIfMX3rkbn88WXNwqB35iA rX/96OjYsyfu/TemUi/Hf+PcQWTj9O10a6Ptd22kFFCQufL9mjnRIAODtAswTC8xHjno t5pevs8lyGSAzc6qIvTSRsaEalbjXVAZjkdcvm2GMTl4MdUd/MEUK+nInQOrPmvQS4pm 9LuY3ZJVjARO9LzGrTZLW4TETFIx63vMcX3wdfRaRZ7kv896J939bVaoM6rVYieeBFZ6 P+Fol/lWDgCq4lDaviIHc2PUmBlAr30LQRftee+kN9iCf2GDg9cIDTvE1J+vGDotaXPp 4uCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (bad format) header.i=@dorminy.me header.s=mail header.b=eW3U6GA4; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=dorminy.me Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id h18-20020a170902f71200b00153b32092adsi21934142plo.158.2022.03.30.21.40.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 30 Mar 2022 21:40:47 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=neutral (bad format) header.i=@dorminy.me header.s=mail header.b=eW3U6GA4; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=dorminy.me Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8C956325; Wed, 30 Mar 2022 20:34:23 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350909AbiC3UNY (ORCPT + 99 others); Wed, 30 Mar 2022 16:13:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231761AbiC3UNP (ORCPT ); Wed, 30 Mar 2022 16:13:15 -0400 Received: from box.fidei.email (box.fidei.email [IPv6:2605:2700:0:2:a800:ff:feba:dc44]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 226C26542A; Wed, 30 Mar 2022 13:11:30 -0700 (PDT) Received: from authenticated-user (box.fidei.email [71.19.144.250]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by box.fidei.email (Postfix) with ESMTPSA id 9F5038050E; Wed, 30 Mar 2022 16:11:29 -0400 (EDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=dorminy.me; s=mail; t=1648671089; bh=U5dIQevY506VUTcHlKOqqtmto/0GP4VFy9OThN9O8gM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eW3U6GA4MKB5nVVfcawq/YhI8dpwuxKYCD4LS8h0yfyP5l38+hWLGEksHNn9v025q Dk/bp+vEmqDQWJYfUtZSMYXow25XpdIJyYeLCyp8wXJOvzj61aQKcr0I9LDkSH/eDE baBQLHh0qU3USpFjqTr8EFdabu9NHTTaujwKTSpYrYPQevOPcq/8LWOKZw8aVspt4A CuS3jhqkmrwiFXoTZzuJv12nsnqLebYyM4zRvJnP4KXDgGcfUfrW1Skipq2cxtbiG1 Wx/9TLtv6pVj9axFId77+fpykxsd56nLD38OERCSdfzPyM+1Cco4ZWh46VzicoDqev T3fE+SobYW6ng== From: Sweet Tea Dorminy To: Chris Mason , Josef Bacik , David Sterba , Nick Terrell , linux-kernel@vger.kernel.org, linux-btrfs@vger.kernel.org, kernel-team@fb.com Cc: Sweet Tea Dorminy , Nikolay Borisov Subject: [PATCH v3 2/2] btrfs: allocate page arrays using bulk page allocator Date: Wed, 30 Mar 2022 16:11:23 -0400 Message-Id: In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org While calling alloc_page() in a loop is an effective way to populate an array of pages, the kernel provides a method to allocate pages in bulk. alloc_pages_bulk_array() populates the NULL slots in a page array, trying to grab more than one page at a time. Unfortunately, it doesn't guarantee allocating all slots in the array, but it's easy to call it in a loop and return an error if no progress occurs. Similar code can be found in xfs/xfs_buf.c:xfs_buf_alloc_pages(). Signed-off-by: Sweet Tea Dorminy Reviewed-by: Nikolay Borisov --- Changes in v3: - Added a newline after variable declaration Changes in v2: - Moved from ctree.c to extent_io.c --- fs/btrfs/extent_io.c | 24 +++++++++++++++--------- 1 file changed, 15 insertions(+), 9 deletions(-) diff --git a/fs/btrfs/extent_io.c b/fs/btrfs/extent_io.c index ab4c1c4d1b59..b268e47aa2b7 100644 --- a/fs/btrfs/extent_io.c +++ b/fs/btrfs/extent_io.c @@ -3144,19 +3144,25 @@ static void end_bio_extent_readpage(struct bio *bio) */ int btrfs_alloc_page_array(unsigned long nr_pages, struct page **page_array) { - int i; + long allocated = 0; + + for (;;) { + long last = allocated; - for (i = 0; i < nr_pages; i++) { - struct page *page; + allocated = alloc_pages_bulk_array(GFP_NOFS, nr_pages, + page_array); + if (allocated == nr_pages) + return 0; - if (page_array[i]) + if (allocated != last) continue; - page = alloc_page(GFP_NOFS); - if (!page) - return -ENOMEM; - page_array[i] = page; + /* + * During this iteration, no page could be allocated, even + * though alloc_pages_bulk_array() falls back to alloc_page() + * if it could not bulk-allocate. So we must be out of memory. + */ + return -ENOMEM; } - return 0; } /* -- 2.35.1