From patchwork Tue Apr 1 12:05:44 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Filipe Manana X-Patchwork-Id: 14034741 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 03499202C34 for ; Tue, 1 Apr 2025 12:05:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743509151; cv=none; b=U0O4Ac3x/vm4benbFq71zOxsHwpR8TM6VcjE8hCxQFZ1iIej701kpXytpkQG0WBVspXv73kAD/cZ19O630H5cNvLUEcbC2VrvMCydvyZ+GZQ6jHTQsd7/ulH6EUuKXd5rFFCiedXFCQxtnum62d2S+Yfta3LptJwZQCYXNil/4s= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743509151; c=relaxed/simple; bh=7LI6uFwYWYntxxhlwUtzuaRXHgbgZK8MiQMY7OaK/XM=; h=From:To:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=mxKdJMMpdNwPdfXsP/GpR80oWyLy0joeS9xiiHYW9/ytbM0j9FFY9125PZrslFW/rFKffyJoIKWT3NE+ROEd2O1pxFGHCyLouZog8vEhYMsu6Ymk+kJD699O1sRm6bWHuBMjZGTSz4E/i8CydCAGf6xDccG9/MQEJudMG3PlbMs= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=k92t2HKt; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="k92t2HKt" Received: by smtp.kernel.org (Postfix) with ESMTPSA id E41F0C4CEE9 for ; Tue, 1 Apr 2025 12:05:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1743509150; bh=7LI6uFwYWYntxxhlwUtzuaRXHgbgZK8MiQMY7OaK/XM=; h=From:To:Subject:Date:In-Reply-To:References:From; b=k92t2HKtDtVPTDFbUCLKt+hhoEAfjMN3BonbyX7tdTmkJSgNvBHO92spSVIvsKn/T UwnoWogxOQV495SaA0ieKVOovB8Z6QLrQKJHJUyINhNFfd42XgRqEiWzPQJbseRGOh FW4c4zphCaI9RfUv7oa7IEO7vrAkfL746vnZoA/ynOG6Ozy/p537YTdqikUA6Zjjtb mxdsD9j33J2+y3KgQyJXAgzxrGx13w0HZyJpp7m9+ap29iN8YVG0kotD2Ye3TyRRXf n+JFdahM5YDzU7h5T0DWX6Ao+hZVqoFgo1UET2KDh8ASGrmR2yptVuf2OsRFDKRwpP +j+v/bV3Yl7jA== From: fdmanana@kernel.org To: linux-btrfs@vger.kernel.org Subject: [PATCH 1/3] btrfs: use clear_extent_bit() at try_release_extent_state() Date: Tue, 1 Apr 2025 13:05:44 +0100 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-btrfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Filipe Manana Instead of using __clear_extent_bit() we can use clear_extent_bit() since we pass a NULL value for the changeset argument. Signed-off-by: Filipe Manana --- fs/btrfs/extent_io.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/btrfs/extent_io.c b/fs/btrfs/extent_io.c index 19f21540475d..50b74531b745 100644 --- a/fs/btrfs/extent_io.c +++ b/fs/btrfs/extent_io.c @@ -2651,7 +2651,7 @@ static bool try_release_extent_state(struct extent_io_tree *tree, * nodatasum, delalloc new and finishing ordered bits. The delalloc new * bit will be cleared by ordered extent completion. */ - ret2 = __clear_extent_bit(tree, start, end, clear_bits, &cached_state, NULL); + ret2 = clear_extent_bit(tree, start, end, clear_bits, &cached_state); /* * If clear_extent_bit failed for enomem reasons, we can't allow the * release to continue. From patchwork Tue Apr 1 12:05:45 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Filipe Manana X-Patchwork-Id: 14034742 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A6F83202F61 for ; Tue, 1 Apr 2025 12:05:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743509151; cv=none; b=eD2ydZ17I6nb8Ol2fofF3GsP6nH5j2UaflgPjtR3gfxHGfg6Nf0dGQtqvXG/OpnFDpf93TG8sV8J/DuBni4wwc+mLI3sgeqMtiq5kr//WJsf41UOYV/9JrpaDnYfp8W9mseFfkux4BjMysriU57zOjtf9L6+F9uYfk+lvLzPTO4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743509151; c=relaxed/simple; bh=7wbYbugg6ZYVpEkA4oDYqRdd9oPIjzp6f2iMz/klY+A=; h=From:To:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=QqjwLPLI1OuXCbXfy8Iy6TL3pkmQg0R0v3f2VHCN8OHzJ+iZnznT8AyFUCEY31hVHXJCHiQQzW6TDJPFzGNHLorTZEbEoya8g8ckqyRhadvNVMMxgGvVx4sUVV+2ZWvAWwexSh+ixl7mnh7ijbfSbxs4+kg2eHj4Ow6JQn+jLPE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=cZfL4KNg; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="cZfL4KNg" Received: by smtp.kernel.org (Postfix) with ESMTPSA id EBE6CC4CEE5 for ; Tue, 1 Apr 2025 12:05:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1743509151; bh=7wbYbugg6ZYVpEkA4oDYqRdd9oPIjzp6f2iMz/klY+A=; h=From:To:Subject:Date:In-Reply-To:References:From; b=cZfL4KNg4UB7jbBnJPmbBZ1sJFKDerFeaZeMsgUOr8HYVWfokDuQMBU1y4UvTXj3o 7dEAIKKA19b0QqTkUU/RVLinwTbBRVcKlMs/rdd1IY0NIxHYsG++lz5SjaFTICtyHM ryhL/HFllQCin0iRu++UT234m7FXNfprJ/adN2gcBY5YBPGeY8yWgObEb9ifgq5TZr 6rK9U+cSSUYuYB6b/Q+0dfdl2zyvjuJE732g2RdNCHfXkR2k01Wm/wnGrfTVmn7GnS O+9Ske3/U3UyV8VRTXvv+6UJcET4LcXFanC+Lm6PwGF3IMRcdidkLsqRch/iDENBR1 B1M1GkQQSkmCA== From: fdmanana@kernel.org To: linux-btrfs@vger.kernel.org Subject: [PATCH 2/3] btrfs: use clear_extent_bits() at chunk_map_device_clear_bits() Date: Tue, 1 Apr 2025 13:05:45 +0100 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-btrfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Filipe Manana Instead of using __clear_extent_bit() we can use clear_extent_bits() since we pass a NULL value for the cached and changeset arguments. Signed-off-by: Filipe Manana --- fs/btrfs/volumes.c | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/fs/btrfs/volumes.c b/fs/btrfs/volumes.c index c8c21c55be53..784d5a15ef29 100644 --- a/fs/btrfs/volumes.c +++ b/fs/btrfs/volumes.c @@ -5508,10 +5508,9 @@ static void chunk_map_device_clear_bits(struct btrfs_chunk_map *map, unsigned in struct btrfs_io_stripe *stripe = &map->stripes[i]; struct btrfs_device *device = stripe->dev; - __clear_extent_bit(&device->alloc_state, stripe->physical, - stripe->physical + map->stripe_size - 1, - bits | EXTENT_NOWAIT, - NULL, NULL); + clear_extent_bits(&device->alloc_state, stripe->physical, + stripe->physical + map->stripe_size - 1, + bits | EXTENT_NOWAIT); } } From patchwork Tue Apr 1 12:05:46 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Filipe Manana X-Patchwork-Id: 14034743 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0D4F81FAC50 for ; Tue, 1 Apr 2025 12:05:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743509154; cv=none; b=Xoc3MIQ7nerpNCnJqJ2nToPfnAIsN2+sRy3/O5XPpZhPqli8cJShsEpcoYyq/zJ9XxyLKBVoNxKFkdbLSsqdVfA/CniOn6uZ47j3Y95Xtb/tkQqOZhW4K92bTs5OdTSWLzgGy+ZCkQPqZMHNkJJQMnD9wiB+Q0zUWH8HvAXdRAo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1743509154; c=relaxed/simple; bh=29hF5xAeU8i7ZE8Qko3WEFeyVFWmmB+JcUq+PIaLwKQ=; h=From:To:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=BPJ9F7fG1I9dpd5GPUj77O/Y1EU9YVBZqdteTnwWwBmDEc9nhXjGObFbCzcCT1O5EY8ruiRpc7dSEwbU7RjRiWH3srlHL/hvyoGJgiRYkhe9oscQcRFBx+3qPPBSPkQ2Vvu6oPdPhL07eKJ27BoVLsuz1EfA70FzROyoJaAISCg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=qhG06q+9; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="qhG06q+9" Received: by smtp.kernel.org (Postfix) with ESMTPSA id F1AB3C4CEE4 for ; Tue, 1 Apr 2025 12:05:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1743509152; bh=29hF5xAeU8i7ZE8Qko3WEFeyVFWmmB+JcUq+PIaLwKQ=; h=From:To:Subject:Date:In-Reply-To:References:From; b=qhG06q+9gdKa3aD/Szm3r3litiBFbbsszzudLGeqstIPVUj91RPnGAUJL7x0rJf9+ mzNTFJgTa14nK/0Td/ymEzeLiH1X7Pty2bDftqR3PAaY+S58PNPTDbDQOgUB/ARA5W Sk0l/7frDKZ/h1GsRJfNpkBWihVu6NGTdL6ziexAqIlEGg/PR9/ps/HX5bLcKxe1ul r1WxCHIRnGDWnnVwle4EfWCLFh8amv/Nwigr8Ul41+osf4LrUeXDji0iTZMXPMMP3J tT0/dnU9GLgNBrM1md/vclf+uCjf6u9J5bUcS3Hq6rkGqGFzl3t+GQoDNaJWdetDJw Boj3ZB3lVM0gQ== From: fdmanana@kernel.org To: linux-btrfs@vger.kernel.org Subject: [PATCH 3/3] btrfs: simplify last record detection at test_range_bit_exists() Date: Tue, 1 Apr 2025 13:05:46 +0100 Message-Id: <2037fb2e4ce4b289e5b5a454f8ada8537f0265be.1743508707.git.fdmanana@suse.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-btrfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Filipe Manana Instead of keeping track of the minimum start offset of the next record and detecting overflow everytime we update that offset to be the sum of current record's end offset plus one, we can simply exit when the current record ends at or beyond our end offset and forget about about updating the start offset on every iteration and testing for it at the top of the loop. This makes both the source code and assembly code simpler, more efficient and shorter (reducing the object text size). Also remove the pointless initializion to NULL of the state variable, as we don't use it before the first assignment to it. This may help avoid some warnings with clang tools such as the one reported/fixed by commit 966de47ff0c9 ("btrfs: remove redundant initialization of variables in log_new_ancestors"). Signed-off-by: Filipe Manana --- fs/btrfs/extent-io-tree.c | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/fs/btrfs/extent-io-tree.c b/fs/btrfs/extent-io-tree.c index 7ae24a533404..293cb354259d 100644 --- a/fs/btrfs/extent-io-tree.c +++ b/fs/btrfs/extent-io-tree.c @@ -1726,14 +1726,14 @@ u64 count_range_bits(struct extent_io_tree *tree, */ bool test_range_bit_exists(struct extent_io_tree *tree, u64 start, u64 end, u32 bit) { - struct extent_state *state = NULL; + struct extent_state *state; bool bitset = false; ASSERT(is_power_of_2(bit)); spin_lock(&tree->lock); state = tree_search(tree, start); - while (state && start <= end) { + while (state) { if (state->start > end) break; @@ -1742,9 +1742,7 @@ bool test_range_bit_exists(struct extent_io_tree *tree, u64 start, u64 end, u32 break; } - /* If state->end is (u64)-1, start will overflow to 0 */ - start = state->end + 1; - if (start > end || start == 0) + if (state->end >= end) break; state = next_state(state); }