Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp568367imu; Tue, 27 Nov 2018 17:29:05 -0800 (PST) X-Google-Smtp-Source: AFSGD/W7lUrMhPkzGMQBg2IBTp+stDQ2YaIBQMcKBZoaaQQiMRLWgBd/SMd5yYg0OluO1aPXeyrx X-Received: by 2002:a63:eb52:: with SMTP id b18mr30666069pgk.213.1543368545305; Tue, 27 Nov 2018 17:29:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543368545; cv=none; d=google.com; s=arc-20160816; b=KxW9keo7H38I5rLQ7UJE5sEy/vJwWlkXjq+02C14sgQw0UwXjm8uGrBVwUbb8FhdN6 dtr4p3CNvKQt+UjuWpIamFnnagevuYt+b41RKzCoH//dFjZWuvIr64emNBQijBMFuWOI 6ZUlLIM4lqHF83ODZKAqd0H2SVxfjV/rpDuPwPOjl5omHBVL08yP+Y2iT28Mki4lYjFo qeNSweGq7jUGYKLnLv/gcSHZ+9PNZjbT0C9i3g+AbVhNG9n7K6WyQjyStU5Fyp21jWjM IQg6V6luLqJ5XoX0hqt5R0ukgLKEYV6MUFEDQ0KnzLSOZVzplkYcui8gIJFN1YPUgfmc RmHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=BOv65hAkBdT1gExw42xC0oJUtAPi2by8XxS+QwakLgc=; b=WBmQRJlKg7IdkJw5QEbXHi5C6jH/FITPbwMi6zQ6Hw+N8iQf+Y1Qzf0ZY/952sKRiy lpRlrjjQn8Jv2zA49XzOeIF42cQDW+z5mpR/hrBCTRmHHhNqyIId/7Mfuc/sSXcgnDq4 9MgC+ANz+guEC3l6m9PT79SjSqj3Rw+BTFvBZ3a4j3h6tmFUOcEbSw8oWM2sWWpalweL LhRl2a6cVQDZTcz3i/f5oN98ItfPqgf4pYsXEg4S65eudtIoE6E6x0GETjjDzMdluWmV 7iIRqtkYCcDzlHkExxtP1FAy7Xc0O9e6urxLEjqlKP4C5/cKTPIhB2j6XSvlTpb+g74L nHCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q32si5612055pgm.410.2018.11.27.17.28.49; Tue, 27 Nov 2018 17:29:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727160AbeK1M00 (ORCPT + 99 others); Wed, 28 Nov 2018 07:26:26 -0500 Received: from mx1.redhat.com ([209.132.183.28]:47080 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726567AbeK1M00 (ORCPT ); Wed, 28 Nov 2018 07:26:26 -0500 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 0831858E39; Wed, 28 Nov 2018 01:26:39 +0000 (UTC) Received: from ming.t460p (ovpn-8-25.pek2.redhat.com [10.72.8.25]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 560AF5C1B2; Wed, 28 Nov 2018 01:26:31 +0000 (UTC) Date: Wed, 28 Nov 2018 09:26:26 +0800 From: Ming Lei To: Evan Green Cc: Jens Axboe , Gwendal Grignou , Alexis Savery , linux-block@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/2] loop: Better discard support for block devices Message-ID: <20181128012624.GB11128@ming.t460p> References: <20181030230624.61834-1-evgreen@chromium.org> <20181030230624.61834-3-evgreen@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181030230624.61834-3-evgreen@chromium.org> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Wed, 28 Nov 2018 01:26:39 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 30, 2018 at 04:06:24PM -0700, Evan Green wrote: > If the backing device for a loop device is a block device, > then mirror the discard properties of the underlying block > device into the loop device. While in there, differentiate > between REQ_OP_DISCARD and REQ_OP_WRITE_ZEROES, which are > different for block devices, but which the loop device had > just been lumping together. > > Signed-off-by: Evan Green > --- > > drivers/block/loop.c | 61 +++++++++++++++++++++++++++++++++++----------------- > 1 file changed, 41 insertions(+), 20 deletions(-) > > diff --git a/drivers/block/loop.c b/drivers/block/loop.c > index 28990fc94841a..176e65101c4ef 100644 > --- a/drivers/block/loop.c > +++ b/drivers/block/loop.c > @@ -417,19 +417,14 @@ static int lo_read_transfer(struct loop_device *lo, struct request *rq, > return ret; > } > > -static int lo_discard(struct loop_device *lo, struct request *rq, loff_t pos) > +static int lo_discard(struct loop_device *lo, struct request *rq, > + int mode, loff_t pos) > { > - /* > - * We use punch hole to reclaim the free space used by the > - * image a.k.a. discard. However we do not support discard if > - * encryption is enabled, because it may give an attacker > - * useful information. > - */ > struct file *file = lo->lo_backing_file; > - int mode = FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE; > + struct request_queue *q = lo->lo_queue; > int ret; > > - if ((!file->f_op->fallocate) || lo->lo_encrypt_key_size) { > + if (!blk_queue_discard(q)) { > ret = -EOPNOTSUPP; > goto out; > } > @@ -603,8 +598,13 @@ static int do_req_filebacked(struct loop_device *lo, struct request *rq) > case REQ_OP_FLUSH: > return lo_req_flush(lo, rq); > case REQ_OP_DISCARD: > + return lo_discard(lo, rq, > + FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, pos); > + > case REQ_OP_WRITE_ZEROES: > - return lo_discard(lo, rq, pos); > + return lo_discard(lo, rq, > + FALLOC_FL_ZERO_RANGE | FALLOC_FL_KEEP_SIZE, pos); > + > case REQ_OP_WRITE: > if (lo->transfer) > return lo_write_transfer(lo, rq, pos); > @@ -859,6 +859,25 @@ static void loop_config_discard(struct loop_device *lo) > struct file *file = lo->lo_backing_file; > struct inode *inode = file->f_mapping->host; > struct request_queue *q = lo->lo_queue; > + struct request_queue *backingq; > + > + /* > + * If the backing device is a block device, mirror its discard > + * capabilities. > + */ > + if (S_ISBLK(inode->i_mode)) { > + backingq = bdev_get_queue(inode->i_bdev); > + blk_queue_max_discard_sectors(q, > + backingq->limits.max_discard_sectors); > + > + blk_queue_max_write_zeroes_sectors(q, > + backingq->limits.max_write_zeroes_sectors); > + > + q->limits.discard_granularity = > + backingq->limits.discard_granularity; > + > + q->limits.discard_alignment = > + backingq->limits.discard_alignment; I think it isn't necessary to mirror backing queue's discard/write_zeros capabilities, given either fs of the underlying queue can deal with well. > > /* > * We use punch hole to reclaim the free space used by the > @@ -866,22 +885,24 @@ static void loop_config_discard(struct loop_device *lo) > * encryption is enabled, because it may give an attacker > * useful information. > */ > - if ((!file->f_op->fallocate) || > - lo->lo_encrypt_key_size) { > + } else if ((!file->f_op->fallocate) || lo->lo_encrypt_key_size) { > q->limits.discard_granularity = 0; > q->limits.discard_alignment = 0; > blk_queue_max_discard_sectors(q, 0); > blk_queue_max_write_zeroes_sectors(q, 0); > - blk_queue_flag_clear(QUEUE_FLAG_DISCARD, q); > - return; > - } > > - q->limits.discard_granularity = inode->i_sb->s_blocksize; > - q->limits.discard_alignment = 0; > + } else { > + q->limits.discard_granularity = inode->i_sb->s_blocksize; > + q->limits.discard_alignment = 0; > + > + blk_queue_max_discard_sectors(q, UINT_MAX >> 9); > + blk_queue_max_write_zeroes_sectors(q, UINT_MAX >> 9); > + } > > - blk_queue_max_discard_sectors(q, UINT_MAX >> 9); > - blk_queue_max_write_zeroes_sectors(q, UINT_MAX >> 9); > - blk_queue_flag_set(QUEUE_FLAG_DISCARD, q); > + if (q->limits.max_discard_sectors || q->limits.max_write_zeroes_sectors) > + blk_queue_flag_set(QUEUE_FLAG_DISCARD, q); > + else > + blk_queue_flag_clear(QUEUE_FLAG_DISCARD, q); > } Looks it should work just by mirroring backing queue's discard capability to loop queue in case that the loop is backed by block device, doesn't it? Meantime the unified discard limits & write_zeros limits can be kept. thanks, Ming