Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp3208324rdb; Wed, 13 Sep 2023 05:39:44 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGdX18Zb6gpQO+rxsvLDF6MzNfYXYY8QZ+Y4twPlev8InyYEVno8zr+v4S2/yWNHNkxJPrw X-Received: by 2002:a17:903:245:b0:1c3:6e38:3943 with SMTP id j5-20020a170903024500b001c36e383943mr2994679plh.56.1694608783903; Wed, 13 Sep 2023 05:39:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694608783; cv=none; d=google.com; s=arc-20160816; b=tXYg2qRSfNGfalTLZC58rVWjrlclRKQ50vuuZOeGOwDgor9zM2QL7wJRysaLFX4oLZ w6izLkIprYEfBEIL9AZ1fGtMvDoC9kj6czlBdUDqnbM/43tTdbUNVGy4jenFgQtnB2Lz +DYqKYoQQQ86GWUuimS8GkGzNmvVAOVdWukk9zjzcEBskDEvEbsxJvyfdN+P2m7l/hHs B5hmuwxACWS9dDUXi8CDEn1ooGl+RCTmFLldirPK9WKvbZyLSvdn3IGumUuzcllpDK3f VF1xuvnTtQmAC5xE8xyyY/z/U/HBIiURgiuuI/0rrgTOTBl5HA8dbrJM76BCjQs0KsCW n0/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:reply-to:message-id:subject:cc:to:from:date :dkim-signature:dkim-signature; bh=rFYjl9vMRgwoXQKzN24oWu5yhmpD/3KHXebJwTJgl+4=; fh=qGRpR2wmuAnt6ln+qRJR0DHzKnQGrV7OLrCPT1OfHE0=; b=UgqCbWETRZqSrjMJPkg9s9jNl2A0wn1I1sehtbapqbYTOT/iQIdvccMG20ImqFfm5u FiEjXOHJeGM06dyWhlT9S3Pi6NnwLdULyc4TRdzgTTRP1Kw5cM4pKAEZC4jkdCkb14js R3QUrgRtyL7SfV4BuvSB2MUGQYgUSqCwso4eBv7q86WseC6wV8Wyg//aU023BANKM2um wAj+SmFcZz8vzPUECT38fv/jiQkq4+CbHVAtHXILixiLGfpomUo7ZVEgLz2GwfAqLP6P 4AFkyWb7IUHZE8XRgGa4hQSGCKC0KOzduIGHMa5MUPwLkL9BahRSxSuoA2dTbfYTy4yu rHZA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=lDL6mNHO; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id ba12-20020a170902720c00b001b8c6890612si9815572plb.594.2023.09.13.05.39.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Sep 2023 05:39:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=lDL6mNHO; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 68BD58095D85; Tue, 12 Sep 2023 13:49:24 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236439AbjILUtP (ORCPT + 99 others); Tue, 12 Sep 2023 16:49:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54964 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233149AbjILUtO (ORCPT ); Tue, 12 Sep 2023 16:49:14 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [IPv6:2001:67c:2178:6::1d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AC84DE64; Tue, 12 Sep 2023 13:49:09 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 692121F889; Tue, 12 Sep 2023 20:49:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1694551748; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=rFYjl9vMRgwoXQKzN24oWu5yhmpD/3KHXebJwTJgl+4=; b=lDL6mNHOMujGGoPPZpJbHQr+9Lcq0a8kN56a892jTay1QVdA2ki6v/GMS8MjP5VBWff5cZ ktt18n6h7Qabi+NgWDfxeWrouLDpkYUO/Xyns5noxXN84ssG4ENKDEnrqpue63Rr0lJU+N IIOHCw5umZqpr5mV7ewuXB6nCvvJLvs= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1694551748; h=from:from:reply-to:reply-to:date:date:message-id:message-id:to:to: cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=rFYjl9vMRgwoXQKzN24oWu5yhmpD/3KHXebJwTJgl+4=; b=hLAx/JTNFNWFWN2IwDGrJsfREJzvcUpa8GV4fnDcZHpaCs9LDzf12xnsEOyQ3P/QqLu7HP 0sjvm+0oNkLvP0AQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 1612B139DB; Tue, 12 Sep 2023 20:49:08 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id 0+7FBMTOAGX8BgAAMHmgww (envelope-from ); Tue, 12 Sep 2023 20:49:08 +0000 Date: Tue, 12 Sep 2023 22:49:06 +0200 From: David Sterba To: Johannes Thumshirn Cc: Chris Mason , Josef Bacik , David Sterba , Christoph Hellwig , Naohiro Aota , Qu Wenruo , Damien Le Moal , linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v8 07/11] btrfs: zoned: allow zoned RAID Message-ID: <20230912204906.GH20408@twin.jikos.cz> Reply-To: dsterba@suse.cz References: <20230911-raid-stripe-tree-v8-0-647676fa852c@wdc.com> <20230911-raid-stripe-tree-v8-7-647676fa852c@wdc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230911-raid-stripe-tree-v8-7-647676fa852c@wdc.com> User-Agent: Mutt/1.5.23.1-rc1 (2014-03-12) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Tue, 12 Sep 2023 13:49:24 -0700 (PDT) X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email On Mon, Sep 11, 2023 at 05:52:08AM -0700, Johannes Thumshirn wrote: > When we have a raid-stripe-tree, we can do RAID0/1/10 on zoned devices for > data block-groups. For meta-data block-groups, we don't actually need > anything special, as all meta-data I/O is protected by the > btrfs_zoned_meta_io_lock() already. > > Signed-off-by: Johannes Thumshirn > --- > fs/btrfs/raid-stripe-tree.h | 7 ++- > fs/btrfs/volumes.c | 2 + > fs/btrfs/zoned.c | 113 +++++++++++++++++++++++++++++++++++++++++++- > 3 files changed, 119 insertions(+), 3 deletions(-) > > diff --git a/fs/btrfs/raid-stripe-tree.h b/fs/btrfs/raid-stripe-tree.h > index 40aa553ae8aa..30c7d5981890 100644 > --- a/fs/btrfs/raid-stripe-tree.h > +++ b/fs/btrfs/raid-stripe-tree.h > @@ -8,6 +8,11 @@ > > #include "disk-io.h" > > +#define BTRFS_RST_SUPP_BLOCK_GROUP_MASK (BTRFS_BLOCK_GROUP_DUP |\ > + BTRFS_BLOCK_GROUP_RAID1_MASK |\ > + BTRFS_BLOCK_GROUP_RAID0 |\ > + BTRFS_BLOCK_GROUP_RAID10) > + > struct btrfs_io_context; > struct btrfs_io_stripe; > > @@ -32,7 +37,7 @@ static inline bool btrfs_need_stripe_tree_update(struct btrfs_fs_info *fs_info, > if (type != BTRFS_BLOCK_GROUP_DATA) > return false; > > - if (profile & BTRFS_BLOCK_GROUP_RAID1_MASK) > + if (profile & BTRFS_RST_SUPP_BLOCK_GROUP_MASK) > return true; > > return false; > diff --git a/fs/btrfs/volumes.c b/fs/btrfs/volumes.c > index 7c25f5c77788..9f17e5f290f4 100644 > --- a/fs/btrfs/volumes.c > +++ b/fs/btrfs/volumes.c > @@ -6438,6 +6438,8 @@ int btrfs_map_block(struct btrfs_fs_info *fs_info, enum btrfs_map_op op, > * I/O context structure. > */ > if (smap && num_alloc_stripes == 1 && > + !(btrfs_need_stripe_tree_update(fs_info, map->type) && > + op != BTRFS_MAP_READ) && > !((map->type & BTRFS_BLOCK_GROUP_RAID56_MASK) && mirror_num > 1)) { > ret = set_io_stripe(fs_info, op, logical, length, smap, map, > stripe_index, stripe_offset, stripe_nr); > diff --git a/fs/btrfs/zoned.c b/fs/btrfs/zoned.c > index c6eedf4bfba9..4ca36875058c 100644 > --- a/fs/btrfs/zoned.c > +++ b/fs/btrfs/zoned.c > @@ -1481,8 +1481,9 @@ int btrfs_load_block_group_zone_info(struct btrfs_block_group *cache, bool new) > set_bit(BLOCK_GROUP_FLAG_ZONE_IS_ACTIVE, &cache->runtime_flags); > break; > case BTRFS_BLOCK_GROUP_DUP: > - if (map->type & BTRFS_BLOCK_GROUP_DATA) { > - btrfs_err(fs_info, "zoned: profile DUP not yet supported on data bg"); > + if (map->type & BTRFS_BLOCK_GROUP_DATA && > + !btrfs_stripe_tree_root(fs_info)) { > + btrfs_err(fs_info, "zoned: data DUP profile needs stripe_root"); > ret = -EINVAL; > goto out; > } > @@ -1520,8 +1521,116 @@ int btrfs_load_block_group_zone_info(struct btrfs_block_group *cache, bool new) > cache->zone_capacity = min(caps[0], caps[1]); > break; > case BTRFS_BLOCK_GROUP_RAID1: > + case BTRFS_BLOCK_GROUP_RAID1C3: > + case BTRFS_BLOCK_GROUP_RAID1C4: This > + if (map->type & BTRFS_BLOCK_GROUP_DATA && > + !btrfs_stripe_tree_root(fs_info)) { > + btrfs_err(fs_info, > + "zoned: data %s needs stripe_root", > + btrfs_bg_type_to_raid_name(map->type)); > + ret = -EIO; > + goto out; > + > + } > + > + for (i = 0; i < map->num_stripes; i++) { > + if (alloc_offsets[i] == WP_MISSING_DEV || > + alloc_offsets[i] == WP_CONVENTIONAL) > + continue; > + > + if ((alloc_offsets[0] != alloc_offsets[i]) && > + !btrfs_test_opt(fs_info, DEGRADED)) { > + btrfs_err(fs_info, > + "zoned: write pointer offset mismatch of zones in %s profile", > + btrfs_bg_type_to_raid_name(map->type)); > + ret = -EIO; > + goto out; > + } > + if (test_bit(0, active) != test_bit(i, active)) { > + if (!btrfs_test_opt(fs_info, DEGRADED) && > + !btrfs_zone_activate(cache)) { > + ret = -EIO; > + goto out; > + } > + } else { > + if (test_bit(0, active)) > + set_bit(BLOCK_GROUP_FLAG_ZONE_IS_ACTIVE, > + &cache->runtime_flags); > + } > + /* > + * In case a device is missing we have a cap of 0, so don't > + * use it. > + */ > + cache->zone_capacity = min_not_zero(caps[0], caps[i]); > + } > + > + if (alloc_offsets[0] != WP_MISSING_DEV) > + cache->alloc_offset = alloc_offsets[0]; > + else > + cache->alloc_offset = alloc_offsets[i - 1]; whole block > + break; > case BTRFS_BLOCK_GROUP_RAID0: and > + if (map->type & BTRFS_BLOCK_GROUP_DATA && > + !btrfs_stripe_tree_root(fs_info)) { > + btrfs_err(fs_info, > + "zoned: data %s needs stripe_root", > + btrfs_bg_type_to_raid_name(map->type)); > + ret = -EIO; > + goto out; > + > + } > + for (i = 0; i < map->num_stripes; i++) { > + if (alloc_offsets[i] == WP_MISSING_DEV || > + alloc_offsets[i] == WP_CONVENTIONAL) > + continue; > + > + if (test_bit(0, active) != test_bit(i, active)) { > + if (!btrfs_zone_activate(cache)) { > + ret = -EIO; > + goto out; > + } > + } else { > + if (test_bit(0, active)) > + set_bit(BLOCK_GROUP_FLAG_ZONE_IS_ACTIVE, > + &cache->runtime_flags); > + } > + cache->zone_capacity += caps[i]; > + cache->alloc_offset += alloc_offsets[i]; > + > + } > + break; > case BTRFS_BLOCK_GROUP_RAID10: > + if (map->type & BTRFS_BLOCK_GROUP_DATA && > + !btrfs_stripe_tree_root(fs_info)) { > + btrfs_err(fs_info, > + "zoned: data %s needs stripe_root", > + btrfs_bg_type_to_raid_name(map->type)); > + ret = -EIO; > + goto out; > + > + } > + for (i = 0; i < map->num_stripes; i++) { > + if (alloc_offsets[i] == WP_MISSING_DEV || > + alloc_offsets[i] == WP_CONVENTIONAL) > + continue; > + > + if (test_bit(0, active) != test_bit(i, active)) { > + if (!btrfs_zone_activate(cache)) { > + ret = -EIO; > + goto out; > + } > + } else { > + if (test_bit(0, active)) > + set_bit(BLOCK_GROUP_FLAG_ZONE_IS_ACTIVE, > + &cache->runtime_flags); > + } > + if ((i % map->sub_stripes) == 0) { > + cache->zone_capacity += caps[i]; > + cache->alloc_offset += alloc_offsets[i]; > + } > + > + } > + break; Seem to be quite long and nested for a case, can they be factored to helpers? > case BTRFS_BLOCK_GROUP_RAID5: > case BTRFS_BLOCK_GROUP_RAID6: > /* non-single profiles are not supported yet */ > > -- > 2.41.0