Received: by 2002:a05:7412:da14:b0:e2:908c:2ebd with SMTP id fe20csp1605000rdb; Sun, 8 Oct 2023 16:27:57 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGM3ytzz2NpmVzC+jUdhocGrf800Q+fqjlXo789V/Upczc8kmpgUn9IVwOHSFkYxruPBPe5 X-Received: by 2002:a05:6a20:430b:b0:138:2fb8:6c48 with SMTP id h11-20020a056a20430b00b001382fb86c48mr14693946pzk.8.1696807676923; Sun, 08 Oct 2023 16:27:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696807676; cv=none; d=google.com; s=arc-20160816; b=qJGj+bSdNZTKsMXU7HROr5F01TmVUnsmbeY7uvy7/6D1I5IioEc67htcddaE5yGyWR Hhm23emJiW5xFdrfQB5kBUdsvZyxui3zV96u9HwykE0XcdTfSX1Mt0DqbkG+Gp1ftFYM nrUf0M7VldqWrhc1WfkLvF2sDWNeJMIR18AHvEPAsCdAG+rwjbh6iXKR8bu3v+WgYKFW 9PytveJ9mOEexwhS/uqiTDmoLiXn2BLGzgVnaYaJfSOFD26xhaZN4f85YjFBlZwCRBZO aF05PoOenFBgDQGoq9Qa2whDxQKn1wuxuL8K93VpiZ9P4TuA+biJ9vQzggYTsxwCuFT5 IVuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=aS5wnORfWJ02Ic4UlNgXgG7erca/6rPk7A+dIWgu1xE=; fh=yewGppZRzX9YpyYWG0x58MuDKnCcUPfkXLwJGOKeE90=; b=C9P2oIaArmuSWfILpFTsT/VZ2CFE8e//pZBGf95xZ44BRbwbzy5k0sUnkejIGq95GU hJJ6C6lEmufQWLdFFoOOhyRVTdglj9z0R+g8YxGHhe4V13xznYh4lWLpvHXsdjbBFcL0 0XDFQansvPMbUyN8pTbE3MfWMEHDUPCSD6VWdTnGGoCTTslFVwklOYfM3fhFHm5uJxGD 3a1cs6Ye3JcmZkM5E4tg+rQnCaHUywPcKqScC3XCG72Bps6Is7H+fZSzwVrVINuTRwKJ Y9+YBHeaRDLQJ2YXUhsl/3PAp7d8kQyqDz++0O3M9rMpTnWdU63RQtovsfk5Bamq1At4 7Fcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fromorbit-com.20230601.gappssmtp.com header.s=20230601 header.b=ar+F8kCJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=fromorbit.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id jz6-20020a170903430600b001c5f15d24ffsi7993037plb.116.2023.10.08.16.27.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 08 Oct 2023 16:27:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@fromorbit-com.20230601.gappssmtp.com header.s=20230601 header.b=ar+F8kCJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=fromorbit.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 756068054B45; Sun, 8 Oct 2023 16:27:54 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344969AbjJHX1f (ORCPT + 99 others); Sun, 8 Oct 2023 19:27:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38292 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344437AbjJHX1f (ORCPT ); Sun, 8 Oct 2023 19:27:35 -0400 Received: from mail-pj1-x102b.google.com (mail-pj1-x102b.google.com [IPv6:2607:f8b0:4864:20::102b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E49C8A6 for ; Sun, 8 Oct 2023 16:27:32 -0700 (PDT) Received: by mail-pj1-x102b.google.com with SMTP id 98e67ed59e1d1-27760c31056so2269422a91.1 for ; Sun, 08 Oct 2023 16:27:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fromorbit-com.20230601.gappssmtp.com; s=20230601; t=1696807652; x=1697412452; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=aS5wnORfWJ02Ic4UlNgXgG7erca/6rPk7A+dIWgu1xE=; b=ar+F8kCJJYhocpH7678ttAXERmoI3yDavLymH+R8n+35dyDP58p8hJzK8gVAcQnWwh RirkN49+Qt+O1zUgU1OfDzkBhTeE7796uHFvZHa0gFv1zP8QKIuNAFcbsljod+Gb60La MiIgpSGI49duQ1w0jRtwOZUBq8c/h1RdDsSXqtVptZrGgUVqObEK4jKbEN+3G+hlm0ml ePJVD+GKPlQoTH1agTEdIi2/BnJZj1h1L0HyVx2nEp9mWs0vsmmgb5Sk3UHSkc6v7D73 BYJ099PQo8RtsN0oxQog8POX7NVf/yv46dlGYNpDNeCGi8L0E4fi7PhSIhNw4HyeN8f9 AY/Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696807652; x=1697412452; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=aS5wnORfWJ02Ic4UlNgXgG7erca/6rPk7A+dIWgu1xE=; b=sKEJICceZAHgv83ZHyYwwUult7D3hBr2iV6yzgEubezX6cC+oyY6Ww4sRN60PiR+D1 9q9HKyVyV5JpIpPuGHP+d5AZD3BSfnr0M6TCvPbUp4tEK/DnhNxeBVS7lAZbrdepJyrN SDwQw8q/MbK3KqnfsjthasPYw+Ymlx6vKdULj68Rxc42omV4s7ly14jeWA5hxfLQXZ/+ fpB7pXzTPBXUyWEcZMFwrjvdtqItaLtVRoFQq9vAAVRoIXwx0TWTkhF+ALC3HGrwDILR PS2fRBpdDSBzeJ2Xvhku3L4jZQl/4kwWV58KTusBh64pg+0gsUJL8qShXMndkJtVyKZN GZIQ== X-Gm-Message-State: AOJu0YxvvULLxLUvwANiOT8I9O4495ZJByPoQlpnbdKjbKucjiEOLa5g Eb/A3cx2bdBP0VC6gqhJ+0r1ag== X-Received: by 2002:a17:90b:4b06:b0:273:e689:8dfc with SMTP id lx6-20020a17090b4b0600b00273e6898dfcmr11740281pjb.32.1696807652373; Sun, 08 Oct 2023 16:27:32 -0700 (PDT) Received: from dread.disaster.area (pa49-180-20-59.pa.nsw.optusnet.com.au. [49.180.20.59]) by smtp.gmail.com with ESMTPSA id az12-20020a17090b028c00b0026d4100e0e8sm6954450pjb.10.2023.10.08.16.27.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 08 Oct 2023 16:27:31 -0700 (PDT) Received: from dave by dread.disaster.area with local (Exim 4.96) (envelope-from ) id 1qpdBI-00BHvI-0p; Mon, 09 Oct 2023 10:27:28 +1100 Date: Mon, 9 Oct 2023 10:27:28 +1100 From: Dave Chinner To: Sarthak Kukreti Cc: dm-devel@redhat.com, linux-block@vger.kernel.org, linux-ext4@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Jens Axboe , Alasdair Kergon , Mike Snitzer , Christoph Hellwig , Brian Foster , Theodore Ts'o , Andreas Dilger , Bart Van Assche , "Darrick J. Wong" Subject: Re: [PATCH v8 5/5] block: Pass unshare intent via REQ_OP_PROVISION Message-ID: References: <20231007012817.3052558-1-sarthakkukreti@chromium.org> <20231007012817.3052558-6-sarthakkukreti@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231007012817.3052558-6-sarthakkukreti@chromium.org> X-Spam-Status: No, score=2.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RCVD_IN_SBL_CSS, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Sun, 08 Oct 2023 16:27:54 -0700 (PDT) X-Spam-Level: ** On Fri, Oct 06, 2023 at 06:28:17PM -0700, Sarthak Kukreti wrote: > Allow REQ_OP_PROVISION to pass in an extra REQ_UNSHARE bit to > annotate unshare requests to underlying layers. Layers that support > FALLOC_FL_UNSHARE will be able to use this as an indicator of which > fallocate() mode to use. > > Suggested-by: Darrick J. Wong > Signed-off-by: Sarthak Kukreti > --- > block/blk-lib.c | 6 +++++- > block/fops.c | 6 ++++-- > drivers/block/loop.c | 35 +++++++++++++++++++++++++++++------ > include/linux/blk_types.h | 3 +++ > include/linux/blkdev.h | 3 ++- > 5 files changed, 43 insertions(+), 10 deletions(-) I have no idea how filesystems (or even userspace applications, for that matter) are supposed to use this - they have no idea if the underlying block device has shared blocks for LBA ranges it already has allocated and provisioned. IOWs, I don't know waht the semantics of this function is, it is not documented anywhere, and there is no use case present that tells me how it might get used. Yes, unshare at the file level means the filesystem tries to break internal data extent sharing, but if the block layers or backing devices are doing deduplication and sharing unknown to the application or filesystem, how do they ever know that this operation might need to be performed? In what cases do we need to be able to unshare block device ranges, and how is that different to the guarantees that REQ_PROVISION is already supposed to give for provisioned ranges that are then subsequently shared by the block device (e.g. by snapshots)? Also, from an API perspective, this is an "unshare" data operation, not a "provision" operation. Hence I'd suggest that the API should be blkdev_issue_unshare() rather than optional behaviour to _provision() which - before this patch - had clear and well defined meaning.... Cheers, Dave. -- Dave Chinner david@fromorbit.com