diff mbox

[for-2.8] block: Let write zeroes fallback work even with small max_transfer

Message ID 1478645535-21236-1-git-send-email-eblake@redhat.com
State New
Headers show

Commit Message

Eric Blake Nov. 8, 2016, 10:52 p.m. UTC
Commit 443668ca rewrote the write_zeroes logic to guarantee that
an unaligned request never crosses a cluster boundary.  But
in the rewrite, the new code assumed that at most one iteration
would be needed to get to an alignment boundary.

However, it is easy to trigger an assertion failure: the Linux
kernel limits loopback devices to advertise a max_transfer of
only 64k.  Any operation that requires falling back to writes
rather than more efficient zeroing must obey max_transfer during
that fallback, which means an unaligned head may require multiple
iterations of the write fallbacks before reaching the aligned
boundaries, when layering a format with clusters larger than 64k
atop the protocol of file access to a loopback device.

Test case:

$ qemu-img create -f qcow2 -o cluster_size=1M file 10M
$ losetup /dev/loop2 /path/to/file
$ qemu-io -f qcow2 /dev/loop2
qemu-io> w 7m 1k
qemu-io> w -z 8003584 2093056

In fairness to Denis (as the original listed author of the culprit
commit), the faulty logic for at most one iteration is probably all
my fault in reworking his idea.  But the solution is to restore what
was in place prior to that commit: when dealing with an unaligned
head or tail, iterate as many times as necessary while fragmenting
the operation at max_transfer boundaries.

CC: qemu-stable@nongnu.org
CC: Ed Swierk <eswierk@skyportsystems.com>
CC: Denis V. Lunev <den@openvz.org>
Signed-off-by: Eric Blake <eblake@redhat.com>
---
 block/io.c | 13 ++++++++-----
 1 file changed, 8 insertions(+), 5 deletions(-)

Comments

Fam Zheng Nov. 9, 2016, 2:35 a.m. UTC | #1
On Tue, 11/08 16:52, Eric Blake wrote:
> Commit 443668ca rewrote the write_zeroes logic to guarantee that
> an unaligned request never crosses a cluster boundary.  But
> in the rewrite, the new code assumed that at most one iteration
> would be needed to get to an alignment boundary.
> 
> However, it is easy to trigger an assertion failure: the Linux
> kernel limits loopback devices to advertise a max_transfer of
> only 64k.  Any operation that requires falling back to writes
> rather than more efficient zeroing must obey max_transfer during
> that fallback, which means an unaligned head may require multiple
> iterations of the write fallbacks before reaching the aligned
> boundaries, when layering a format with clusters larger than 64k
> atop the protocol of file access to a loopback device.
> 
> Test case:
> 
> $ qemu-img create -f qcow2 -o cluster_size=1M file 10M
> $ losetup /dev/loop2 /path/to/file
> $ qemu-io -f qcow2 /dev/loop2
> qemu-io> w 7m 1k
> qemu-io> w -z 8003584 2093056
> 
> In fairness to Denis (as the original listed author of the culprit
> commit), the faulty logic for at most one iteration is probably all
> my fault in reworking his idea.  But the solution is to restore what
> was in place prior to that commit: when dealing with an unaligned
> head or tail, iterate as many times as necessary while fragmenting
> the operation at max_transfer boundaries.
> 
> CC: qemu-stable@nongnu.org
> CC: Ed Swierk <eswierk@skyportsystems.com>
> CC: Denis V. Lunev <den@openvz.org>
> Signed-off-by: Eric Blake <eblake@redhat.com>
> ---
>  block/io.c | 13 ++++++++-----
>  1 file changed, 8 insertions(+), 5 deletions(-)
> 
> diff --git a/block/io.c b/block/io.c
> index aa532a5..085ac34 100644
> --- a/block/io.c
> +++ b/block/io.c
> @@ -1214,6 +1214,8 @@ static int coroutine_fn bdrv_co_do_pwrite_zeroes(BlockDriverState *bs,
>      int max_write_zeroes = MIN_NON_ZERO(bs->bl.max_pwrite_zeroes, INT_MAX);
>      int alignment = MAX(bs->bl.pwrite_zeroes_alignment,
>                          bs->bl.request_alignment);
> +    int max_transfer = MIN_NON_ZERO(bs->bl.max_transfer,
> +                                    MAX_WRITE_ZEROES_BOUNCE_BUFFER);
> 
>      assert(alignment % bs->bl.request_alignment == 0);
>      head = offset % alignment;
> @@ -1229,9 +1231,12 @@ static int coroutine_fn bdrv_co_do_pwrite_zeroes(BlockDriverState *bs,
>           * boundaries.
>           */
>          if (head) {
> -            /* Make a small request up to the first aligned sector.  */
> -            num = MIN(count, alignment - head);
> -            head = 0;
> +            /* Make a small request up to the first aligned sector. For
> +             * convenience, limit this request to max_transfer even if
> +             * we don't need to fall back to writes.  */
> +            num = MIN(MIN(count, max_transfer), alignment - head);
> +            head = (head + num) % alignment;
> +            assert(num < max_write_zeroes);
>          } else if (tail && num > alignment) {
>              /* Shorten the request to the last aligned sector.  */
>              num -= tail;
> @@ -1257,8 +1262,6 @@ static int coroutine_fn bdrv_co_do_pwrite_zeroes(BlockDriverState *bs,
> 
>          if (ret == -ENOTSUP) {
>              /* Fall back to bounce buffer if write zeroes is unsupported */
> -            int max_transfer = MIN_NON_ZERO(bs->bl.max_transfer,
> -                                            MAX_WRITE_ZEROES_BOUNCE_BUFFER);
>              BdrvRequestFlags write_flags = flags & ~BDRV_REQ_ZERO_WRITE;
> 
>              if ((flags & BDRV_REQ_FUA) &&
> -- 
> 2.7.4
> 

Reviewed-by: Fam Zheng <famz@redhat.com>
Stefan Hajnoczi Nov. 9, 2016, 1:49 p.m. UTC | #2
On Tue, Nov 08, 2016 at 04:52:15PM -0600, Eric Blake wrote:
> Commit 443668ca rewrote the write_zeroes logic to guarantee that
> an unaligned request never crosses a cluster boundary.  But
> in the rewrite, the new code assumed that at most one iteration
> would be needed to get to an alignment boundary.
> 
> However, it is easy to trigger an assertion failure: the Linux
> kernel limits loopback devices to advertise a max_transfer of
> only 64k.  Any operation that requires falling back to writes
> rather than more efficient zeroing must obey max_transfer during
> that fallback, which means an unaligned head may require multiple
> iterations of the write fallbacks before reaching the aligned
> boundaries, when layering a format with clusters larger than 64k
> atop the protocol of file access to a loopback device.
> 
> Test case:
> 
> $ qemu-img create -f qcow2 -o cluster_size=1M file 10M
> $ losetup /dev/loop2 /path/to/file
> $ qemu-io -f qcow2 /dev/loop2
> qemu-io> w 7m 1k
> qemu-io> w -z 8003584 2093056

Please include a qemu-iotests test case to protect against regressions.

Thanks,
Stefan
Eric Blake Nov. 9, 2016, 8:06 p.m. UTC | #3
On 11/09/2016 07:49 AM, Stefan Hajnoczi wrote:
> On Tue, Nov 08, 2016 at 04:52:15PM -0600, Eric Blake wrote:
>> Commit 443668ca rewrote the write_zeroes logic to guarantee that
>> an unaligned request never crosses a cluster boundary.  But
>> in the rewrite, the new code assumed that at most one iteration
>> would be needed to get to an alignment boundary.
>>
>> However, it is easy to trigger an assertion failure: the Linux
>> kernel limits loopback devices to advertise a max_transfer of
>> only 64k.  Any operation that requires falling back to writes
>> rather than more efficient zeroing must obey max_transfer during
>> that fallback, which means an unaligned head may require multiple
>> iterations of the write fallbacks before reaching the aligned
>> boundaries, when layering a format with clusters larger than 64k
>> atop the protocol of file access to a loopback device.
>>
>> Test case:
>>
>> $ qemu-img create -f qcow2 -o cluster_size=1M file 10M
>> $ losetup /dev/loop2 /path/to/file
>> $ qemu-io -f qcow2 /dev/loop2
>> qemu-io> w 7m 1k
>> qemu-io> w -z 8003584 2093056
> 
> Please include a qemu-iotests test case to protect against regressions.

None of the existing qemu-iotests use losetup; I guess the closest thing
to do is crib from a test that uses passwordless sudo?

It will certainly be a separate commit, but I'll give it my best shot to
post something soon.
Fam Zheng Nov. 10, 2016, 2:11 a.m. UTC | #4
On Wed, 11/09 14:06, Eric Blake wrote:
> On 11/09/2016 07:49 AM, Stefan Hajnoczi wrote:
> > On Tue, Nov 08, 2016 at 04:52:15PM -0600, Eric Blake wrote:
> >> Commit 443668ca rewrote the write_zeroes logic to guarantee that
> >> an unaligned request never crosses a cluster boundary.  But
> >> in the rewrite, the new code assumed that at most one iteration
> >> would be needed to get to an alignment boundary.
> >>
> >> However, it is easy to trigger an assertion failure: the Linux
> >> kernel limits loopback devices to advertise a max_transfer of
> >> only 64k.  Any operation that requires falling back to writes
> >> rather than more efficient zeroing must obey max_transfer during
> >> that fallback, which means an unaligned head may require multiple
> >> iterations of the write fallbacks before reaching the aligned
> >> boundaries, when layering a format with clusters larger than 64k
> >> atop the protocol of file access to a loopback device.
> >>
> >> Test case:
> >>
> >> $ qemu-img create -f qcow2 -o cluster_size=1M file 10M
> >> $ losetup /dev/loop2 /path/to/file
> >> $ qemu-io -f qcow2 /dev/loop2
> >> qemu-io> w 7m 1k
> >> qemu-io> w -z 8003584 2093056
> > 
> > Please include a qemu-iotests test case to protect against regressions.
> 
> None of the existing qemu-iotests use losetup; I guess the closest thing
> to do is crib from a test that uses passwordless sudo?
> 
> It will certainly be a separate commit, but I'll give it my best shot to
> post something soon.

Alternatively, maybe add a blkdebug option to emulate a small max_transfer at
the protocol layer?

Fam
Kevin Wolf Nov. 10, 2016, 8:03 a.m. UTC | #5
Am 10.11.2016 um 03:11 hat Fam Zheng geschrieben:
> On Wed, 11/09 14:06, Eric Blake wrote:
> > On 11/09/2016 07:49 AM, Stefan Hajnoczi wrote:
> > > On Tue, Nov 08, 2016 at 04:52:15PM -0600, Eric Blake wrote:
> > >> Commit 443668ca rewrote the write_zeroes logic to guarantee that
> > >> an unaligned request never crosses a cluster boundary.  But
> > >> in the rewrite, the new code assumed that at most one iteration
> > >> would be needed to get to an alignment boundary.
> > >>
> > >> However, it is easy to trigger an assertion failure: the Linux
> > >> kernel limits loopback devices to advertise a max_transfer of
> > >> only 64k.  Any operation that requires falling back to writes
> > >> rather than more efficient zeroing must obey max_transfer during
> > >> that fallback, which means an unaligned head may require multiple
> > >> iterations of the write fallbacks before reaching the aligned
> > >> boundaries, when layering a format with clusters larger than 64k
> > >> atop the protocol of file access to a loopback device.
> > >>
> > >> Test case:
> > >>
> > >> $ qemu-img create -f qcow2 -o cluster_size=1M file 10M
> > >> $ losetup /dev/loop2 /path/to/file
> > >> $ qemu-io -f qcow2 /dev/loop2
> > >> qemu-io> w 7m 1k
> > >> qemu-io> w -z 8003584 2093056
> > > 
> > > Please include a qemu-iotests test case to protect against regressions.
> > 
> > None of the existing qemu-iotests use losetup; I guess the closest thing
> > to do is crib from a test that uses passwordless sudo?
> > 
> > It will certainly be a separate commit, but I'll give it my best shot to
> > post something soon.
> 
> Alternatively, maybe add a blkdebug option to emulate a small max_transfer at
> the protocol layer?

This sounds like the better option indeed.

Kevin
Eric Blake Nov. 14, 2016, 3:50 p.m. UTC | #6
On 11/10/2016 02:03 AM, Kevin Wolf wrote:

>>>>> Test case:
>>>>>
>>>>> $ qemu-img create -f qcow2 -o cluster_size=1M file 10M
>>>>> $ losetup /dev/loop2 /path/to/file
>>>>> $ qemu-io -f qcow2 /dev/loop2
>>>>> qemu-io> w 7m 1k
>>>>> qemu-io> w -z 8003584 2093056
>>>>
>>>> Please include a qemu-iotests test case to protect against regressions.
>>>
>>> None of the existing qemu-iotests use losetup; I guess the closest thing
>>> to do is crib from a test that uses passwordless sudo?
>>>
>>> It will certainly be a separate commit, but I'll give it my best shot to
>>> post something soon.
>>
>> Alternatively, maybe add a blkdebug option to emulate a small max_transfer at
>> the protocol layer?
> 
> This sounds like the better option indeed.

I'm working on this, but found that blkdebug doesn't yet support discard
or write zero. While I do plan on adding that support, it is a new
feature to blkdebug, and therefore probably belongs in 2.9.  That said,
I'm still hoping to post an entire series with improved blkdebug and
qemu-iotest coverage of the two tangentially related patches (this one
for write zeroes, and another for discard support), where we can pick
the first half of the series (basically v2 of my pending patches) into
2.8 while feeling more confident that the second half (the blkdebug and
testsuite additions) wait for 2.9.
Stefan Hajnoczi Nov. 15, 2016, 12:57 p.m. UTC | #7
On Mon, Nov 14, 2016 at 09:50:33AM -0600, Eric Blake wrote:
> On 11/10/2016 02:03 AM, Kevin Wolf wrote:
> 
> >>>>> Test case:
> >>>>>
> >>>>> $ qemu-img create -f qcow2 -o cluster_size=1M file 10M
> >>>>> $ losetup /dev/loop2 /path/to/file
> >>>>> $ qemu-io -f qcow2 /dev/loop2
> >>>>> qemu-io> w 7m 1k
> >>>>> qemu-io> w -z 8003584 2093056
> >>>>
> >>>> Please include a qemu-iotests test case to protect against regressions.
> >>>
> >>> None of the existing qemu-iotests use losetup; I guess the closest thing
> >>> to do is crib from a test that uses passwordless sudo?
> >>>
> >>> It will certainly be a separate commit, but I'll give it my best shot to
> >>> post something soon.
> >>
> >> Alternatively, maybe add a blkdebug option to emulate a small max_transfer at
> >> the protocol layer?
> > 
> > This sounds like the better option indeed.
> 
> I'm working on this, but found that blkdebug doesn't yet support discard
> or write zero. While I do plan on adding that support, it is a new
> feature to blkdebug, and therefore probably belongs in 2.9.  That said,
> I'm still hoping to post an entire series with improved blkdebug and
> qemu-iotest coverage of the two tangentially related patches (this one
> for write zeroes, and another for discard support), where we can pick
> the first half of the series (basically v2 of my pending patches) into
> 2.8 while feeling more confident that the second half (the blkdebug and
> testsuite additions) wait for 2.9.

We've reached hard freeze so I like the idea of taking just small fixes
now.

Please send them for -rc0 or -rc1.

Stefan
diff mbox

Patch

diff --git a/block/io.c b/block/io.c
index aa532a5..085ac34 100644
--- a/block/io.c
+++ b/block/io.c
@@ -1214,6 +1214,8 @@  static int coroutine_fn bdrv_co_do_pwrite_zeroes(BlockDriverState *bs,
     int max_write_zeroes = MIN_NON_ZERO(bs->bl.max_pwrite_zeroes, INT_MAX);
     int alignment = MAX(bs->bl.pwrite_zeroes_alignment,
                         bs->bl.request_alignment);
+    int max_transfer = MIN_NON_ZERO(bs->bl.max_transfer,
+                                    MAX_WRITE_ZEROES_BOUNCE_BUFFER);

     assert(alignment % bs->bl.request_alignment == 0);
     head = offset % alignment;
@@ -1229,9 +1231,12 @@  static int coroutine_fn bdrv_co_do_pwrite_zeroes(BlockDriverState *bs,
          * boundaries.
          */
         if (head) {
-            /* Make a small request up to the first aligned sector.  */
-            num = MIN(count, alignment - head);
-            head = 0;
+            /* Make a small request up to the first aligned sector. For
+             * convenience, limit this request to max_transfer even if
+             * we don't need to fall back to writes.  */
+            num = MIN(MIN(count, max_transfer), alignment - head);
+            head = (head + num) % alignment;
+            assert(num < max_write_zeroes);
         } else if (tail && num > alignment) {
             /* Shorten the request to the last aligned sector.  */
             num -= tail;
@@ -1257,8 +1262,6 @@  static int coroutine_fn bdrv_co_do_pwrite_zeroes(BlockDriverState *bs,

         if (ret == -ENOTSUP) {
             /* Fall back to bounce buffer if write zeroes is unsupported */
-            int max_transfer = MIN_NON_ZERO(bs->bl.max_transfer,
-                                            MAX_WRITE_ZEROES_BOUNCE_BUFFER);
             BdrvRequestFlags write_flags = flags & ~BDRV_REQ_ZERO_WRITE;

             if ((flags & BDRV_REQ_FUA) &&