[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <d7140963-3b21-4b51-9a9c-bcf8362bf1da@linux.alibaba.com>
Date: Fri, 21 Nov 2025 20:43:45 +0800
From: Gao Xiang <hsiangkao@...ux.alibaba.com>
To: Sergey Senozhatsky <senozhatsky@...omium.org>,
Yuwen Chen <ywen.chen@...mail.com>
Cc: akpm@...ux-foundation.org, bgeffon@...gle.com, licayy@...look.com,
linux-block@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-mm@...ck.org, minchan@...nel.org, richardycc@...gle.com
Subject: Re: [RFC PATCHv5 0/6] zram: introduce writeback bio batching
On 2025/11/21 20:21, Gao Xiang wrote:
>
>
> On 2025/11/21 17:12, Sergey Senozhatsky wrote:
>> On (25/11/21 16:23), Yuwen Chen wrote:
>
> ..
>
>
>>>> I think page-fault latency of a written-back page is expected to be
>>>> higher, that's a trade-off that we agree on. Off the top of my head,
>>>> I don't think we can do anything about it.
>>>>
>>>> Is loop device always used as for writeback targets?
>>>
>>> On the Android platform, currently only the loop device is supported as
>>> the backend for writeback, possibly for security reasons. I noticed that
>>> EROFS has implemented a CONFIG_EROFS_FS_BACKED_BY_FILE to reduce this
>>> latency. I think ZRAM might also be able to do this.
>>
>> I see. Do you use S/W or H/W compression?
>
> No, I'm pretty sure it's impossible for zram to access
> file I/Os without another thread context (e.g. workqueue),
> especially for write I/Os, which is unlike erofs:
>
> EROFS can do because EROFS is a specific filesystem, you
> could see it's a seperate fs, and it can only read (no
> write context) backing files in erofs and/or other fses,
> which is much like vfs/overlayfs read_iter() directly
> going into the backing fses without nested contexts.
> (Even if loop is used, it will create its own thread
> contexts with workqueues, which is safe.)
>
> In the other hand, zram/loop can act as a virtual block
> device which is rather different, which means you could
> format an ext4 filesystem and backing another ext4/btrfs,
> like this:
>
> zram(ext4) -> backing ext4/btrfs
>
> It's unsafe (in addition to GFP_NOIO allocation
> restriction) since zram cannot manage those ext4/btrfs
> existing contexts:
>
> - Take one detailed example, if the upper zram ext4
> assigns current->journal_info = xxx, and submit_bio() to
> zram, which will confuse the backing ext4 since it should
> assume current->journal_info == NULL, so the virtual block
> devices need another thread context to isolate those two
> different uncontrolled contexts.
>
> So I don't think it's feasible for block drivers to act
> like this, especially mixing with writing to backing fses
> operations.
In other words, a fs claims it can do file-backed-mounts
without a new context only if:
- Its own implementation can be safely applied to any
other kernel filesystem (e.g., it shouldn't change
current->journal_info or do context save/restore before
handing over, for example); and its own implementation
can safely mount itself with file-backed mounts.
So it's filesystem-specific internals to make sure it can
work like this (for example ext4 on erofs, ext4 still uses
loop to mount). The virtual block device layer knows
nothing about what the upper filesystem did before the
execution passes through, so it's unsafe to work like this.
Thanks,
Gao Xiang
Powered by blists - more mailing lists