From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B098EC07E99 for ; Mon, 5 Jul 2021 20:16:11 +0000 (UTC) Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 9A7C96197F for ; Mon, 5 Jul 2021 20:16:10 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 9A7C96197F Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=infradead.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=linux-erofs-bounces+linux-erofs=archiver.kernel.org@lists.ozlabs.org Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4GJcQK1jPYz305t for ; Tue, 6 Jul 2021 06:16:09 +1000 (AEST) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256 header.s=casper.20170209 header.b=D1zngPFj; dkim-atps=neutral Authentication-Results: lists.ozlabs.org; spf=none (no SPF record) smtp.mailfrom=infradead.org (client-ip=2001:8b0:10b:1236::1; helo=casper.infradead.org; envelope-from=willy@infradead.org; receiver=) Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4GJcQ54jkQz2yxq for ; Tue, 6 Jul 2021 06:15:53 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=cHJoMBPoqsS6VIVZNAuTsCESFJ7feq3dFA9cLcq4xmA=; b=D1zngPFjaraCLiltD0U9yxBX5A kIMC9/R+DfJbPFWbxRozfUqe9136feg/Kr6BoNXvWvtm/XIW9SwZy3izXGiMYCgWX+Ym70KenbpQe ezSvZvnaCC45B/8btVNs0RScJA+xPsaH6ZVm//YELSSSRsIGiF/n9SEIf64hLzXAtyhalxU1R49UP APxCJJwB0JQTQbNK9VuINLaYN0QwlCF3ghVn6R29hMefxMlqdcbOhE9Xc/XZ37+y+6n/GVaUfnOog ZzedbwMTrw5xZZIGrhjzjZrDMftyygVn/lfgKTBG1X6Yo/v6gs0hubZQs35II+taREN02/LF6NSzi F03mz0wQ==; Received: from willy by casper.infradead.org with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1m0V02-00AZ6w-Fs; Mon, 05 Jul 2021 20:15:36 +0000 Date: Mon, 5 Jul 2021 21:15:26 +0100 From: Matthew Wilcox To: Gao Xiang Subject: Re: [RFC PATCH 2/2] erofs: directly traverse pages in z_erofs_readahead() Message-ID: References: <20210705183253.14833-1-xiang@kernel.org> <20210705183253.14833-2-xiang@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210705183253.14833-2-xiang@kernel.org> X-BeenThere: linux-erofs@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development of Linux EROFS file system List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: linux-erofs@lists.ozlabs.org, LKML Errors-To: linux-erofs-bounces+linux-erofs=archiver.kernel.org@lists.ozlabs.org Sender: "Linux-erofs" On Tue, Jul 06, 2021 at 02:32:53AM +0800, Gao Xiang wrote: > In that way, pages can be accessed directly with xarray. I didn't mean "open code readahead_page()". I meant "Wouldn't it be great if z_erofs_do_read_page() used readahead_expand() in order to allocate the extra pages in the extents that cover the start and end of the requested chunk". That way the pages would already be in the page cache for subsequent reads.