Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753950AbbHXHNa (ORCPT ); Mon, 24 Aug 2015 03:13:30 -0400 Received: from mga02.intel.com ([134.134.136.20]:30188 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751980AbbHXHN3 (ORCPT ); Mon, 24 Aug 2015 03:13:29 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.15,736,1432623600"; d="scan'208";a="774384169" Message-ID: <1440400405.15510.29.camel@gmail.com> Subject: Re: [PATCH 2/2] ubifs: Allow O_DIRECT From: Artem Bityutskiy Reply-To: dedekind1@gmail.com To: Brian Norris , Richard Weinberger Cc: Dongsheng Yang , linux-mtd@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Date: Mon, 24 Aug 2015 10:13:25 +0300 In-Reply-To: <20150820204933.GG74600@google.com> References: <1440016553-26481-1-git-send-email-richard@nod.at> <1440016553-26481-2-git-send-email-richard@nod.at> <55D542C5.6040500@cn.fujitsu.com> <1440070300.31419.202.camel@gmail.com> <55D5BC92.8050903@nod.at> <20150820204933.GG74600@google.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.16.5 (3.16.5-1.fc22) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3075 Lines: 84 On Thu, 2015-08-20 at 13:49 -0700, Brian Norris wrote: > Pardon the innocent bystander's comment, but: > > On Thu, Aug 20, 2015 at 01:40:02PM +0200, Richard Weinberger wrote: > > Am 20.08.2015 um 13:31 schrieb Artem Bityutskiy: > > > On Thu, 2015-08-20 at 11:00 +0800, Dongsheng Yang wrote: > > > > On 08/20/2015 04:35 AM, Richard Weinberger wrote: > > > > > Currently UBIFS does not support direct IO, but some > > > > > applications > > > > > blindly use the O_DIRECT flag. > > > > > Instead of failing upon open() we can do better and fall back > > > > > to buffered IO. > > > > > > > > Hmmmm, to be honest, I am not sure we have to do it as Dave > > > > suggested. I think that's just a work-around for current > > > > fstests. > > > > > > > > IMHO, perform a buffered IO when user request direct IO without > > > > any warning sounds not a good idea. Maybe adding a warning > > > > would > > > > make it better. > > > > > > > > I think we need more discussion about AIO&DIO in ubifs, and > > > > actually > > > > I have a plan for it. But I have not listed the all cons and > > > > pros of > > > > it so far. > > > > > > > > Artem, what's your opinion? > > > > > > Yes, this is my worry too. > > > > > > Basically, we need to see what is the "common practice" here, and > > > follow it. This requires a small research. What would be the most > > > popular Linux FS which does not support direct I/O? Can we check > > > what > > > it does? > > > > All popular filesystems seem to support direct IO. > > That's the problem, application do not expect O_DIRECT to fail. > > Why can't we just suggest fixing the applications? The man pages for > O_DIRECT clearly document the EINVAL return code: > > EINVAL The filesystem does not support the O_DIRECT flag. See NOTES > for more information. > > and under NOTES: > > O_DIRECT support was added under Linux in kernel version 2.4.10. > Older Linux kernels simply ignore this flag. Some filesystems may > not > implement the flag and open() will fail with EINVAL if it is used. That's an option. When writing the code, we were defensive and preferred to error out for everything we do not support. This is generally a good SW engineering practice. Now, some user-space fails when direct I/O is not supported. We can chose to fake direct I/O or fix user-space. The latter seems to be the preferred course of actions, and you are correctly pointing the man page. However, if 1. we are the only FS erroring out on O_DIRECT 2. other file-systems not supporting direct IO just fake it we may just follow the crowd and fake it too. I am kind of trusting Richard here - I assume he did the research and the above is the case, this is why I am fine with his patch. Does this logic seem acceptable to you? Other folk's opinion would be great to hear. Artem. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/