Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1351793ybt; Tue, 7 Jul 2020 13:40:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwFEerMnSC90odKIhwQpVXocmSLVr0Zy7EGmYvd/7/fdYNGA0h/9C8oThdVm8YHcXnkxmBn X-Received: by 2002:aa7:d457:: with SMTP id q23mr58718899edr.376.1594154453710; Tue, 07 Jul 2020 13:40:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594154453; cv=none; d=google.com; s=arc-20160816; b=fLhFcVUNjgWquAnICur9SOE0mEQT60uzRgyRRCzrPVnFZNENJLJHQPc3Ee9K1DJZep 6ME4o8GFrKvYPQymbj8rF8WbccVJkT1i4Ru+tHdtFOZbhSktCKV+qp1v8yj/BVytRJc+ aBV7Qd8bdNRUyissvC3h49amrfRGt7KUEXeiG6oWQbwUfc4rZSwxkIqF5qYDWN0pEnWL GMoiKE3mH7eya8BJTrp1RoFz/qc7pHnNmvMtTuzmDjmAnjs2ekPsRPjBgvGRFQ+jn62G mlDiWE8rpJSFFRtLZ11A02ZaixriwUqbKumPF0W581dZBT9i1ydPvKWwRD9ydypYMQ0V k3bQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=6BcRRLzOR9a+EmqTy6ErKRyeDhziM18eSEgk9TnV5Yg=; b=wSuJJ8ZIZSanxRpgtNvj6igUuDkVCbXbe8DfcdAnapU9QJcZiH+Tjs/JmOyvzmE12l bE48LarDErZwMfTchCI/1wDu2T/VE8sAF/s0zOjBfk+Du/1qaQD363iEj0yNJt2KyUyW P6qmhKDSyhrR/eo8jqarrSI0UyudKPSnl2dbUBw8bn9C6Fv+YOXnA4oYuDSxAHsj0JMD O5c4FV9yR18wl/smKA9oN0Zpma/4h53jxMHy+RmlUQOpWAqIu338s40QjdHJPg/XfUyf aUngO39NLb47jUM9IPUa9d1yZuU6muqGN6Xl5PH529X57cNOCm9gMlYOOJ02Yy07oAh6 Z01g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=IQ2Ri285; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cn25si14985271edb.68.2020.07.07.13.40.29; Tue, 07 Jul 2020 13:40:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel-dk.20150623.gappssmtp.com header.s=20150623 header.b=IQ2Ri285; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728863AbgGGUkK (ORCPT + 99 others); Tue, 7 Jul 2020 16:40:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53808 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728493AbgGGUkK (ORCPT ); Tue, 7 Jul 2020 16:40:10 -0400 Received: from mail-io1-xd43.google.com (mail-io1-xd43.google.com [IPv6:2607:f8b0:4864:20::d43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C5007C08C5DC for ; Tue, 7 Jul 2020 13:40:09 -0700 (PDT) Received: by mail-io1-xd43.google.com with SMTP id e64so39736055iof.12 for ; Tue, 07 Jul 2020 13:40:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kernel-dk.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=6BcRRLzOR9a+EmqTy6ErKRyeDhziM18eSEgk9TnV5Yg=; b=IQ2Ri285jvhwaFWJllN7Q9RHvfmiak2Yupr2qv/DT/f+pxd3w1HVP5xWzsWCSPuFda VF5MBmEQHhhRva0nUZay4UpGEXn8CWI5lmUIndEXJaz6DbqnfRJwb1xLlHyxdRr52PST lWdHUF9tLXdy55y6toJX8gYZck7SuqMGVMOBTL3QCSKRdQp6CrhEZPu9ZRpLPUHeIYZ9 AETpjxE475grhRKQ9wYVbKrSYCXCgo8L4fgLpm0c4JuZlO6Abi3lPQ/+AoABCPetJTGp 66spIEzwQWKJc2mPi8baE227fPgWFD+yhmTASzJxKHt6oxQglMxuyJq246/2+vM/lk7a 3Zhw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=6BcRRLzOR9a+EmqTy6ErKRyeDhziM18eSEgk9TnV5Yg=; b=mQ9VuWykIkWlZ+z5hJ2KbOrEgyPMsO1PpbUBMtExDazifl2HKZrHpWvB8NeXIEjuNg yTIDVFIOXifs2rMHP63VE4GPnYPm/YzrfvYvIBIzfmFyUrHZ5JR/Kxjroq63H61OQiBM lq+YcF73gWi6vPArlsEYsTRjvvqOvHfcIFkYASAxDE52Upq/tpZi/TFV5IGvnYWxJMIO AxoWeRtJ3GUqweuIAZYrqL2wNudnSUGjKVkJEbt+ANLP8cx3nlxDDPGOGCPPpLIDfRdT jN1wCega3DTSKPguqhXbGwkTS0k3SAh7BktSjNP3p/I/OaqJehfVBxQMv+m1VGFd7RIN A0Mw== X-Gm-Message-State: AOAM531wezTsTkrT7KR040tWZklPQKcOeKH3bKoHzXA2CC21cW7RctXv TNF0My9HJ+fU/PBaIaEUyGwmJQ== X-Received: by 2002:a5e:c311:: with SMTP id a17mr3667434iok.12.1594154408972; Tue, 07 Jul 2020 13:40:08 -0700 (PDT) Received: from [192.168.1.58] ([65.144.74.34]) by smtp.gmail.com with ESMTPSA id v4sm13400907ilo.44.2020.07.07.13.40.07 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 07 Jul 2020 13:40:08 -0700 (PDT) Subject: Re: [PATCH v3 4/4] io_uring: add support for zone-append To: Kanchan Joshi , Matthew Wilcox Cc: viro@zeniv.linux.org.uk, bcrl@kvack.org, hch@infradead.org, Damien.LeMoal@wdc.com, asml.silence@gmail.com, linux-fsdevel@vger.kernel.org, mb@lightnvm.io, linux-kernel@vger.kernel.org, linux-aio@kvack.org, io-uring@vger.kernel.org, linux-block@vger.kernel.org, Selvakumar S , Nitesh Shetty , Javier Gonzalez References: <1593974870-18919-5-git-send-email-joshi.k@samsung.com> <20200705210947.GW25523@casper.infradead.org> <239ee322-9c38-c838-a5b2-216787ad2197@kernel.dk> <20200706141002.GZ25523@casper.infradead.org> <4a9bf73e-f3ee-4f06-7fad-b8f8861b0bc1@kernel.dk> <20200706143208.GA25523@casper.infradead.org> <20200707151105.GA23395@test-zns> <20200707155237.GM25523@casper.infradead.org> <20200707202342.GA28364@test-zns> From: Jens Axboe Message-ID: <7a44d9c6-bf7d-0666-fc29-32c3cba9d1d8@kernel.dk> Date: Tue, 7 Jul 2020 14:40:06 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: <20200707202342.GA28364@test-zns> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/7/20 2:23 PM, Kanchan Joshi wrote: > On Tue, Jul 07, 2020 at 04:52:37PM +0100, Matthew Wilcox wrote: >> On Tue, Jul 07, 2020 at 08:41:05PM +0530, Kanchan Joshi wrote: >>> On Mon, Jul 06, 2020 at 03:32:08PM +0100, Matthew Wilcox wrote: >>>> On Mon, Jul 06, 2020 at 08:27:17AM -0600, Jens Axboe wrote: >>>>> On 7/6/20 8:10 AM, Matthew Wilcox wrote: >>>>>> On Sun, Jul 05, 2020 at 03:12:50PM -0600, Jens Axboe wrote: >>>>>>> On 7/5/20 3:09 PM, Matthew Wilcox wrote: >>>>>>>> On Sun, Jul 05, 2020 at 03:00:47PM -0600, Jens Axboe wrote: >>>>>>>>> On 7/5/20 12:47 PM, Kanchan Joshi wrote: >>>>>>>>>> From: Selvakumar S >>>>>>>>>> >>>>>>>>>> For zone-append, block-layer will return zone-relative offset via ret2 >>>>>>>>>> of ki_complete interface. Make changes to collect it, and send to >>>>>>>>>> user-space using cqe->flags. >>>>>> >>>>>>>> I'm surprised you aren't more upset by the abuse of cqe->flags for the >>>>>>>> address. >>> >>> Documentation (https://protect2.fireeye.com/url?k=297dbcbf-74aee030-297c37f0-0cc47a31ce52-632d3561909b91fc&q=1&u=https%3A%2F%2Fkernel.dk%2Fio_uring.pdf) mentioned cqe->flags can carry >>> the metadata for the operation. I wonder if this should be called abuse. >>> >>>>>>> Yeah, it's not great either, but we have less leeway there in terms of >>>>>>> how much space is available to pass back extra data. >>>>>>> >>>>>>>> What do you think to my idea of interpreting the user_data as being a >>>>>>>> pointer to somewhere to store the address? Obviously other things >>>>>>>> can be stored after the address in the user_data. >>>>>>> >>>>>>> I don't like that at all, as all other commands just pass user_data >>>>>>> through. This means the application would have to treat this very >>>>>>> differently, and potentially not have a way to store any data for >>>>>>> locating the original command on the user side. >>>>>> >>>>>> I think you misunderstood me. You seem to have thought I meant >>>>>> "use the user_data field to return the address" when I actually meant >>>>>> "interpret the user_data field as a pointer to where userspace >>>>>> wants the address stored". >>>>> >>>>> It's still somewhat weird to have user_data have special meaning, you're >>>>> now having the kernel interpret it while every other command it's just >>>>> an opaque that is passed through. >>>>> >>>>> But it could of course work, and the app could embed the necessary >>>>> u32/u64 in some other structure that's persistent across IO. If it >>>>> doesn't have that, then it'd need to now have one allocated and freed >>>>> across the lifetime of the IO. >>>>> >>>>> If we're going that route, it'd be better to define the write such that >>>>> you're passing in the necessary information upfront. In syscall terms, >>>>> then that'd be something ala: >>>>> >>>>> ssize_t my_append_write(int fd, const struct iovec *iov, int iovcnt, >>>>> off_t *offset, int flags); >>>>> >>>>> where *offset is copied out when the write completes. That removes the >>>>> need to abuse user_data, with just providing the storage pointer for the >>>>> offset upfront. >>>> >>>> That works for me! In io_uring terms, would you like to see that done >>>> as adding: >>>> >>>> union { >>>> __u64 off; /* offset into file */ >>>> + __u64 *offp; /* appending writes */ >>>> __u64 addr2; >>>> }; >>> But there are peformance implications of this approach? >>> If I got it right, the workflow is: - Application allocates 64bit of space, >>> writes "off" into it and pass it >>> in the sqe->addr2 >>> - Kernel first reads sqe->addr2, reads the value to know the intended >>> write-location, and stores the address somewhere (?) to be used during >>> completion. Storing this address seems tricky as this may add one more >>> cacheline (in io_kiocb->rw)? >> >> io_kiocb is: >> /* size: 232, cachelines: 4, members: 19 */ >> /* forced alignments: 1 */ >> /* last cacheline: 40 bytes */ >> so we have another 24 bytes before io_kiocb takes up another cacheline. >> If that's a serious problem, I have an idea about how to shrink struct >> kiocb by 8 bytes so struct io_rw would have space to store another >> pointer. > Yes, io_kiocb has room. Cache-locality wise whether that is fine or > it must be placed within io_rw - I'll come to know once I get to > implement this. Please share the idea you have, it can come handy. Except it doesn't, I'm not interested in adding per-request type fields to the generic part of it. Before we know it, we'll blow past the next cacheline. If we can find space in the kiocb, that'd be much better. Note that once the async buffered bits go in for 5.9, then there's no longer a 4-byte hole in struct kiocb. >> ... we've just done an I/O. Concern about an extra pointer access >> seems misplaced? > > I was thinking about both read-from (submission) and write-to > (completion) from user-space pointer, and all those checks APIs > (get_user, copy_from_user) perform.....but when seen against I/O (that > too direct), it does look small. Down the line it may matter for cached-IO > but I get your point. Really don't think that matters at all. -- Jens Axboe