Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2400144ioo; Sat, 28 May 2022 12:25:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwIl78mPF8M/AMx+3y4QQGo0/Ta0UZLpBvlwVz/snGyJ32QnvfiuzXGsUjZGDROcUxD9YAm X-Received: by 2002:a17:902:bd05:b0:15f:19a0:95ed with SMTP id p5-20020a170902bd0500b0015f19a095edmr48898277pls.31.1653765941195; Sat, 28 May 2022 12:25:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653765941; cv=none; d=google.com; s=arc-20160816; b=ixpA84ImsDZabXYQf9qM5ijLmSapy2S6ReCDF/QvRm3uMNFlUJM3dj4Zhqekx1pJiG eXMky9oqnm+NwQfY7ElIJ3wqnYANCBBJpl9KfJ89tYw4XjYDWNAs++e8Tb8HdgsnUVxB N2fAI82Q5qtWNQ2V8B1yAXqBe8S7j4tN/zLqjRqhQcvcXZugbZa6s6bPvqy17Z21NQ4R E3E03AQjx6XIYnsuwa/7xPy+xOKjZJtdVPbsAFiJPPdswhvPV9ac8JwJvvd2DIeAehjl Rs0kAggjmA+DzIQp5NEsBs9to3m70sIeOCjDpwckCAeJTIasQnULxgWDO6UAIoGd5yyy vjsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=AV4y5SEzJsR6E+KByT3P7iY469nLwsdEKuRdDlRsMPU=; b=TeziHpE0JCFu/BJuHjfnyjwQf00FinlfFdGAiEOp+lw3zWFRzXm0vjdD07ljYMuMuG 3qHXe1ua7Qq4Sz6zjR6LaSd9rCns4O8bfzuGydM13OQ0uqG74bsBfue1+MQqmJnsMHJI lKSHMvAEgWHU6HOU55C4C/Qa40EFkO2FOnpm3e8ivWxbQkznp9FBMYHq8wXXh2ObW+bY UWG+bPjfNBZJd2Y0dH8tdEu3wviTNJM5oHKo3Bh+fibQPyVbkvjj2wS/1v8np0SZs+Up e/cMmrgsRlTbvw+I+AVNCBz8xrvXWuSY4NBkgb7Rc6emnJ4hvE+CvTwqCh9VXswQl1rA cZPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=o59FWhTB; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id r2-20020a17090a2e8200b001e0a486d9desi6866710pjd.116.2022.05.28.12.25.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 May 2022 12:25:41 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=o59FWhTB; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9D00F4F462; Sat, 28 May 2022 11:55:31 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355314AbiE1BGQ (ORCPT + 99 others); Fri, 27 May 2022 21:06:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37910 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232804AbiE1BGP (ORCPT ); Fri, 27 May 2022 21:06:15 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DF6826AA64; Fri, 27 May 2022 18:06:12 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 931BBB82649; Sat, 28 May 2022 01:06:11 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E7031C385A9; Sat, 28 May 2022 01:06:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1653699970; bh=18BQtAI7UY3dFMkftgBm1ccQswI/KXvPUHOikSPmrb4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=o59FWhTB5aBKGyxxA4jC5+5FM/l7Wa+LG5ROq7ni3XzpOQv4CAYmYgaJUBgR76roS Mn6wgCjB1l7mUM2Y4f8gsxwspMHJfvbF4DeWAPSzU2oeSKHIjwW9aPuY6BsqxGpkxB SKgEqBPgY9ZR6lByCGvf9BlO8Bym4BQGaIAm2DUXqvyrw/GjXR9NEKA6v3R+PM+OW0 tG+vg4bsYOvmnE7ZrRlYNNOr1g4RILeHwGqr98U/xuJ8UwyT91o1gev6PNVtKgmX+L PQYUxInaZiIguhACZBoJtudnzRZUzYCCpSAsBo0SLhv0OWCz6e3Vm33wBkq3L/ZixK rGTyihN4QnT9A== Date: Fri, 27 May 2022 18:06:08 -0700 From: Jaegeuk Kim To: Eric Biggers Cc: linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-block@vger.kernel.org, linux-xfs@vger.kernel.org Subject: Re: [PATCH] f2fs: add sysfs entry to avoid FUA Message-ID: References: <20220527205955.3251982-1-jaegeuk@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/27, Eric Biggers wrote: > [+Cc linux-block for FUA, and linux-xfs for iomap] > > On Fri, May 27, 2022 at 01:59:55PM -0700, Jaegeuk Kim wrote: > > Some UFS storage gives slower performance on FUA than write+cache_flush. > > Let's give a way to manage it. > > > > Signed-off-by: Jaegeuk Kim > > Should the driver even be saying that it has FUA support in this case? If the > driver didn't claim FUA support, that would also solve this problem. I think there's still some benefit to use FUA such as small chunk writes for checkpoint. > > > --- > > Documentation/ABI/testing/sysfs-fs-f2fs | 7 +++++++ > > fs/f2fs/data.c | 2 ++ > > fs/f2fs/f2fs.h | 1 + > > fs/f2fs/sysfs.c | 2 ++ > > 4 files changed, 12 insertions(+) > > > > diff --git a/Documentation/ABI/testing/sysfs-fs-f2fs b/Documentation/ABI/testing/sysfs-fs-f2fs > > index 9b583dd0298b..cd96b09d7182 100644 > > --- a/Documentation/ABI/testing/sysfs-fs-f2fs > > +++ b/Documentation/ABI/testing/sysfs-fs-f2fs > > @@ -434,6 +434,7 @@ Date: April 2020 > > Contact: "Daeho Jeong" > > Description: Give a way to change iostat_period time. 3secs by default. > > The new iostat trace gives stats gap given the period. > > + > > What: /sys/fs/f2fs//max_io_bytes > > Date: December 2020 > > Contact: "Jaegeuk Kim" > > @@ -442,6 +443,12 @@ Description: This gives a control to limit the bio size in f2fs. > > whereas, if it has a certain bytes value, f2fs won't submit a > > bio larger than that size. > > > > +What: /sys/fs/f2fs//no_fua_dio > > +Date: May 2022 > > +Contact: "Jaegeuk Kim" > > +Description: This gives a signal to iomap, which should not use FUA for > > + direct IOs. Default: 0. > > iomap is an implementation detail, so it shouldn't be mentioned in UAPI > documentation. UAPI documentation should describe user-visible behavior only. Ok. > > > + > > What: /sys/fs/f2fs//stat/sb_status > > Date: December 2020 > > Contact: "Chao Yu" > > diff --git a/fs/f2fs/data.c b/fs/f2fs/data.c > > index f5f2b7233982..23486486eab2 100644 > > --- a/fs/f2fs/data.c > > +++ b/fs/f2fs/data.c > > @@ -4153,6 +4153,8 @@ static int f2fs_iomap_begin(struct inode *inode, loff_t offset, loff_t length, > > if ((inode->i_state & I_DIRTY_DATASYNC) || > > offset + length > i_size_read(inode)) > > iomap->flags |= IOMAP_F_DIRTY; > > + if (F2FS_I_SB(inode)->no_fua_dio) > > + iomap->flags |= IOMAP_F_DIRTY; > > This is overloading the IOMAP_F_DIRTY flag to mean something other than dirty. > Perhaps this flag needs to be renamed, or a new flag should be added? I'm not sure it's acceptable to add another flag for f2fs only. > > > diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h > > index e10838879538..c2400ea0080b 100644 > > --- a/fs/f2fs/f2fs.h > > +++ b/fs/f2fs/f2fs.h > > @@ -1671,6 +1671,7 @@ struct f2fs_sb_info { > > int dir_level; /* directory level */ > > int readdir_ra; /* readahead inode in readdir */ > > u64 max_io_bytes; /* max io bytes to merge IOs */ > > + int no_fua_dio; /* avoid FUA in DIO */ > > Make this a bool? Done. > > > diff --git a/fs/f2fs/sysfs.c b/fs/f2fs/sysfs.c > > index 4c50aedd5144..24d628ca92cc 100644 > > --- a/fs/f2fs/sysfs.c > > +++ b/fs/f2fs/sysfs.c > > @@ -771,6 +771,7 @@ F2FS_RW_ATTR(F2FS_SBI, f2fs_sb_info, iostat_period_ms, iostat_period_ms); > > #endif > > F2FS_RW_ATTR(F2FS_SBI, f2fs_sb_info, readdir_ra, readdir_ra); > > F2FS_RW_ATTR(F2FS_SBI, f2fs_sb_info, max_io_bytes, max_io_bytes); > > +F2FS_RW_ATTR(F2FS_SBI, f2fs_sb_info, no_fua_dio, no_fua_dio); > > F2FS_RW_ATTR(F2FS_SBI, f2fs_sb_info, gc_pin_file_thresh, gc_pin_file_threshold); > > F2FS_RW_ATTR(F2FS_SBI, f2fs_super_block, extension_list, extension_list); > > #ifdef CONFIG_F2FS_FAULT_INJECTION > > @@ -890,6 +891,7 @@ static struct attribute *f2fs_attrs[] = { > > #endif > > ATTR_LIST(readdir_ra), > > ATTR_LIST(max_io_bytes), > > + ATTR_LIST(no_fua_dio), > > Where is it validated that only valid values (0 or 1) can be written to this > file? Added. > > - Eric