Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp411945rwb; Fri, 18 Nov 2022 03:22:47 -0800 (PST) X-Google-Smtp-Source: AA0mqf7HZclUiKhAzheBnelew8xA8gCXKQYbvVieRriMSBrRdjmHKGh0UFK5ykcZ6D2nDq+kZOdh X-Received: by 2002:a62:840e:0:b0:569:9649:1e08 with SMTP id k14-20020a62840e000000b0056996491e08mr7537588pfd.0.1668770566839; Fri, 18 Nov 2022 03:22:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668770566; cv=none; d=google.com; s=arc-20160816; b=IDHnmvomkN6FbKWgleuabdTyD9mikSdelVznre4+IRLDB7Nk8oJ9ISlA+ahQMi5oaA wwqsGrciTGFQ1eGIJQp1XVWgI5aqz5/5mouOJJDw9hV8rTEPPcKQzS3+ATsFVUBZ7MgY EcGRc3LF26Rz7CQRpAoJRB27IRlZACcJ0962QVwsM4m+T3NORX8Lpz0r1S0V/de377Ul +TtCXeB7wYYtuJ/8/mDzZCejpjGcFqinkwQS78rdb7wY+zT41HwrALJYXXmhPQ+FUaH9 a6lrmCbOwztHpbiwDHGXAIa6nSPGT4ut69DXtrf5IeOyelqC2o8EiRzvuJfeb3GQAglR 5Bmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :organization:from:references:cc:to:content-language:subject :user-agent:mime-version:date:message-id:dkim-signature; bh=FSF4VDmHEPBN58FNnObugxUCsQuNfy5hNEgOQ6klCrY=; b=js+Ljxeq+rxlAhwLvfuulEXPFAKXCyox4hwuO35h0UzmTTSW7GRmynkcE1JEWSJJxl XIYyByMwsf5R2Ulfj0w+RMcfSiFyB6NijZtIM5fVEitDxhlLZqwlQiNwdPFQreHeP9BN fCgQaxzt/LRoKswtx0VsMxtmL3geKNJ97fGCkO/g/yKhl7Ffcn+rRR21Pd7rLN3E4Bqu fyUbySNs+IJ4MYxKpuMcmURHwD3QiILFPhO7SFUP4vttBVGZeKJQ2RqbhiyPfLjqf70S Ppay18Clzf3jdvEnpEcdQXY5OwepgDwBg+UJfrgqfQIwEU8ri8BAN5pVnMZssWGFkPS6 gk0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=A2yDO7DT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f1-20020a056a0022c100b00571d0fe4bf9si3562209pfj.197.2022.11.18.03.22.35; Fri, 18 Nov 2022 03:22:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=A2yDO7DT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241490AbiKRKMI (ORCPT + 91 others); Fri, 18 Nov 2022 05:12:08 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42946 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241305AbiKRKMF (ORCPT ); Fri, 18 Nov 2022 05:12:05 -0500 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E7D9A71F31; Fri, 18 Nov 2022 02:12:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1668766324; x=1700302324; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=QgYXbxEu9fjqnUNDC7xlyK4ll/2DAkLkNnEmJFF8XoY=; b=A2yDO7DT6oo967MpEpcSyvk/jtiVt93eQsO3ZquihlCKEidYESJzZcqD S8famFjQVswEHSulKB8L73ery5fZRDdR19Y+NiR0A9AjO2+SjMHnwB2BR 5uiNZqJbfDFldPUI4DMZg+SnrHaFIAbIMkhxEXmkmimyLP5da4FxOebb6 MPjOWh2WgiTaiYktiNacHauQ1N4CW049gCwkoNN/N690HbzqG4H80dfW8 c6ovIEjC1l9yw41TmvdX4oh+zVVLNnrb21VbZnowTq74hlR/Nrp+YFKne KDOTutfUgMydq8vFdhdiqrHcCO+rOuqKQUiPyM95VxRHeF5K96spg8it+ w==; X-IronPort-AV: E=McAfee;i="6500,9779,10534"; a="339942602" X-IronPort-AV: E=Sophos;i="5.96,173,1665471600"; d="scan'208";a="339942602" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Nov 2022 02:12:04 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10534"; a="671272729" X-IronPort-AV: E=Sophos;i="5.96,173,1665471600"; d="scan'208";a="671272729" Received: from ahunter6-mobl1.ger.corp.intel.com (HELO [10.0.2.15]) ([10.252.61.138]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Nov 2022 02:11:59 -0800 Message-ID: Date: Fri, 18 Nov 2022 12:11:54 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0 Thunderbird/102.5.0 Subject: Re: [PATCH V2 0/2] mmc: block: Support Host to control FUA Content-Language: en-US To: Wenchao Chen Cc: ulf.hansson@linaro.org, orsonzhai@gmail.com, baolin.wang@linux.alibaba.com, zhang.lyra@gmail.com, axboe@kernel.dk, avri.altman@wdc.com, kch@nvidia.com, CLoehle@hyperstone.com, vincent.whitchurch@axis.com, bigeasy@linutronix.de, s.shtylyov@omp.ru, michael@allwinnertech.com, linux-mmc@vger.kernel.org, linux-kernel@vger.kernel.org, megoo.tang@gmail.com, lzx.stg@gmail.com References: <20221021073025.18831-1-wenchao.chen666@gmail.com> <22499ab9-340d-7059-b3ff-45342b0810cf@intel.com> From: Adrian Hunter Organization: Intel Finland Oy, Registered Address: PL 281, 00181 Helsinki, Business Identity Code: 0357606 - 4, Domiciled in Helsinki In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_HI,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/11/22 09:58, Wenchao Chen wrote: > Hi Hunter > Thank you for your review! > I'm sorry to reply you so late because I've been too busy lately. > > On Fri, Oct 21, 2022 at 11:50 PM Adrian Hunter wrote: >> >> On 21/10/22 10:30, Wenchao Chen wrote: >>> From: Wenchao Chen >>> >>> Summary >>> ======= >>> These patches[1] supports the host to turn off FUA. >>> >>> About FUA, roughly deal with the following two parts: >>> 1) FUA(Forced Unit Access): >>> - The REQ_FUA flag can be OR ed into the r/w flags of a bio submitted from the >>> filesystem and will make sure that I/O completion for this request is only >>> signaled after the data has been committed to non-volatile storage. >>> >>> 2) In emmc, FUA is represented as Reliable write. code show as below: >>> static void mmc_blk_data_prep(struct mmc_queue *mq, struct mmc_queue_req *mqrq, >>> int recovery_mode, bool *do_rel_wr_p, bool *do_data_tag_p) >>> { >>> ... >>> /* >>> * Reliable writes are used to implement Forced Unit Access and >>> * are supported only on MMCs. >>> */ >>> do_rel_wr = (req->cmd_flags & REQ_FUA) && >>> rq_data_dir(req) == WRITE && >>> (md->flags & MMC_BLK_REL_WR); >>> ... >>> } >>> >>> Patch structure >>> =============== >>> patch#1: for block >>> patch#2: for sdhci-sprd >>> >>> Tests >>> ===== >>> Ran 'AndroBench' to evaluate the performance: >> >> It would be good to have more details e.g. >> What file system? What block size? What journal size? >> What file size? What record size? >> > > What file system? > F2FS > What block size? > Sequential: 32768KB, Random: 4KB > What file size? > 64MB > >>> 1. fua_disable = 1 >>> /sys/block/mmcblk0/queue # cat fua 0 >>> I tested 5 times for each case and output a average speed. >>> >>> 1) Sequential read: >>> Speed: 266.8MiB/s, 265.1MiB/s, 262.9MiB/s, 268.7MiB/s, 265.2MiB/s >>> Average speed: 265.74MiB/s >>> >>> 2) Random read: >>> Speed: 98.75MiB/s, 98.7MiB/s, 98.5MiB/s, 99.4MiB/s, 98.7MiB/s >>> Average speed: 98.81MiB/s >>> >>> 3) Sequential write: >>> Speed: 199.94MiB/s, 199.1MiB/s, 205.5MiB/s, 206.5MiB/s, 191.5MiB/s >>> Average speed: 200.5MiB/s >>> >>> 4) Random write: >>> Speed: 68.6MiB/s, 71.8MiB/s, 77.1MiB/s, 64.8MiB/s, 69.3MiB/s >>> Average speed: 70.32MiB/s >>> >>> 2. fua_disable = 0 (default 0) >>> /sys/block/mmcblk0/queue # cat fua 1 >>> I tested 5 times for each case and output a average speed. >>> >>> 1) Sequential read: >>> Speed: 259.3MiB/s, 258.8MiB/s, 258.2MiB/s, 259.5MiB/s, 253.5MiB/s >>> Average speed: 257.86MiB/s >>> >>> 2) Random read: >>> Speed: 98.9MiB/s, 101MiB/s, 101MiB/s, 99MiB/s, 101.1MiB/s >>> Average speed: 100.2MiB/s >>> >>> 3) Sequential write: >>> Speed: 153.7MiB/s, 146.2MiB/s, 151.2MiB/s, 148.8MiB/s, 147.5MiB/s >>> Average speed: 149.48MiB/s >>> >>> 4) Random write: >>> Speed: 12.9MiB/s, 12.3MiB/s, 12.6MiB/s, 12.8MiB/s, 12.8MiB/s >>> Average speed: 12.68MiB/s >> >> Is every write being sync'ed of just sync at the end? >> > > /* > * Reliable writes are used to implement Forced Unit Access and > * are supported only on MMCs. > */ > do_rel_wr = (req->cmd_flags & REQ_FUA) && > rq_data_dir(req) == WRITE && > (md->flags & MMC_BLK_REL_WR); > > A Reliable Write access shall force the data to be written to the > nonvolatile storage。 > It will consume more time. Reliable write is slow because it guarantees not to tear the write. The issue is torn writes, not just FUA. > >>> >>> According to the above data, disable FUA (fua_disable = 1) improves the >>> performance: >>> 1)Sequential read improved by 3%. >>> 2)Random read were down 1%. >> >> FUA should not affect reads. If it is, you may want to investigate how. >> >>> 3)Sequential write improved by 34%. >>> 4)Random write improved by 454%. >>> Therefore, it is recommended to support the host to control FUA. >>> >>> Reference >>> ========= >>> [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/block/writeback_cache_control.rst >>> [2] Embedded Multi-Media Card (e•MMC) Electrical Standard (5.1)'' >> >> You do not seem to have considered data integrity. >> >> Regular disks are assumed to provide atomic sector writes. That is, a sector has either the old data or the new data, but not some corrupt mixture. >> >> mmc does not have that assumption, which is presumably why Reliable Write has been used instead. Although that idea appears to have been thrown away for devices with no cache by commit 08ebf903af57 ("mmc: core: Fixup support for writeback-cache for eMMC and SD"). >> >> File systems can use FUA to mark a successful journal flush. Whether or not getting a torn sector at that point will corrupt the file system recovery is presumably file system specific, and maybe specific to file system options e.g. the use of checksums. >> >> It may well be that a file system can survive a torn sector at that point, or that user space would prefer to take the risk in order to get better performance. In either of those cases, it is not really a decision for the host controller driver. >> > > Considering the data integrity, we did a random power-down test, and > the experimental results were good. > > FUA can only reduce data loss under abnormal conditions, but cannot > prevent data loss under abnormal conditions. > > I think there should be a balance between FUA and NO FUA, but > filesystems seem to favor FUA. > > FUA brings a drop in random write performance. If enough tests are > done, NO FUA is acceptable. > > I found a discussion about FUA: > https://lore.kernel.org/linux-f2fs-devel/20220528051238.GX1098723@dread.disaster.area/ > > UFS reference: > https://lore.kernel.org/linux-scsi/20220531201053.3300018-1-jaegeuk@kernel.org/ > You really need buy-in from more people, especially file system developers. I suggest you try F2FS people to start with. Please be clear though: Reliable Write protects against torn writes. If enough stakeholders agree that file systems can handle the torn writes anyway, then we could presumably drop using Reliable Write for FUA. >>> >>> Wenchao Chen (2): >>> mmc: block: Support Host to control FUA >>> mmc: sdhci-sprd: enable fua_disable for SPRDSDHCI >>> >>> drivers/mmc/core/block.c | 3 ++- >>> drivers/mmc/host/sdhci-sprd.c | 2 ++ >>> include/linux/mmc/host.h | 3 +++ >>> 3 files changed, 7 insertions(+), 1 deletion(-) >>> >>