Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1046102ybl; Thu, 22 Aug 2019 08:35:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqzvf2bhqybw1ZaFRNq+mhoD25sd6RQVYj6VNkLGEPuNpFdtHaTxFhQBiyZ4dPGxbU7OZRCU X-Received: by 2002:a17:902:b715:: with SMTP id d21mr25404442pls.50.1566488114969; Thu, 22 Aug 2019 08:35:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566488114; cv=none; d=google.com; s=arc-20160816; b=uhTBWkKTvPOKsMIJ7LLCvsneJwq/fP6U+KQOxZ5nEf+3jM5FIxw8FfDosLstVbeipR yNqu79X4VXwivS3DzEMCLqULo7yoX9AS/wYnAosJnBU28SGR83tbvPjj/+qsRxoHJfDr cqSFK+z6NIE4JP2vTcB7BS23IjdK3h/ioWpoUG08quZStzI4CBW+WSEKjkqSPeRii5oB Qn0GyZOaZQFABI0hITUCnQqRrUv1apwUJcdO+o+DLSZ4yVNzvWGxT8WTyH53q9HHOZ7N 2KzhG0TpVgib8TYgcJhEP9C1zWzRvRWSVTD3TsV6nX7Di7y8ClMzVeLIHbHbGE7A2B+R xEVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject; bh=AVY//BC3PZ5rHxrhKVv+j99CwaGhicQPPomAVsBd8wA=; b=ao7RlnTXcS8u8Unvjp0rTAUQlgjjuDqpqNiEWvy/o1mM3mjj2/qOIulKpIqNmZkiii j22G+l3L6IPeD+75v+m6g6+Q89+HBIN2M4oPJzdxLaAbNFE7Z+gwVFKwECJTzHjUF6r7 1TnSxzgIxu0QKlz5dzeRXykd4qhQRgP0yxGItJRfdC6SvBcuFPUa7KS4A+Fgkw8IMNHs j2nVthNAijkWctE92YHzW6eBrMbBtMxBJZK7exT92TqTf3TxhkhYO55/klzwrNDwKeef K4ikHHYy3wun1Ek3BNNQP5aPn9OJVjelN4urdvbh73cpep1bbl0CjEoaknQhWfF8XI1H pr4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h97si12334491plb.402.2019.08.22.08.34.53; Thu, 22 Aug 2019 08:35:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387412AbfHVOLg (ORCPT + 99 others); Thu, 22 Aug 2019 10:11:36 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:62110 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725941AbfHVOLf (ORCPT ); Thu, 22 Aug 2019 10:11:35 -0400 Received: from pps.filterd (m0098393.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x7MDofhS073567 for ; Thu, 22 Aug 2019 10:11:34 -0400 Received: from e06smtp01.uk.ibm.com (e06smtp01.uk.ibm.com [195.75.94.97]) by mx0a-001b2d01.pphosted.com with ESMTP id 2uhuf4baka-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 22 Aug 2019 10:11:34 -0400 Received: from localhost by e06smtp01.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 22 Aug 2019 15:11:32 +0100 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp01.uk.ibm.com (192.168.101.131) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 22 Aug 2019 15:11:28 +0100 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x7MEBRDf27852850 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 22 Aug 2019 14:11:27 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id A941CA405E; Thu, 22 Aug 2019 14:11:27 +0000 (GMT) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 70A94A407B; Thu, 22 Aug 2019 14:11:26 +0000 (GMT) Received: from localhost.localdomain (unknown [9.124.31.57]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 22 Aug 2019 14:11:26 +0000 (GMT) Subject: Re: [PATCH 0/5] ext4: direct IO via iomap infrastructure To: Matthew Bobrowski , tytso@mit.edu, jack@suse.cz, adilger.kernel@dilger.ca Cc: linux-ext4@vger.kernel.org, linux-fsdevel@vger.kernel.org, hch@infradead.org, aneesh.kumar@linux.ibm.com References: <20190812173150.AF04F5204F@d06av21.portsmouth.uk.ibm.com> <20190813111004.GA12682@poseidon.bobrowski.net> <20190813122723.AE6264C040@d06av22.portsmouth.uk.ibm.com> <20190821131405.GC24417@poseidon.bobrowski.net> <20190822120015.GA3330@poseidon.bobrowski.net> From: Ritesh Harjani Date: Thu, 22 Aug 2019 19:41:25 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20190822120015.GA3330@poseidon.bobrowski.net> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 19082214-4275-0000-0000-0000035BEC71 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19082214-4276-0000-0000-0000386E12DF Message-Id: <20190822141126.70A94A407B@d06av23.portsmouth.uk.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-08-22_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1906280000 definitions=main-1908220146 Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On 8/22/19 5:30 PM, Matthew Bobrowski wrote: > On Wed, Aug 21, 2019 at 11:14:07PM +1000, Matthew Bobrowski wrote: >> On Tue, Aug 13, 2019 at 05:57:22PM +0530, RITESH HARJANI wrote: >>> But what I meant was this (I may be wrong here since I haven't >>> really looked into it), but for my understanding I would like to >>> discuss this - >>> >>> So earlier with this flag(EXT4_STATE_DIO_UNWRITTEN) we were determining on >>> whether a newextent can be merged with ex1 in function >>> ext4_extents_can_be_merged. But now since we have removed that flag we have >>> no way of knowing that whether this inode has any unwritten extents or not >>> from any DIO path. >>> >>> What I meant is isn't this removal of setting/unsetting of >>> flag(EXT4_STATE_DIO_UNWRITTEN) changing the behavior of this func - >>> ext4_extents_can_be_merged? >> >> OK, I'm stuck and looking for either clarity, revalidation of my >> thought process, or any input on how to solve this problem for that >> matter. >> >> In the current ext4 direct IO implementation, the dynamic state flag >> EXT4_STATE_DIO_UNWRITTEN is set/unset for synchronous direct IO >> writes. On the other hand, the flag EXT4_IO_END_UNWRITTEN is set/unset >> for ext4_io_end->flag, and the value of i_unwritten is >> incremented/decremented for asynchronous direct IO writes. All >> mechanisms by which are used to track and determine whether the inode, >> or an IO in flight against a particular inode have any pending >> unwritten extents that need to be converted after the IO has >> completed. In addition to this, we have ext4_can_extents_be_merged() >> performing explicit checks against both EXT4_STATE_DIO_UNWRITTEN and >> i_unwritten and using them to determine whether it can or cannot merge >> a requested extent into an existing extent. >> >> This is all fine for the current direct IO implementation. However, >> while switching the direct IO code paths over to make use of the iomap >> infrastructure, I believe that we can no longer simply track whether >> an inode has unwritten extents needing to be converted by simply >> setting and checking the EXT4_STATE_DIO_UNWRITTEN flag on the >> inode. The reason being is that there can be multiple direct IO >> operations to unwritten extents running against the inode and we don't >> particularly distinguish synchronous from asynchronous writes within >> ext4_iomap_begin() as there's really no need. So, the only way to >> accurately determine whether extent conversion is deemed necessary for >> an IO operation whether it'd be synchronous or asynchronous is by >> checking the IOMAP_DIO_UNWRITTEN flag within the ->end_io() >> callback. I'm certain that this portion of the logic is correct, but >> we're still left with some issues when it comes to the checks that I >> previously mentioned in ext4_can_extents_be_merged(), which is the >> part I need some input on. >> >> I was doing some thinking and I don't believe that making use of the >> EXT4_STATE_DIO_UNWRITTEN flag is the solution at all here. This is not >> only for reasons that I've briefly mentioned above, but also because >> of the fact that it'll probably lead to a lot of inaccurate judgements >> while taking particular code paths and some really ugly code that >> creeps close to the definition of insanity. Rather, what if we solve >> this problem by continuing to just use i_unwritten to keep track of >> all the direct IOs to unwritten against running against an inode? >> Within ext4_iomap_begin() post successful creation of unwritten >> extents we'd call atomic_inc(&EXT4_I(inode)->i_unwritten) and >> subsequently within the ->end_io() callback whether we take the >> success or error path we'd call >> atomic_dec(&EXT4_I(inode)->i_unwritten) accordingly? This way we can >> still rely on this value to be used in the check within >> ext4_can_extents_be_merged(). Open for alternate suggestions if anyone >> has any... > > Actually, no... > > I've done some more thinking and what I suggested above around the use > of i_unwritten will also not work properly. Using iomap > infrastructure, there is the possibility of calling into the > ->iomap_begin() more than once for a single direct IO operation. This > means that by the time we even get to decrementing i_unwritten in the > ->end_io() callback after converting the unwritten extents we're > already running the possibility of i_unwritten becoming unbalanced > really quickly and staying that way. This also means that the > statement checking i_unwritten in ext4_can_extents_be_merged() will be > affected and potentially result in it being evaluated incorrectly. I > was thinking that we could just decrement i_unwritten in > ->iomap_end(), but that seems to me like it would be racy and also > lead to incorrect results. At this point I'm out of ideas on how to > solve this, so any other ideas would be appreciated! I will let others also comment, if someone has any other better approach. 1. One approach is to add the infrastructure in iomap with iomap_dio->private which is filesystem specific pointer. This can be updated by filesystem in ->iomap_begin call into iomap->private. And in case of iomap_dio_rw, this iomap->private will be copied to iomap_dio->private if not already set. But I think this will eventually become hacky in the sense when you will have to determine on whether the dio->private is already set or not when iomap_apply will be called second time. It will become a problem with AIO DIO in ext4 since we use i_unwritten which tells us whether there is any unwritten extent but it does not tell whether this unwritten extent is due to a DIRECT AIO DIO in progress or a buffered one. So we can ignore this approach - unless you or someone else have some good design ideas to build on top of above. 2. Second approach which I was thinking is to track only those extents which are marked unwritten and are under IO. This can be done in ext4_map_blocks. This way we will not have to track a particular inode has any unwritten extents or not, but it will be extent based. Something similar was also done a while ago. Do you think this approach will work in our case? So with this extents will be scanned in extent status tree to see if any among those are under IO and are unwritten in func ext4_can_extents_be_merged. https://patchwork.ozlabs.org/patch/1013837/ -Ritesh