Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp10949573ybl; Fri, 27 Dec 2019 05:10:44 -0800 (PST) X-Google-Smtp-Source: APXvYqy7uJw/TnmIjL/o238dUT9gJ8JQewY6Dac8O78ZXD5DJgPdOEC8X5vSHeHxEypwc2WEhAtu X-Received: by 2002:a05:6830:451:: with SMTP id d17mr54147470otc.53.1577452243947; Fri, 27 Dec 2019 05:10:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577452243; cv=none; d=google.com; s=arc-20160816; b=ujVLbbrVfV5655rylKtwABLJxUUCHPdrXXQ5N79fMBA4UEvw5HiJ4d1WlF6lhCU4He lp+ko5PidF5f/xDYmrGvvK6Ho1RqrCplcfRR/EoXEkf4iWRQON00yGw8iPfwXu56e2ah YcXy9SFDmSzc/7iLA/u1dtxu1B0cXwKsgxZT1HcwfMgR5KEbzksu1xwJ94Mjc7Ih4fll zKOzU9jpvA+yqJeSAjf3EXmJ4DP6glnkBuheLxSEosauiz1UU6GY9izJaHBUspy0bvwN 3+Hb7mdvq4DEcvA40YRBZCO6m61F/PQxWQ0w/y+nuozlXpouDoI9tGkt5p38r8YAzf19 JRtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:cc:to:subject:from; bh=QYs9ryBpJ5RdTg0Ye/OAUoK1OmlZKiJlM8D3i+rcR8c=; b=ZLGAMh4yXymru0w9NrKlnHyRMhYUPLmFfzWH6If7LqJGGM/aS6JkCc4B/FkWOeJGWs rYUYg9VuP8BJHFpkcjl98CHlrHDikUu5071Xh9Ab5gBC+pWeZU2tBWLpdNu6Fp9cBu3/ ZGNleuTXWEHvQrNML4aeqdgu8Ik/ELvQYZ8T2uTjQ3IXpuLjrIdlHrs95+4YJKvoJVOT jMWqoA6UB3OYzERHmIpvVXMhI2dxC+53yTjWwgPB8xu7suzGGWU1X9Wi4t5tKaO+yjit KBuW3y3vR0DO5Q2F1yzzBG8daxoUK9LagfujsTAbOPy63eYRHZsyoR0PcXxGfQpxelLG 9GTg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y23si16784470oti.65.2019.12.27.05.10.32; Fri, 27 Dec 2019 05:10:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726354AbfL0NKb (ORCPT + 99 others); Fri, 27 Dec 2019 08:10:31 -0500 Received: from out30-57.freemail.mail.aliyun.com ([115.124.30.57]:54376 "EHLO out30-57.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726053AbfL0NKb (ORCPT ); Fri, 27 Dec 2019 08:10:31 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R201e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01f04427;MF=joseph.qi@linux.alibaba.com;NM=1;PH=DS;RN=4;SR=0;TI=SMTPD_---0Tm24V6j_1577452226; Received: from JosephdeMacBook-Pro.local(mailfrom:joseph.qi@linux.alibaba.com fp:SMTPD_---0Tm24V6j_1577452226) by smtp.aliyun-inc.com(127.0.0.1); Fri, 27 Dec 2019 21:10:27 +0800 From: Joseph Qi Subject: Re: Discussion: is it time to remove dioread_nolock? To: "Theodore Y. Ts'o" , Ext4 Developers List Cc: Liu Bo , Xiaoguang Wang References: <20191226153118.GA17237@mit.edu> Message-ID: Date: Fri, 27 Dec 2019 21:10:26 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:60.0) Gecko/20100101 Thunderbird/60.9.1 MIME-Version: 1.0 In-Reply-To: <20191226153118.GA17237@mit.edu> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Hi Ted, After applying Ritesh's patches, from my test result, there is no obvious performance difference between default mount options and with dioread_lock (delalloc or nodelalloc). I'm not sure if dioread_nolock was used for other purpose in the scenario reported by Bo Liu. Maybe Xiaoguang could give some inputs. Thanks, Joseph On 19/12/26 23:31, Theodore Y. Ts'o wrote: > With inclusion of Ritesh's inode lock scalability patches[1], the > traditional performance reasons for dioread_nolock --- namely, > removing the need to take an exclusive lock for Direct I/O read > operations --- has been removed. > > [1] https://lore.kernel.org/r/20191212055557.11151-1-riteshh@linux.ibm.com > > So... is it time to remove the code which supports dioread_nolock? > Doing so would simplify the code base, and reduce the test matrix. > This would also make it easier to restructure the write path when > allocating blocks so that the extent tree is updated after writing out > the data blocks, by clearing away the underbrush of dioread nolock > first. > > If we do this, we'd leave the dioread_nolock mount option for > backwards compatibility, but it would be a no-op and not actually do > anything. > > Any objections before I look into ripping out dioread_nolock? > > The one possible concern that I considered was for Alibaba, which was > doing something interesting with dioread_nolock plus nodelalloc. But > looking at Liu Bo's explanation[2], I believe that their workload > would be satisfied simply by using the standard ext4 mount options > (that is, the default mode has the performance benefits when doing > parallel DIO reads, and so the need for nodelalloc to mitigate the > tail latency concerns which Alibaba was seeing in their workload would > not be needed). Could Liu or someone from Alibaba confirm, perhaps > with some benchmarks using their workload? > > [2] https://lore.kernel.org/linux-ext4/20181121013035.ab4xp7evjyschecy@US-160370MP2.local/ > > - Ted >