* Loophole in async page I/O @ 2020-10-12 21:13 Matthew Wilcox 2020-10-12 22:08 ` Jens Axboe 2020-10-13 5:13 ` Hao_Xu 0 siblings, 2 replies; 14+ messages in thread From: Matthew Wilcox @ 2020-10-12 21:13 UTC (permalink / raw) To: io-uring; +Cc: Johannes Weiner, Jens Axboe This one's pretty unlikely, but there's a case in buffered reads where an IOCB_WAITQ read can end up sleeping. generic_file_buffered_read(): page = find_get_page(mapping, index); ... if (!PageUptodate(page)) { ... if (iocb->ki_flags & IOCB_WAITQ) { ... error = wait_on_page_locked_async(page, iocb->ki_waitq); wait_on_page_locked_async(): if (!PageLocked(page)) return 0; (back to generic_file_buffered_read): if (!mapping->a_ops->is_partially_uptodate(page, offset, iter->count)) goto page_not_up_to_date_locked; page_not_up_to_date_locked: if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { unlock_page(page); put_page(page); goto would_block; } ... error = mapping->a_ops->readpage(filp, page); (will unlock page on I/O completion) if (!PageUptodate(page)) { error = lock_page_killable(page); So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() and wait for the I/O to complete. I can't quite figure out if this is intentional -- I think not; if I understand the semantics right, we should be returning -EIOCBQUEUED and punting to an I/O thread to kick off the I/O and wait. I think the right fix is to return -EIOCBQUEUED from wait_on_page_locked_async() if the page isn't locked. ie this: @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, struct wait_page_queue *wait) { if (!PageLocked(page)) - return 0; + return -EIOCBQUEUED; return __wait_on_page_locked_async(compound_head(page), wait, false); } But as I said, I'm not sure what the semantics are supposed to be. ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-12 21:13 Loophole in async page I/O Matthew Wilcox @ 2020-10-12 22:08 ` Jens Axboe 2020-10-12 22:22 ` Jens Axboe 2020-10-13 5:31 ` Hao_Xu 2020-10-13 5:13 ` Hao_Xu 1 sibling, 2 replies; 14+ messages in thread From: Jens Axboe @ 2020-10-12 22:08 UTC (permalink / raw) To: Matthew Wilcox, io-uring; +Cc: Johannes Weiner On 10/12/20 3:13 PM, Matthew Wilcox wrote: > This one's pretty unlikely, but there's a case in buffered reads where > an IOCB_WAITQ read can end up sleeping. > > generic_file_buffered_read(): > page = find_get_page(mapping, index); > ... > if (!PageUptodate(page)) { > ... > if (iocb->ki_flags & IOCB_WAITQ) { > ... > error = wait_on_page_locked_async(page, > iocb->ki_waitq); > wait_on_page_locked_async(): > if (!PageLocked(page)) > return 0; > (back to generic_file_buffered_read): > if (!mapping->a_ops->is_partially_uptodate(page, > offset, iter->count)) > goto page_not_up_to_date_locked; > > page_not_up_to_date_locked: > if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { > unlock_page(page); > put_page(page); > goto would_block; > } > ... > error = mapping->a_ops->readpage(filp, page); > (will unlock page on I/O completion) > if (!PageUptodate(page)) { > error = lock_page_killable(page); > > So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() > and wait for the I/O to complete. I can't quite figure out if this is > intentional -- I think not; if I understand the semantics right, we > should be returning -EIOCBQUEUED and punting to an I/O thread to > kick off the I/O and wait. > > I think the right fix is to return -EIOCBQUEUED from > wait_on_page_locked_async() if the page isn't locked. ie this: > > @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, > struct wait_page_queue *wait) > { > if (!PageLocked(page)) > - return 0; > + return -EIOCBQUEUED; > return __wait_on_page_locked_async(compound_head(page), wait, false); > } > > But as I said, I'm not sure what the semantics are supposed to be. If NOWAIT isn't set, then the issue attempt is from the helper thread already, and IOCB_WAITQ shouldn't be set either (the latter doesn't matter for this discussion). So it's totally fine and expected to block at that point. Hmm actually, I believe that: commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 Author: Hao Xu <[email protected]> Date: Tue Sep 29 20:00:45 2020 +0800 io_uring: fix async buffered reads when readahead is disabled maybe messed up that case, so we could block off the retry-path. I'll take a closer look, looks like that can be the case if read-ahead is disabled. In general, we can only return -EIOCBQUEUED if the IO has been started or is in progress already. That means we can safely rely on being told when it's unlocked/done. If we need to block, we should be returning -EAGAIN, which would punt to a worker thread. -- Jens Axboe ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-12 22:08 ` Jens Axboe @ 2020-10-12 22:22 ` Jens Axboe 2020-10-12 22:42 ` Jens Axboe 2020-10-13 5:31 ` Hao_Xu 1 sibling, 1 reply; 14+ messages in thread From: Jens Axboe @ 2020-10-12 22:22 UTC (permalink / raw) To: Matthew Wilcox, io-uring; +Cc: Johannes Weiner, Hao_Xu On 10/12/20 4:08 PM, Jens Axboe wrote: > On 10/12/20 3:13 PM, Matthew Wilcox wrote: >> This one's pretty unlikely, but there's a case in buffered reads where >> an IOCB_WAITQ read can end up sleeping. >> >> generic_file_buffered_read(): >> page = find_get_page(mapping, index); >> ... >> if (!PageUptodate(page)) { >> ... >> if (iocb->ki_flags & IOCB_WAITQ) { >> ... >> error = wait_on_page_locked_async(page, >> iocb->ki_waitq); >> wait_on_page_locked_async(): >> if (!PageLocked(page)) >> return 0; >> (back to generic_file_buffered_read): >> if (!mapping->a_ops->is_partially_uptodate(page, >> offset, iter->count)) >> goto page_not_up_to_date_locked; >> >> page_not_up_to_date_locked: >> if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { >> unlock_page(page); >> put_page(page); >> goto would_block; >> } >> ... >> error = mapping->a_ops->readpage(filp, page); >> (will unlock page on I/O completion) >> if (!PageUptodate(page)) { >> error = lock_page_killable(page); >> >> So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() >> and wait for the I/O to complete. I can't quite figure out if this is >> intentional -- I think not; if I understand the semantics right, we >> should be returning -EIOCBQUEUED and punting to an I/O thread to >> kick off the I/O and wait. >> >> I think the right fix is to return -EIOCBQUEUED from >> wait_on_page_locked_async() if the page isn't locked. ie this: >> >> @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, >> struct wait_page_queue *wait) >> { >> if (!PageLocked(page)) >> - return 0; >> + return -EIOCBQUEUED; >> return __wait_on_page_locked_async(compound_head(page), wait, false); >> } >> >> But as I said, I'm not sure what the semantics are supposed to be. > > If NOWAIT isn't set, then the issue attempt is from the helper thread > already, and IOCB_WAITQ shouldn't be set either (the latter doesn't > matter for this discussion). So it's totally fine and expected to block > at that point. > > Hmm actually, I believe that: > > commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 > Author: Hao Xu <[email protected]> > Date: Tue Sep 29 20:00:45 2020 +0800 > > io_uring: fix async buffered reads when readahead is disabled > > maybe messed up that case, so we could block off the retry-path. I'll > take a closer look, looks like that can be the case if read-ahead is > disabled. > > In general, we can only return -EIOCBQUEUED if the IO has been started > or is in progress already. That means we can safely rely on being told > when it's unlocked/done. If we need to block, we should be returning > -EAGAIN, which would punt to a worker thread. Something like the below might be a better solution - just always use the read-ahead to generate the IO, for the requested range. That won't issue any IO beyond what we asked for. And ensure we don't clear NOWAIT on the io_uring side for retry. Totally untested... Just trying to get the idea across. We might need some low cap on req_count in case the range is large. Hao Xu, can you try with this? Thinking of your read-ahead disabled slowdown as well, this could very well be the reason why. diff --git a/fs/io_uring.c b/fs/io_uring.c index aae0ef2ec34d..9a2dfe132665 100644 --- a/fs/io_uring.c +++ b/fs/io_uring.c @@ -3107,7 +3107,6 @@ static bool io_rw_should_retry(struct io_kiocb *req) wait->wait.flags = 0; INIT_LIST_HEAD(&wait->wait.entry); kiocb->ki_flags |= IOCB_WAITQ; - kiocb->ki_flags &= ~IOCB_NOWAIT; kiocb->ki_waitq = wait; io_get_req_task(req); diff --git a/mm/readahead.c b/mm/readahead.c index 3c9a8dd7c56c..693af86d171d 100644 --- a/mm/readahead.c +++ b/mm/readahead.c @@ -568,15 +568,16 @@ void page_cache_sync_readahead(struct address_space *mapping, struct file_ra_state *ra, struct file *filp, pgoff_t index, unsigned long req_count) { - /* no read-ahead */ - if (!ra->ra_pages) - return; - if (blk_cgroup_congested()) return; - /* be dumb */ - if (filp && (filp->f_mode & FMODE_RANDOM)) { + /* + * Even if read-ahead is disabled, issue this request as read-ahead + * as we'll need it to satisfy the requested range. The forced + * read-ahead will do the right thing and limit the read to just the + * requested range. + */ + if (!ra->ra_pages || (filp && (filp->f_mode & FMODE_RANDOM))) { force_page_cache_readahead(mapping, filp, index, req_count); return; } -- Jens Axboe ^ permalink raw reply related [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-12 22:22 ` Jens Axboe @ 2020-10-12 22:42 ` Jens Axboe 2020-10-14 20:31 ` Hao_Xu 0 siblings, 1 reply; 14+ messages in thread From: Jens Axboe @ 2020-10-12 22:42 UTC (permalink / raw) To: Matthew Wilcox, io-uring; +Cc: Johannes Weiner, Hao_Xu, Andrew Morton On 10/12/20 4:22 PM, Jens Axboe wrote: > On 10/12/20 4:08 PM, Jens Axboe wrote: >> On 10/12/20 3:13 PM, Matthew Wilcox wrote: >>> This one's pretty unlikely, but there's a case in buffered reads where >>> an IOCB_WAITQ read can end up sleeping. >>> >>> generic_file_buffered_read(): >>> page = find_get_page(mapping, index); >>> ... >>> if (!PageUptodate(page)) { >>> ... >>> if (iocb->ki_flags & IOCB_WAITQ) { >>> ... >>> error = wait_on_page_locked_async(page, >>> iocb->ki_waitq); >>> wait_on_page_locked_async(): >>> if (!PageLocked(page)) >>> return 0; >>> (back to generic_file_buffered_read): >>> if (!mapping->a_ops->is_partially_uptodate(page, >>> offset, iter->count)) >>> goto page_not_up_to_date_locked; >>> >>> page_not_up_to_date_locked: >>> if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { >>> unlock_page(page); >>> put_page(page); >>> goto would_block; >>> } >>> ... >>> error = mapping->a_ops->readpage(filp, page); >>> (will unlock page on I/O completion) >>> if (!PageUptodate(page)) { >>> error = lock_page_killable(page); >>> >>> So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() >>> and wait for the I/O to complete. I can't quite figure out if this is >>> intentional -- I think not; if I understand the semantics right, we >>> should be returning -EIOCBQUEUED and punting to an I/O thread to >>> kick off the I/O and wait. >>> >>> I think the right fix is to return -EIOCBQUEUED from >>> wait_on_page_locked_async() if the page isn't locked. ie this: >>> >>> @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, >>> struct wait_page_queue *wait) >>> { >>> if (!PageLocked(page)) >>> - return 0; >>> + return -EIOCBQUEUED; >>> return __wait_on_page_locked_async(compound_head(page), wait, false); >>> } >>> >>> But as I said, I'm not sure what the semantics are supposed to be. >> >> If NOWAIT isn't set, then the issue attempt is from the helper thread >> already, and IOCB_WAITQ shouldn't be set either (the latter doesn't >> matter for this discussion). So it's totally fine and expected to block >> at that point. >> >> Hmm actually, I believe that: >> >> commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 >> Author: Hao Xu <[email protected]> >> Date: Tue Sep 29 20:00:45 2020 +0800 >> >> io_uring: fix async buffered reads when readahead is disabled >> >> maybe messed up that case, so we could block off the retry-path. I'll >> take a closer look, looks like that can be the case if read-ahead is >> disabled. >> >> In general, we can only return -EIOCBQUEUED if the IO has been started >> or is in progress already. That means we can safely rely on being told >> when it's unlocked/done. If we need to block, we should be returning >> -EAGAIN, which would punt to a worker thread. > > Something like the below might be a better solution - just always use > the read-ahead to generate the IO, for the requested range. That won't > issue any IO beyond what we asked for. And ensure we don't clear NOWAIT > on the io_uring side for retry. > > Totally untested... Just trying to get the idea across. We might need > some low cap on req_count in case the range is large. Hao Xu, can you > try with this? Thinking of your read-ahead disabled slowdown as well, > this could very well be the reason why. Here's one that caps us at 1 page, if read-ahead is disabled or we're congested. Should still be fine in terms of being async, and it allows us to use the same path for this instead of special casing it. I ran some quick testing on this, and it seems to Work For Me. I'll do some more targeted testing. diff --git a/fs/io_uring.c b/fs/io_uring.c index aae0ef2ec34d..9a2dfe132665 100644 --- a/fs/io_uring.c +++ b/fs/io_uring.c @@ -3107,7 +3107,6 @@ static bool io_rw_should_retry(struct io_kiocb *req) wait->wait.flags = 0; INIT_LIST_HEAD(&wait->wait.entry); kiocb->ki_flags |= IOCB_WAITQ; - kiocb->ki_flags &= ~IOCB_NOWAIT; kiocb->ki_waitq = wait; io_get_req_task(req); diff --git a/mm/readahead.c b/mm/readahead.c index 3c9a8dd7c56c..d0f556612fd6 100644 --- a/mm/readahead.c +++ b/mm/readahead.c @@ -568,15 +568,20 @@ void page_cache_sync_readahead(struct address_space *mapping, struct file_ra_state *ra, struct file *filp, pgoff_t index, unsigned long req_count) { - /* no read-ahead */ - if (!ra->ra_pages) - return; + bool do_forced_ra = filp && (filp->f_mode & FMODE_RANDOM); - if (blk_cgroup_congested()) - return; + /* + * Even if read-ahead is disabled, issue this request as read-ahead + * as we'll need it to satisfy the requested range. The forced + * read-ahead will do the right thing and limit the read to just the + * requested range, which we'll set to 1 page for this case. + */ + if (!ra->ra_pages || blk_cgroup_congested()) { + req_count = 1; + do_forced_ra = true; + } - /* be dumb */ - if (filp && (filp->f_mode & FMODE_RANDOM)) { + if (do_forced_ra) { force_page_cache_readahead(mapping, filp, index, req_count); return; } -- Jens Axboe ^ permalink raw reply related [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-12 22:42 ` Jens Axboe @ 2020-10-14 20:31 ` Hao_Xu 2020-10-14 20:57 ` Jens Axboe 0 siblings, 1 reply; 14+ messages in thread From: Hao_Xu @ 2020-10-14 20:31 UTC (permalink / raw) To: Jens Axboe, Matthew Wilcox, io-uring; +Cc: Johannes Weiner, Andrew Morton 在 2020/10/13 上午6:42, Jens Axboe 写道: > On 10/12/20 4:22 PM, Jens Axboe wrote: >> On 10/12/20 4:08 PM, Jens Axboe wrote: >>> On 10/12/20 3:13 PM, Matthew Wilcox wrote: >>>> This one's pretty unlikely, but there's a case in buffered reads where >>>> an IOCB_WAITQ read can end up sleeping. >>>> >>>> generic_file_buffered_read(): >>>> page = find_get_page(mapping, index); >>>> ... >>>> if (!PageUptodate(page)) { >>>> ... >>>> if (iocb->ki_flags & IOCB_WAITQ) { >>>> ... >>>> error = wait_on_page_locked_async(page, >>>> iocb->ki_waitq); >>>> wait_on_page_locked_async(): >>>> if (!PageLocked(page)) >>>> return 0; >>>> (back to generic_file_buffered_read): >>>> if (!mapping->a_ops->is_partially_uptodate(page, >>>> offset, iter->count)) >>>> goto page_not_up_to_date_locked; >>>> >>>> page_not_up_to_date_locked: >>>> if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { >>>> unlock_page(page); >>>> put_page(page); >>>> goto would_block; >>>> } >>>> ... >>>> error = mapping->a_ops->readpage(filp, page); >>>> (will unlock page on I/O completion) >>>> if (!PageUptodate(page)) { >>>> error = lock_page_killable(page); >>>> >>>> So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() >>>> and wait for the I/O to complete. I can't quite figure out if this is >>>> intentional -- I think not; if I understand the semantics right, we >>>> should be returning -EIOCBQUEUED and punting to an I/O thread to >>>> kick off the I/O and wait. >>>> >>>> I think the right fix is to return -EIOCBQUEUED from >>>> wait_on_page_locked_async() if the page isn't locked. ie this: >>>> >>>> @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, >>>> struct wait_page_queue *wait) >>>> { >>>> if (!PageLocked(page)) >>>> - return 0; >>>> + return -EIOCBQUEUED; >>>> return __wait_on_page_locked_async(compound_head(page), wait, false); >>>> } >>>> >>>> But as I said, I'm not sure what the semantics are supposed to be. >>> >>> If NOWAIT isn't set, then the issue attempt is from the helper thread >>> already, and IOCB_WAITQ shouldn't be set either (the latter doesn't >>> matter for this discussion). So it's totally fine and expected to block >>> at that point. >>> >>> Hmm actually, I believe that: >>> >>> commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 >>> Author: Hao Xu <[email protected]> >>> Date: Tue Sep 29 20:00:45 2020 +0800 >>> >>> io_uring: fix async buffered reads when readahead is disabled >>> >>> maybe messed up that case, so we could block off the retry-path. I'll >>> take a closer look, looks like that can be the case if read-ahead is >>> disabled. >>> >>> In general, we can only return -EIOCBQUEUED if the IO has been started >>> or is in progress already. That means we can safely rely on being told >>> when it's unlocked/done. If we need to block, we should be returning >>> -EAGAIN, which would punt to a worker thread. >> >> Something like the below might be a better solution - just always use >> the read-ahead to generate the IO, for the requested range. That won't >> issue any IO beyond what we asked for. And ensure we don't clear NOWAIT >> on the io_uring side for retry. >> >> Totally untested... Just trying to get the idea across. We might need >> some low cap on req_count in case the range is large. Hao Xu, can you >> try with this? Thinking of your read-ahead disabled slowdown as well, >> this could very well be the reason why. > > Here's one that caps us at 1 page, if read-ahead is disabled or we're > congested. Should still be fine in terms of being async, and it allows > us to use the same path for this instead of special casing it. > > I ran some quick testing on this, and it seems to Work For Me. I'll do > some more targeted testing. > > diff --git a/fs/io_uring.c b/fs/io_uring.c > index aae0ef2ec34d..9a2dfe132665 100644 > --- a/fs/io_uring.c > +++ b/fs/io_uring.c > @@ -3107,7 +3107,6 @@ static bool io_rw_should_retry(struct io_kiocb *req) > wait->wait.flags = 0; > INIT_LIST_HEAD(&wait->wait.entry); > kiocb->ki_flags |= IOCB_WAITQ; > - kiocb->ki_flags &= ~IOCB_NOWAIT; > kiocb->ki_waitq = wait; > > io_get_req_task(req); > diff --git a/mm/readahead.c b/mm/readahead.c > index 3c9a8dd7c56c..d0f556612fd6 100644 > --- a/mm/readahead.c > +++ b/mm/readahead.c > @@ -568,15 +568,20 @@ void page_cache_sync_readahead(struct address_space *mapping, > struct file_ra_state *ra, struct file *filp, > pgoff_t index, unsigned long req_count) > { > - /* no read-ahead */ > - if (!ra->ra_pages) > - return; > + bool do_forced_ra = filp && (filp->f_mode & FMODE_RANDOM); > > - if (blk_cgroup_congested()) > - return; > + /* > + * Even if read-ahead is disabled, issue this request as read-ahead > + * as we'll need it to satisfy the requested range. The forced > + * read-ahead will do the right thing and limit the read to just the > + * requested range, which we'll set to 1 page for this case. > + */ > + if (!ra->ra_pages || blk_cgroup_congested()) { > + req_count = 1; > + do_forced_ra = true; > + } > > - /* be dumb */ > - if (filp && (filp->f_mode & FMODE_RANDOM)) { > + if (do_forced_ra) { > force_page_cache_readahead(mapping, filp, index, req_count); > return; > } > Hi Jens, I've done some tests for the new fix code with readahead disabled from userspace. Here comes some results. For the perf reports, since I'm new to kernel stuff, still investigating on it. I'll keep addressing the issue which causes the difference among the four perf reports(in which the copy_user_enhanced_fast_string() catches my eyes) my environment is: server: physical server kernel: mainline 5.9.0-rc8+ latest commit 6f2f486d57c4d562cdf4 fs: ext4 device: nvme ssd fio: 3.20 I did the tests by setting and commenting the code: filp->f_mode |= FMODE_BUF_RASYNC; in fs/ext4/file.c ext4_file_open() the IOPS with readahead disabled from userspace is below: with new fix code(force readahead) QD/Test FMODE_BUF_RASYNC set FMODE_BUF_RASYNC not set 1 10.8k 10.3k 2 21.2k 20.1k 4 41.1k 39.1k 8 76.1k 72.2k 16 133k 126k 32 169k 147k 64 176k 160k 128 (1)187k (2)156k now async buffered reads feature looks better in terms of IOPS, but it still looks similar with the async buffered reads feature in the mainline code. with mainline code(the fix code in commit c8d317aa1887 ("io_uring: fix async buffered reads when readahead is disabled")) QD/Test FMODE_BUF_RASYNC set FMODE_BUF_RASYNC not set 1 10.9k 10.2k 2 21.6k 20.2k 4 41.0k 39.9k 8 79.7k 75.9k 16 141k 138k 32 169k 237k 64 190k 316k 128 (3)195k (4)315k Considering the number in place (1)(2)(3)(4), the new fix doesn't seem to fix the slow down but make the number (4) become number (2) the perf reports of (1)(2)(3)(4) situations are: (1) 9 # Overhead Command Shared Object Symbol 10 # ........ ....... .................. .............................................. 11 # 12 10.19% fio [kernel.vmlinux] [k] copy_user_enhanced_fast_string 13 8.53% fio fio [.] clock_thread_fn 14 4.67% fio [kernel.vmlinux] [k] xas_load 15 2.18% fio [kernel.vmlinux] [k] clear_page_erms 16 2.02% fio libc-2.24.so [.] __memset_avx2_erms 17 1.55% fio [kernel.vmlinux] [k] mutex_unlock 18 1.51% fio [kernel.vmlinux] [k] shmem_getpage_gfp 19 1.48% fio [kernel.vmlinux] [k] native_irq_return_iret 20 1.48% fio [kernel.vmlinux] [k] get_page_from_freelist 21 1.46% fio [kernel.vmlinux] [k] generic_file_buffered_read 22 1.45% fio [nvme] [k] nvme_irq 23 1.25% fio [kernel.vmlinux] [k] __list_del_entry_valid 24 1.22% fio [kernel.vmlinux] [k] free_pcppages_bulk 25 1.15% fio [kernel.vmlinux] [k] _raw_spin_lock 26 1.12% fio fio [.] get_io_u 27 0.81% fio [ext4] [k] ext4_mpage_readpages 28 0.78% fio fio [.] fio_gettime 29 0.76% fio [kernel.vmlinux] [k] find_get_entries 30 0.75% fio [vdso] [.] __vdso_clock_gettime 31 0.73% fio [kernel.vmlinux] [k] release_pages 32 0.68% fio [kernel.vmlinux] [k] find_get_entry 33 0.68% fio fio [.] io_u_queued_complete 34 0.67% fio [kernel.vmlinux] [k] io_async_buf_func 35 0.65% fio [kernel.vmlinux] [k] io_submit_sqes ... (2) 9 # Overhead Command Shared Object Symbol 10 # ........ ....... .................. .............................................. 11 # 12 7.94% fio fio [.] clock_thread_fn 13 3.83% fio [kernel.vmlinux] [k] xas_load 14 2.57% fio [kernel.vmlinux] [k] io_prep_async_work 15 2.24% fio [kernel.vmlinux] [k] clear_page_erms 16 1.99% fio [kernel.vmlinux] [k] _raw_spin_lock_irqsave 17 1.94% fio libc-2.24.so [.] __memset_avx2_erms 18 1.83% fio [kernel.vmlinux] [k] get_page_from_freelist 19 1.78% fio [kernel.vmlinux] [k] __fget_files 20 1.67% fio [kernel.vmlinux] [k] __list_del_entry_valid 21 1.50% fio fio [.] get_io_u 22 1.41% fio [kernel.vmlinux] [k] shmem_getpage_gfp 23 1.40% fio [kernel.vmlinux] [k] io_prep_rw 24 1.39% fio [kernel.vmlinux] [k] mutex_unlock 25 1.28% fio [kernel.vmlinux] [k] _raw_spin_lock_irq 26 1.21% fio [kernel.vmlinux] [k] free_pcppages_bulk 27 1.17% fio [kernel.vmlinux] [k] generic_file_buffered_read 28 1.11% fio [ext4] [k] ext4_mpage_readpages 29 1.11% fio fio [.] fio_gettime 30 1.09% fio [kernel.vmlinux] [k] __pagevec_lru_add_fn 31 1.04% fio [kernel.vmlinux] [k] kmem_cache_alloc_bulk 32 0.99% fio [kernel.vmlinux] [k] io_submit_sqes 33 0.95% fio fio [.] io_u_queued_complete 34 0.90% fio [kernel.vmlinux] [k] io_wqe_wake_worker 35 0.78% fio [vdso] [.] __vdso_clock_gettime ... (3) 9 # Overhead Command Shared Object Symbol 10 # ........ ....... .................. .............................................. 11 # 12 9.06% fio fio [.] clock_thread_fn 13 6.05% fio [kernel.vmlinux] [k] copy_user_enhanced_fast_string 14 4.27% fio [kernel.vmlinux] [k] xas_load 15 2.31% fio [kernel.vmlinux] [k] clear_page_erms 16 2.09% fio libc-2.24.so [.] __memset_avx2_erms 17 1.70% fio fio [.] get_io_u 18 1.67% fio [kernel.vmlinux] [k] get_page_from_freelist 19 1.67% fio [kernel.vmlinux] [k] shmem_getpage_gfp 20 1.61% fio [kernel.vmlinux] [k] native_irq_return_iret 21 1.56% fio [kernel.vmlinux] [k] generic_file_buffered_read 22 1.34% fio [kernel.vmlinux] [k] __list_del_entry_valid 23 1.29% fio [kernel.vmlinux] [k] mutex_unlock 24 1.24% fio [kernel.vmlinux] [k] free_pcppages_bulk 25 1.11% fio fio [.] fio_gettime 26 1.01% fio [kernel.vmlinux] [k] _raw_spin_lock 27 0.90% fio [ext4] [k] ext4_mpage_readpages 28 0.89% fio [vdso] [.] __vdso_clock_gettime 29 0.82% fio [kernel.vmlinux] [k] audit_filter_syscall.constprop.20 30 0.74% fio [kernel.vmlinux] [k] xas_store 31 0.73% fio [kernel.vmlinux] [k] find_get_entries 32 0.72% fio [kernel.vmlinux] [k] find_get_entry 33 0.70% fio fio [.] io_u_queued_complete 34 0.66% fio [kernel.vmlinux] [k] release_pages 35 0.66% fio [kernel.vmlinux] [k] io_submit_sqes ... (4) 9 # Overhead Command Shared Object Symbol 10 # ........ ....... .................. .............................................. 11 # 12 12.30% fio fio [.] clock_thread_fn 13 4.69% fio [kernel.vmlinux] [k] xas_load 14 3.12% fio [kernel.vmlinux] [k] clear_page_erms 15 2.87% fio libc-2.24.so [.] __memset_avx2_erms 16 2.80% fio [kernel.vmlinux] [k] io_prep_async_work 17 2.43% fio [kernel.vmlinux] [k] io_prep_rw 18 2.32% fio [kernel.vmlinux] [k] shmem_getpage_gfp 19 2.24% fio [kernel.vmlinux] [k] __fget_files 20 2.18% fio [kernel.vmlinux] [k] get_page_from_freelist 21 2.15% fio [kernel.vmlinux] [k] __list_del_entry_valid 22 2.10% fio [kernel.vmlinux] [k] _raw_spin_lock_irqsave 23 1.81% fio [kernel.vmlinux] [k] native_queued_spin_lock_slowpath 24 1.77% fio [kernel.vmlinux] [k] lru_cache_add 25 1.69% fio [kernel.vmlinux] [k] _raw_spin_lock_irq 26 1.65% fio [kernel.vmlinux] [k] free_pcppages_bulk 27 1.36% fio [kernel.vmlinux] [k] __pagevec_lru_add_fn 28 1.27% fio fio [.] get_io_u 29 1.26% fio [kernel.vmlinux] [k] generic_file_buffered_read 30 1.21% fio [kernel.vmlinux] [k] io_submit_sqes 31 1.19% fio fio [.] account_io_completion 32 1.16% fio [vdso] [.] __vdso_clock_gettime 33 1.14% fio fio [.] fio_gettime 34 1.12% fio [kernel.vmlinux] [k] allocate_slab 35 0.97% fio [kernel.vmlinux] [k] __x64_sys_io_uring_enter ... the arguments of fio I use are: fio_test.sh: fio -filename=/mnt/nvme0n1/haul.xh/fio_read_test.txt \ -buffered=1 \ -iodepth $1 \ -rw=randread \ -ioengine=io_uring \ -direct=0 \ -bs=4k \ -size=4G \ -name=rand_read_4k \ -numjobs=1 Thanks && Regards, Hao ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-14 20:31 ` Hao_Xu @ 2020-10-14 20:57 ` Jens Axboe 2020-10-15 11:27 ` Hao_Xu 0 siblings, 1 reply; 14+ messages in thread From: Jens Axboe @ 2020-10-14 20:57 UTC (permalink / raw) To: Hao_Xu, Matthew Wilcox, io-uring; +Cc: Johannes Weiner, Andrew Morton On 10/14/20 2:31 PM, Hao_Xu wrote: > Hi Jens, > I've done some tests for the new fix code with readahead disabled from > userspace. Here comes some results. > For the perf reports, since I'm new to kernel stuff, still investigating > on it. > I'll keep addressing the issue which causes the difference among the > four perf reports(in which the copy_user_enhanced_fast_string() catches > my eyes) > > my environment is: > server: physical server > kernel: mainline 5.9.0-rc8+ latest commit 6f2f486d57c4d562cdf4 > fs: ext4 > device: nvme ssd > fio: 3.20 > > I did the tests by setting and commenting the code: > filp->f_mode |= FMODE_BUF_RASYNC; > in fs/ext4/file.c ext4_file_open() You don't have to modify the kernel, if you use a newer fio then you can essentially just add: --force_async=1 after setting the engine to io_uring to get the same effect. Just a heads up, as that might make it easier for you. > the IOPS with readahead disabled from userspace is below: > > with new fix code(force readahead) > QD/Test FMODE_BUF_RASYNC set FMODE_BUF_RASYNC not set > 1 10.8k 10.3k > 2 21.2k 20.1k > 4 41.1k 39.1k > 8 76.1k 72.2k > 16 133k 126k > 32 169k 147k > 64 176k 160k > 128 (1)187k (2)156k > > now async buffered reads feature looks better in terms of IOPS, > but it still looks similar with the async buffered reads feature in the > mainline code. I'd say it looks better all around. And what you're completely forgetting here is that when FMODE_BUF_RASYNC isn't set, then you're using QD number of async workers to achieve that result. Hence you have 1..128 threads potentially running on that one, vs having a _single_ process running with FMODE_BUF_RASYNC. > with mainline code(the fix code in commit c8d317aa1887 ("io_uring: fix > async buffered reads when readahead is disabled")) > QD/Test FMODE_BUF_RASYNC set FMODE_BUF_RASYNC not set > 1 10.9k 10.2k > 2 21.6k 20.2k > 4 41.0k 39.9k > 8 79.7k 75.9k > 16 141k 138k > 32 169k 237k > 64 190k 316k > 128 (3)195k (4)315k > > Considering the number in place (1)(2)(3)(4), the new fix doesn't seem > to fix the slow down > but make the number (4) become number (2) Not sure why there would be a difference between 2 and 4, that does seem odd. I'll see if I can reproduce that. More questions below. > the perf reports of (1)(2)(3)(4) situations are: > (1) > 9 # Overhead Command Shared Object Symbol > 10 # ........ ....... .................. > .............................................. > 11 # > 12 10.19% fio [kernel.vmlinux] [k] > copy_user_enhanced_fast_string > 13 8.53% fio fio [.] clock_thread_fn > 14 4.67% fio [kernel.vmlinux] [k] xas_load > 15 2.18% fio [kernel.vmlinux] [k] clear_page_erms > 16 2.02% fio libc-2.24.so [.] __memset_avx2_erms > 17 1.55% fio [kernel.vmlinux] [k] mutex_unlock > 18 1.51% fio [kernel.vmlinux] [k] shmem_getpage_gfp > 19 1.48% fio [kernel.vmlinux] [k] native_irq_return_iret > 20 1.48% fio [kernel.vmlinux] [k] get_page_from_freelist > 21 1.46% fio [kernel.vmlinux] [k] generic_file_buffered_read > 22 1.45% fio [nvme] [k] nvme_irq > 23 1.25% fio [kernel.vmlinux] [k] __list_del_entry_valid > 24 1.22% fio [kernel.vmlinux] [k] free_pcppages_bulk > 25 1.15% fio [kernel.vmlinux] [k] _raw_spin_lock > 26 1.12% fio fio [.] get_io_u > 27 0.81% fio [ext4] [k] ext4_mpage_readpages > 28 0.78% fio fio [.] fio_gettime > 29 0.76% fio [kernel.vmlinux] [k] find_get_entries > 30 0.75% fio [vdso] [.] __vdso_clock_gettime > 31 0.73% fio [kernel.vmlinux] [k] release_pages > 32 0.68% fio [kernel.vmlinux] [k] find_get_entry > 33 0.68% fio fio [.] io_u_queued_complete > 34 0.67% fio [kernel.vmlinux] [k] io_async_buf_func > 35 0.65% fio [kernel.vmlinux] [k] io_submit_sqes These profiles are of marginal use, as you're only profiling fio itself, not all of the async workers that are running for !FMODE_BUF_RASYNC. How long does the test run? It looks suspect that clock_thread_fn shows up in the profiles at all. And is it actually doing IO, or are you using shm/tmpfs for this test? Isn't ext4 hosting the file? I see a lot of shmem_getpage_gfp(), makes me a little confused. -- Jens Axboe ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-14 20:57 ` Jens Axboe @ 2020-10-15 11:27 ` Hao_Xu 2020-10-15 12:17 ` Hao_Xu 0 siblings, 1 reply; 14+ messages in thread From: Hao_Xu @ 2020-10-15 11:27 UTC (permalink / raw) To: Jens Axboe, Matthew Wilcox, io-uring; +Cc: Johannes Weiner, Andrew Morton 在 2020/10/15 上午4:57, Jens Axboe 写道: > On 10/14/20 2:31 PM, Hao_Xu wrote: >> Hi Jens, >> I've done some tests for the new fix code with readahead disabled from >> userspace. Here comes some results. >> For the perf reports, since I'm new to kernel stuff, still investigating >> on it. >> I'll keep addressing the issue which causes the difference among the >> four perf reports(in which the copy_user_enhanced_fast_string() catches >> my eyes) >> >> my environment is: >> server: physical server >> kernel: mainline 5.9.0-rc8+ latest commit 6f2f486d57c4d562cdf4 >> fs: ext4 >> device: nvme ssd >> fio: 3.20 >> >> I did the tests by setting and commenting the code: >> filp->f_mode |= FMODE_BUF_RASYNC; >> in fs/ext4/file.c ext4_file_open() > > You don't have to modify the kernel, if you use a newer fio then you can > essentially just add: > > --force_async=1 > > after setting the engine to io_uring to get the same effect. Just a > heads up, as that might make it easier for you. > >> the IOPS with readahead disabled from userspace is below: >> >> with new fix code(force readahead) >> QD/Test FMODE_BUF_RASYNC set FMODE_BUF_RASYNC not set >> 1 10.8k 10.3k >> 2 21.2k 20.1k >> 4 41.1k 39.1k >> 8 76.1k 72.2k >> 16 133k 126k >> 32 169k 147k >> 64 176k 160k >> 128 (1)187k (2)156k >> >> now async buffered reads feature looks better in terms of IOPS, >> but it still looks similar with the async buffered reads feature in the >> mainline code. > > I'd say it looks better all around. And what you're completely > forgetting here is that when FMODE_BUF_RASYNC isn't set, then you're > using QD number of async workers to achieve that result. Hence you have > 1..128 threads potentially running on that one, vs having a _single_ > process running with FMODE_BUF_RASYNC. I totally agree with this, the server I use has many cpus which makes the multiple async workers works exactly parallelly. > >> with mainline code(the fix code in commit c8d317aa1887 ("io_uring: fix >> async buffered reads when readahead is disabled")) >> QD/Test FMODE_BUF_RASYNC set FMODE_BUF_RASYNC not set >> 1 10.9k 10.2k >> 2 21.6k 20.2k >> 4 41.0k 39.9k >> 8 79.7k 75.9k >> 16 141k 138k >> 32 169k 237k >> 64 190k 316k >> 128 (3)195k (4)315k >> >> Considering the number in place (1)(2)(3)(4), the new fix doesn't seem >> to fix the slow down >> but make the number (4) become number (2) > > Not sure why there would be a difference between 2 and 4, that does seem > odd. I'll see if I can reproduce that. More questions below. > >> the perf reports of (1)(2)(3)(4) situations are: >> (1) >> 9 # Overhead Command Shared Object Symbol >> 10 # ........ ....... .................. >> .............................................. >> 11 # >> 12 10.19% fio [kernel.vmlinux] [k] >> copy_user_enhanced_fast_string >> 13 8.53% fio fio [.] clock_thread_fn >> 14 4.67% fio [kernel.vmlinux] [k] xas_load >> 15 2.18% fio [kernel.vmlinux] [k] clear_page_erms >> 16 2.02% fio libc-2.24.so [.] __memset_avx2_erms >> 17 1.55% fio [kernel.vmlinux] [k] mutex_unlock >> 18 1.51% fio [kernel.vmlinux] [k] shmem_getpage_gfp >> 19 1.48% fio [kernel.vmlinux] [k] native_irq_return_iret >> 20 1.48% fio [kernel.vmlinux] [k] get_page_from_freelist >> 21 1.46% fio [kernel.vmlinux] [k] generic_file_buffered_read >> 22 1.45% fio [nvme] [k] nvme_irq >> 23 1.25% fio [kernel.vmlinux] [k] __list_del_entry_valid >> 24 1.22% fio [kernel.vmlinux] [k] free_pcppages_bulk >> 25 1.15% fio [kernel.vmlinux] [k] _raw_spin_lock >> 26 1.12% fio fio [.] get_io_u >> 27 0.81% fio [ext4] [k] ext4_mpage_readpages >> 28 0.78% fio fio [.] fio_gettime >> 29 0.76% fio [kernel.vmlinux] [k] find_get_entries >> 30 0.75% fio [vdso] [.] __vdso_clock_gettime >> 31 0.73% fio [kernel.vmlinux] [k] release_pages >> 32 0.68% fio [kernel.vmlinux] [k] find_get_entry >> 33 0.68% fio fio [.] io_u_queued_complete >> 34 0.67% fio [kernel.vmlinux] [k] io_async_buf_func >> 35 0.65% fio [kernel.vmlinux] [k] io_submit_sqes > > These profiles are of marginal use, as you're only profiling fio itself, > not all of the async workers that are running for !FMODE_BUF_RASYNC. > Ah, I got it. Thanks. > How long does the test run? It looks suspect that clock_thread_fn shows > up in the profiles at all. > it runs about 5 msec, randread 4G with bs=4k > And is it actually doing IO, or are you using shm/tmpfs for this test? > Isn't ext4 hosting the file? I see a lot of shmem_getpage_gfp(), makes > me a little confused. > I'm using ext4 on real nvme ssd device. from the call stack, the shm_getpage_gfp is from __memset_avx2_erms in libc. there are ext4 related functions in all the four reports. I'm doing more to check if it is my test process causing high IOPS in case (4). ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-15 11:27 ` Hao_Xu @ 2020-10-15 12:17 ` Hao_Xu 0 siblings, 0 replies; 14+ messages in thread From: Hao_Xu @ 2020-10-15 12:17 UTC (permalink / raw) To: Jens Axboe, Matthew Wilcox, io-uring; +Cc: Johannes Weiner, Andrew Morton 在 2020/10/15 下午7:27, Hao_Xu 写道: > 在 2020/10/15 上午4:57, Jens Axboe 写道: >> On 10/14/20 2:31 PM, Hao_Xu wrote: >>> Hi Jens, >>> I've done some tests for the new fix code with readahead disabled from >>> userspace. Here comes some results. >>> For the perf reports, since I'm new to kernel stuff, still investigating >>> on it. >>> I'll keep addressing the issue which causes the difference among the >>> four perf reports(in which the copy_user_enhanced_fast_string() catches >>> my eyes) >>> >>> my environment is: >>> server: physical server >>> kernel: mainline 5.9.0-rc8+ latest commit 6f2f486d57c4d562cdf4 >>> fs: ext4 >>> device: nvme ssd >>> fio: 3.20 >>> >>> I did the tests by setting and commenting the code: >>> filp->f_mode |= FMODE_BUF_RASYNC; >>> in fs/ext4/file.c ext4_file_open() >> >> You don't have to modify the kernel, if you use a newer fio then you can >> essentially just add: >> >> --force_async=1 >> >> after setting the engine to io_uring to get the same effect. Just a >> heads up, as that might make it easier for you. >> >>> the IOPS with readahead disabled from userspace is below: >>> >>> with new fix code(force readahead) >>> QD/Test FMODE_BUF_RASYNC set FMODE_BUF_RASYNC not set >>> 1 10.8k 10.3k >>> 2 21.2k 20.1k >>> 4 41.1k 39.1k >>> 8 76.1k 72.2k >>> 16 133k 126k >>> 32 169k 147k >>> 64 176k 160k >>> 128 (1)187k (2)156k >>> >>> now async buffered reads feature looks better in terms of IOPS, >>> but it still looks similar with the async buffered reads feature in the >>> mainline code. >> >> I'd say it looks better all around. And what you're completely >> forgetting here is that when FMODE_BUF_RASYNC isn't set, then you're >> using QD number of async workers to achieve that result. Hence you have >> 1..128 threads potentially running on that one, vs having a _single_ >> process running with FMODE_BUF_RASYNC. > I totally agree with this, the server I use has many cpus which makes > the multiple async workers works exactly parallelly. > >> >>> with mainline code(the fix code in commit c8d317aa1887 ("io_uring: fix >>> async buffered reads when readahead is disabled")) >>> QD/Test FMODE_BUF_RASYNC set FMODE_BUF_RASYNC not set >>> 1 10.9k 10.2k >>> 2 21.6k 20.2k >>> 4 41.0k 39.9k >>> 8 79.7k 75.9k >>> 16 141k 138k >>> 32 169k 237k >>> 64 190k 316k >>> 128 (3)195k (4)315k >>> >>> Considering the number in place (1)(2)(3)(4), the new fix doesn't seem >>> to fix the slow down >>> but make the number (4) become number (2) >> >> Not sure why there would be a difference between 2 and 4, that does seem >> odd. I'll see if I can reproduce that. More questions below. >> >>> the perf reports of (1)(2)(3)(4) situations are: >>> (1) >>> 9 # Overhead Command Shared Object Symbol >>> 10 # ........ ....... .................. >>> .............................................. >>> 11 # >>> 12 10.19% fio [kernel.vmlinux] [k] >>> copy_user_enhanced_fast_string >>> 13 8.53% fio fio [.] clock_thread_fn >>> 14 4.67% fio [kernel.vmlinux] [k] xas_load >>> 15 2.18% fio [kernel.vmlinux] [k] clear_page_erms >>> 16 2.02% fio libc-2.24.so [.] __memset_avx2_erms >>> 17 1.55% fio [kernel.vmlinux] [k] mutex_unlock >>> 18 1.51% fio [kernel.vmlinux] [k] shmem_getpage_gfp >>> 19 1.48% fio [kernel.vmlinux] [k] >>> native_irq_return_iret >>> 20 1.48% fio [kernel.vmlinux] [k] >>> get_page_from_freelist >>> 21 1.46% fio [kernel.vmlinux] [k] >>> generic_file_buffered_read >>> 22 1.45% fio [nvme] [k] nvme_irq >>> 23 1.25% fio [kernel.vmlinux] [k] >>> __list_del_entry_valid >>> 24 1.22% fio [kernel.vmlinux] [k] free_pcppages_bulk >>> 25 1.15% fio [kernel.vmlinux] [k] _raw_spin_lock >>> 26 1.12% fio fio [.] get_io_u >>> 27 0.81% fio [ext4] [k] ext4_mpage_readpages >>> 28 0.78% fio fio [.] fio_gettime >>> 29 0.76% fio [kernel.vmlinux] [k] find_get_entries >>> 30 0.75% fio [vdso] [.] __vdso_clock_gettime >>> 31 0.73% fio [kernel.vmlinux] [k] release_pages >>> 32 0.68% fio [kernel.vmlinux] [k] find_get_entry >>> 33 0.68% fio fio [.] io_u_queued_complete >>> 34 0.67% fio [kernel.vmlinux] [k] io_async_buf_func >>> 35 0.65% fio [kernel.vmlinux] [k] io_submit_sqes >> >> These profiles are of marginal use, as you're only profiling fio itself, >> not all of the async workers that are running for !FMODE_BUF_RASYNC. >> > Ah, I got it. Thanks. >> How long does the test run? It looks suspect that clock_thread_fn shows >> up in the profiles at all. >> > it runs about 5 msec, randread 4G with bs=4k Sorry, 5 seconds not 5 msec. >> And is it actually doing IO, or are you using shm/tmpfs for this test? >> Isn't ext4 hosting the file? I see a lot of shmem_getpage_gfp(), makes >> me a little confused. >> > I'm using ext4 on real nvme ssd device. from the call stack, the > shm_getpage_gfp is from __memset_avx2_erms in libc. > there are ext4 related functions in all the four reports. > I'm doing more to check if it is my test process causing high IOPS in > case (4). ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-12 22:08 ` Jens Axboe 2020-10-12 22:22 ` Jens Axboe @ 2020-10-13 5:31 ` Hao_Xu 2020-10-13 17:50 ` Jens Axboe 1 sibling, 1 reply; 14+ messages in thread From: Hao_Xu @ 2020-10-13 5:31 UTC (permalink / raw) To: Jens Axboe, Matthew Wilcox, io-uring; +Cc: Johannes Weiner 在 2020/10/13 上午6:08, Jens Axboe 写道: > On 10/12/20 3:13 PM, Matthew Wilcox wrote: >> This one's pretty unlikely, but there's a case in buffered reads where >> an IOCB_WAITQ read can end up sleeping. >> >> generic_file_buffered_read(): >> page = find_get_page(mapping, index); >> ... >> if (!PageUptodate(page)) { >> ... >> if (iocb->ki_flags & IOCB_WAITQ) { >> ... >> error = wait_on_page_locked_async(page, >> iocb->ki_waitq); >> wait_on_page_locked_async(): >> if (!PageLocked(page)) >> return 0; >> (back to generic_file_buffered_read): >> if (!mapping->a_ops->is_partially_uptodate(page, >> offset, iter->count)) >> goto page_not_up_to_date_locked; >> >> page_not_up_to_date_locked: >> if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { >> unlock_page(page); >> put_page(page); >> goto would_block; >> } >> ... >> error = mapping->a_ops->readpage(filp, page); >> (will unlock page on I/O completion) >> if (!PageUptodate(page)) { >> error = lock_page_killable(page); >> >> So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() >> and wait for the I/O to complete. I can't quite figure out if this is >> intentional -- I think not; if I understand the semantics right, we >> should be returning -EIOCBQUEUED and punting to an I/O thread to >> kick off the I/O and wait. >> >> I think the right fix is to return -EIOCBQUEUED from >> wait_on_page_locked_async() if the page isn't locked. ie this: >> >> @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, >> struct wait_page_queue *wait) >> { >> if (!PageLocked(page)) >> - return 0; >> + return -EIOCBQUEUED; >> return __wait_on_page_locked_async(compound_head(page), wait, false); >> } >> >> But as I said, I'm not sure what the semantics are supposed to be. > > If NOWAIT isn't set, then the issue attempt is from the helper thread > already, and IOCB_WAITQ shouldn't be set either (the latter doesn't > matter for this discussion). So it's totally fine and expected to block > at that point. > > Hmm actually, I believe that: > > commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 > Author: Hao Xu <[email protected]> > Date: Tue Sep 29 20:00:45 2020 +0800 > > io_uring: fix async buffered reads when readahead is disabled > > maybe messed up that case, so we could block off the retry-path. I'll > take a closer look, looks like that can be the case if read-ahead is > disabled. > > In general, we can only return -EIOCBQUEUED if the IO has been started > or is in progress already. That means we can safely rely on being told > when it's unlocked/done. If we need to block, we should be returning > -EAGAIN, which would punt to a worker thread. > Hi Jens, My undertanding of io_uring buffered reads process after the commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 has been merged is: the first io_uring IO try is with IOCB_NOWAIT, the second retry in the same context is with IOCB_WAITQ but without IOCB_NOWAIT. so in Matthew's case, lock_page_async() will be called after calling mapping->a_ops->readpage(), So it won't end up sleeping. Actually this case is what happens when readahead is disabled or somehow skipped for reasons like blk_cgroup_congested() returns true. And this case is my commit c8d317aa1887b40b188e for. Regards, Hao ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-13 5:31 ` Hao_Xu @ 2020-10-13 17:50 ` Jens Axboe 2020-10-13 19:50 ` Hao_Xu 0 siblings, 1 reply; 14+ messages in thread From: Jens Axboe @ 2020-10-13 17:50 UTC (permalink / raw) To: Hao_Xu, Matthew Wilcox, io-uring; +Cc: Johannes Weiner [-- Attachment #1: Type: text/plain, Size: 4211 bytes --] On 10/12/20 11:31 PM, Hao_Xu wrote: > 在 2020/10/13 上午6:08, Jens Axboe 写道: >> On 10/12/20 3:13 PM, Matthew Wilcox wrote: >>> This one's pretty unlikely, but there's a case in buffered reads where >>> an IOCB_WAITQ read can end up sleeping. >>> >>> generic_file_buffered_read(): >>> page = find_get_page(mapping, index); >>> ... >>> if (!PageUptodate(page)) { >>> ... >>> if (iocb->ki_flags & IOCB_WAITQ) { >>> ... >>> error = wait_on_page_locked_async(page, >>> iocb->ki_waitq); >>> wait_on_page_locked_async(): >>> if (!PageLocked(page)) >>> return 0; >>> (back to generic_file_buffered_read): >>> if (!mapping->a_ops->is_partially_uptodate(page, >>> offset, iter->count)) >>> goto page_not_up_to_date_locked; >>> >>> page_not_up_to_date_locked: >>> if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { >>> unlock_page(page); >>> put_page(page); >>> goto would_block; >>> } >>> ... >>> error = mapping->a_ops->readpage(filp, page); >>> (will unlock page on I/O completion) >>> if (!PageUptodate(page)) { >>> error = lock_page_killable(page); >>> >>> So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() >>> and wait for the I/O to complete. I can't quite figure out if this is >>> intentional -- I think not; if I understand the semantics right, we >>> should be returning -EIOCBQUEUED and punting to an I/O thread to >>> kick off the I/O and wait. >>> >>> I think the right fix is to return -EIOCBQUEUED from >>> wait_on_page_locked_async() if the page isn't locked. ie this: >>> >>> @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, >>> struct wait_page_queue *wait) >>> { >>> if (!PageLocked(page)) >>> - return 0; >>> + return -EIOCBQUEUED; >>> return __wait_on_page_locked_async(compound_head(page), wait, false); >>> } >>> >>> But as I said, I'm not sure what the semantics are supposed to be. >> >> If NOWAIT isn't set, then the issue attempt is from the helper thread >> already, and IOCB_WAITQ shouldn't be set either (the latter doesn't >> matter for this discussion). So it's totally fine and expected to block >> at that point. >> >> Hmm actually, I believe that: >> >> commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 >> Author: Hao Xu <[email protected]> >> Date: Tue Sep 29 20:00:45 2020 +0800 >> >> io_uring: fix async buffered reads when readahead is disabled >> >> maybe messed up that case, so we could block off the retry-path. I'll >> take a closer look, looks like that can be the case if read-ahead is >> disabled. >> >> In general, we can only return -EIOCBQUEUED if the IO has been started >> or is in progress already. That means we can safely rely on being told >> when it's unlocked/done. If we need to block, we should be returning >> -EAGAIN, which would punt to a worker thread. >> > Hi Jens, > My undertanding of io_uring buffered reads process after the commit > c8d317aa1887b40b188ec3aaa6e9e524333caed1 has been merged is: > the first io_uring IO try is with IOCB_NOWAIT, the second retry in the > same context is with IOCB_WAITQ but without IOCB_NOWAIT. > so in Matthew's case, lock_page_async() will be called after calling > mapping->a_ops->readpage(), So it won't end up sleeping. > Actually this case is what happens when readahead is disabled or somehow > skipped for reasons like blk_cgroup_congested() returns true. And this > case is my commit c8d317aa1887b40b188e for. Well, try the patches. I agree it's not going to sleep with the previous fix, but we're definitely driving a lower utilization by not utilizing read-ahead even if disabled. Re-run your previous tests with these two applied and see what you get. -- Jens Axboe [-- Attachment #2: 0002-io_uring-don-t-clear-IOCB_NOWAIT-for-async-buffered-.patch --] [-- Type: text/x-patch, Size: 1173 bytes --] From 19185e0ea3a91a1d8b9c7e013a32f96bf006052a Mon Sep 17 00:00:00 2001 From: Jens Axboe <[email protected]> Date: Mon, 12 Oct 2020 16:48:57 -0600 Subject: [PATCH 2/2] io_uring: don't clear IOCB_NOWAIT for async buffered retry If we do, and read-ahead is disabled, we can be blocking on the page to finish before making progress. This defeats the purpose of async IO. Now that we know that read-ahead will most likely trigger the IO, we can make progress even for ra_pages == 0 without punting to io-wq to satisfy the IO in a blocking fashion. Fixes: c8d317aa1887 ("io_uring: fix async buffered reads when readahead is disabled") Reported-by: Matthew Wilcox (Oracle) <[email protected]> Signed-off-by: Jens Axboe <[email protected]> --- fs/io_uring.c | 1 - 1 file changed, 1 deletion(-) diff --git a/fs/io_uring.c b/fs/io_uring.c index c043d889a2eb..be70f3e38fb2 100644 --- a/fs/io_uring.c +++ b/fs/io_uring.c @@ -3248,7 +3248,6 @@ static bool io_rw_should_retry(struct io_kiocb *req) wait->wait.flags = 0; INIT_LIST_HEAD(&wait->wait.entry); kiocb->ki_flags |= IOCB_WAITQ; - kiocb->ki_flags &= ~IOCB_NOWAIT; kiocb->ki_waitq = wait; return true; } -- 2.28.0 [-- Attachment #3: 0001-readahead-use-limited-read-ahead-to-satisfy-read.patch --] [-- Type: text/x-patch, Size: 2221 bytes --] From 10b8c31e8085a85d5a71c7e271387c2edbcf7b96 Mon Sep 17 00:00:00 2001 From: Jens Axboe <[email protected]> Date: Mon, 12 Oct 2020 16:44:23 -0600 Subject: [PATCH 1/2] readahead: use limited read-ahead to satisfy read Willy reports that there's a case where async buffered reads will be blocking, and that's due to not using read-ahead to generate the reads when read-ahead is disabled. io_uring relies on read-ahead triggering the reads, if not, it needs to fallback to threaded helpers. For the case where read-ahead is disabled on the file, or if the cgroup is congested, ensure that we can at least do 1 page of read-ahead to make progress on the read in an async fashion. This could potentially be larger, but it's not needed in terms of functionality, so let's error on the side of caution as larger counts of pages may run into reclaim issues (particularly if we're congested). Reported-by: Matthew Wilcox (Oracle) <[email protected]> Acked-by: Johannes Weiner <[email protected]> Signed-off-by: Jens Axboe <[email protected]> --- mm/readahead.c | 20 +++++++++++++------- 1 file changed, 13 insertions(+), 7 deletions(-) diff --git a/mm/readahead.c b/mm/readahead.c index 3c9a8dd7c56c..e5975f4e0ee5 100644 --- a/mm/readahead.c +++ b/mm/readahead.c @@ -568,15 +568,21 @@ void page_cache_sync_readahead(struct address_space *mapping, struct file_ra_state *ra, struct file *filp, pgoff_t index, unsigned long req_count) { - /* no read-ahead */ - if (!ra->ra_pages) - return; + bool do_forced_ra = filp && (filp->f_mode & FMODE_RANDOM); - if (blk_cgroup_congested()) - return; + /* + * Even if read-ahead is disabled, start this request as read-ahead. + * This makes regular read-ahead disabled use the same path as normal + * reads, instead of having to punt to ->readpage() manually. We limit + * ourselves to 1 page for this case, to avoid causing problems if + * we're congested or tight on memory. + */ + if (!ra->ra_pages || blk_cgroup_congested()) { + req_count = 1; + do_forced_ra = true; + } - /* be dumb */ - if (filp && (filp->f_mode & FMODE_RANDOM)) { + if (do_forced_ra) { force_page_cache_readahead(mapping, filp, index, req_count); return; } -- 2.28.0 ^ permalink raw reply related [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-13 17:50 ` Jens Axboe @ 2020-10-13 19:50 ` Hao_Xu 0 siblings, 0 replies; 14+ messages in thread From: Hao_Xu @ 2020-10-13 19:50 UTC (permalink / raw) To: Jens Axboe, Matthew Wilcox, io-uring; +Cc: Johannes Weiner 在 2020/10/14 上午1:50, Jens Axboe 写道: > On 10/12/20 11:31 PM, Hao_Xu wrote: >> 在 2020/10/13 上午6:08, Jens Axboe 写道: >>> On 10/12/20 3:13 PM, Matthew Wilcox wrote: >>>> This one's pretty unlikely, but there's a case in buffered reads where >>>> an IOCB_WAITQ read can end up sleeping. >>>> >>>> generic_file_buffered_read(): >>>> page = find_get_page(mapping, index); >>>> ... >>>> if (!PageUptodate(page)) { >>>> ... >>>> if (iocb->ki_flags & IOCB_WAITQ) { >>>> ... >>>> error = wait_on_page_locked_async(page, >>>> iocb->ki_waitq); >>>> wait_on_page_locked_async(): >>>> if (!PageLocked(page)) >>>> return 0; >>>> (back to generic_file_buffered_read): >>>> if (!mapping->a_ops->is_partially_uptodate(page, >>>> offset, iter->count)) >>>> goto page_not_up_to_date_locked; >>>> >>>> page_not_up_to_date_locked: >>>> if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { >>>> unlock_page(page); >>>> put_page(page); >>>> goto would_block; >>>> } >>>> ... >>>> error = mapping->a_ops->readpage(filp, page); >>>> (will unlock page on I/O completion) >>>> if (!PageUptodate(page)) { >>>> error = lock_page_killable(page); >>>> >>>> So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() >>>> and wait for the I/O to complete. I can't quite figure out if this is >>>> intentional -- I think not; if I understand the semantics right, we >>>> should be returning -EIOCBQUEUED and punting to an I/O thread to >>>> kick off the I/O and wait. >>>> >>>> I think the right fix is to return -EIOCBQUEUED from >>>> wait_on_page_locked_async() if the page isn't locked. ie this: >>>> >>>> @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, >>>> struct wait_page_queue *wait) >>>> { >>>> if (!PageLocked(page)) >>>> - return 0; >>>> + return -EIOCBQUEUED; >>>> return __wait_on_page_locked_async(compound_head(page), wait, false); >>>> } >>>> >>>> But as I said, I'm not sure what the semantics are supposed to be. >>> >>> If NOWAIT isn't set, then the issue attempt is from the helper thread >>> already, and IOCB_WAITQ shouldn't be set either (the latter doesn't >>> matter for this discussion). So it's totally fine and expected to block >>> at that point. >>> >>> Hmm actually, I believe that: >>> >>> commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 >>> Author: Hao Xu <[email protected]> >>> Date: Tue Sep 29 20:00:45 2020 +0800 >>> >>> io_uring: fix async buffered reads when readahead is disabled >>> >>> maybe messed up that case, so we could block off the retry-path. I'll >>> take a closer look, looks like that can be the case if read-ahead is >>> disabled. >>> >>> In general, we can only return -EIOCBQUEUED if the IO has been started >>> or is in progress already. That means we can safely rely on being told >>> when it's unlocked/done. If we need to block, we should be returning >>> -EAGAIN, which would punt to a worker thread. >>> >> Hi Jens, >> My undertanding of io_uring buffered reads process after the commit >> c8d317aa1887b40b188ec3aaa6e9e524333caed1 has been merged is: >> the first io_uring IO try is with IOCB_NOWAIT, the second retry in the >> same context is with IOCB_WAITQ but without IOCB_NOWAIT. >> so in Matthew's case, lock_page_async() will be called after calling >> mapping->a_ops->readpage(), So it won't end up sleeping. >> Actually this case is what happens when readahead is disabled or somehow >> skipped for reasons like blk_cgroup_congested() returns true. And this >> case is my commit c8d317aa1887b40b188e for. > > Well, try the patches. I agree it's not going to sleep with the previous > fix, but we're definitely driving a lower utilization by not utilizing > read-ahead even if disabled. > > Re-run your previous tests with these two applied and see what you get. > Sure I agree, looks good to me. I'll try the tests with the new code. Thanks ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-12 21:13 Loophole in async page I/O Matthew Wilcox 2020-10-12 22:08 ` Jens Axboe @ 2020-10-13 5:13 ` Hao_Xu 2020-10-13 12:01 ` Matthew Wilcox 1 sibling, 1 reply; 14+ messages in thread From: Hao_Xu @ 2020-10-13 5:13 UTC (permalink / raw) To: Matthew Wilcox, io-uring; +Cc: Johannes Weiner, Jens Axboe 在 2020/10/13 上午5:13, Matthew Wilcox 写道: > This one's pretty unlikely, but there's a case in buffered reads where > an IOCB_WAITQ read can end up sleeping. > > generic_file_buffered_read(): > page = find_get_page(mapping, index); > ... > if (!PageUptodate(page)) { > ... > if (iocb->ki_flags & IOCB_WAITQ) { > ... > error = wait_on_page_locked_async(page, > iocb->ki_waitq); > wait_on_page_locked_async(): > if (!PageLocked(page)) > return 0; > (back to generic_file_buffered_read): > if (!mapping->a_ops->is_partially_uptodate(page, > offset, iter->count)) > goto page_not_up_to_date_locked; > > page_not_up_to_date_locked: > if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { > unlock_page(page); > put_page(page); > goto would_block; > } > ... > error = mapping->a_ops->readpage(filp, page); > (will unlock page on I/O completion) > if (!PageUptodate(page)) { > error = lock_page_killable(page); > > So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() > and wait for the I/O to complete. I can't quite figure out if this is > intentional -- I think not; if I understand the semantics right, we > should be returning -EIOCBQUEUED and punting to an I/O thread to > kick off the I/O and wait. > > I think the right fix is to return -EIOCBQUEUED from > wait_on_page_locked_async() if the page isn't locked. ie this: > > @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, > struct wait_page_queue *wait) > { > if (!PageLocked(page)) > - return 0; > + return -EIOCBQUEUED; > return __wait_on_page_locked_async(compound_head(page), wait, false); > } > > But as I said, I'm not sure what the semantics are supposed to be. > Hi Matthew, which kernel version are you use, I believe I've fixed this case in the commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 in this commit, I did the modification: diff --git a/mm/filemap.c b/mm/filemap.c index 1aaea26556cc..ea383478fc22 100644 --- a/mm/filemap.c +++ b/mm/filemap.c @@ -2267,7 +2267,11 @@ ssize_t generic_file_buffered_read(struct kiocb *iocb, } if (!PageUptodate(page)) { - error = lock_page_killable(page); + if (iocb->ki_flags & IOCB_WAITQ) + error = lock_page_async(page, iocb->ki_waitq); + else + error = lock_page_killable(page); + if (unlikely(error)) goto readpage_error; if (!PageUptodate(page)) { lock_page_killable() won't be called in this case. ^ permalink raw reply related [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-13 5:13 ` Hao_Xu @ 2020-10-13 12:01 ` Matthew Wilcox 2020-10-13 19:57 ` Hao_Xu 0 siblings, 1 reply; 14+ messages in thread From: Matthew Wilcox @ 2020-10-13 12:01 UTC (permalink / raw) To: Hao_Xu; +Cc: io-uring, Johannes Weiner, Jens Axboe On Tue, Oct 13, 2020 at 01:13:48PM +0800, Hao_Xu wrote: > 在 2020/10/13 上午5:13, Matthew Wilcox 写道: > > This one's pretty unlikely, but there's a case in buffered reads where > > an IOCB_WAITQ read can end up sleeping. > > > > generic_file_buffered_read(): > > page = find_get_page(mapping, index); > > ... > > if (!PageUptodate(page)) { > > ... > > if (iocb->ki_flags & IOCB_WAITQ) { > > ... > > error = wait_on_page_locked_async(page, > > iocb->ki_waitq); > > wait_on_page_locked_async(): > > if (!PageLocked(page)) > > return 0; > > (back to generic_file_buffered_read): > > if (!mapping->a_ops->is_partially_uptodate(page, > > offset, iter->count)) > > goto page_not_up_to_date_locked; > > > > page_not_up_to_date_locked: > > if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { > > unlock_page(page); > > put_page(page); > > goto would_block; > > } > > ... > > error = mapping->a_ops->readpage(filp, page); > > (will unlock page on I/O completion) > > if (!PageUptodate(page)) { > > error = lock_page_killable(page); > > > > So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() > > and wait for the I/O to complete. I can't quite figure out if this is > > intentional -- I think not; if I understand the semantics right, we > > should be returning -EIOCBQUEUED and punting to an I/O thread to > > kick off the I/O and wait. > > > > I think the right fix is to return -EIOCBQUEUED from > > wait_on_page_locked_async() if the page isn't locked. ie this: > > > > @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, > > struct wait_page_queue *wait) > > { > > if (!PageLocked(page)) > > - return 0; > > + return -EIOCBQUEUED; > > return __wait_on_page_locked_async(compound_head(page), wait, false); > > } > > But as I said, I'm not sure what the semantics are supposed to be. > > > Hi Matthew, > which kernel version are you use, I believe I've fixed this case in the > commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 Ah, I don't have that commit in my tree. Nevertheless, there is still a problem. The ->readpage implementation is not required to execute asynchronously. For example, it may enter page reclaim by using GFP_KERNEL. Indeed, I feel it is better if it works synchronously as it can then report the actual error from an I/O instead of the almost-meaningless -EIO. This patch series documents 12 filesystems which implement ->readpage in a synchronous way today (for at least some cases) and converts iomap to be synchronous (making two more filesystems synchronous). https://lore.kernel.org/linux-fsdevel/[email protected]/ ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: Loophole in async page I/O 2020-10-13 12:01 ` Matthew Wilcox @ 2020-10-13 19:57 ` Hao_Xu 0 siblings, 0 replies; 14+ messages in thread From: Hao_Xu @ 2020-10-13 19:57 UTC (permalink / raw) To: Matthew Wilcox; +Cc: io-uring, Johannes Weiner, Jens Axboe 在 2020/10/13 下午8:01, Matthew Wilcox 写道: > On Tue, Oct 13, 2020 at 01:13:48PM +0800, Hao_Xu wrote: >> 在 2020/10/13 上午5:13, Matthew Wilcox 写道: >>> This one's pretty unlikely, but there's a case in buffered reads where >>> an IOCB_WAITQ read can end up sleeping. >>> >>> generic_file_buffered_read(): >>> page = find_get_page(mapping, index); >>> ... >>> if (!PageUptodate(page)) { >>> ... >>> if (iocb->ki_flags & IOCB_WAITQ) { >>> ... >>> error = wait_on_page_locked_async(page, >>> iocb->ki_waitq); >>> wait_on_page_locked_async(): >>> if (!PageLocked(page)) >>> return 0; >>> (back to generic_file_buffered_read): >>> if (!mapping->a_ops->is_partially_uptodate(page, >>> offset, iter->count)) >>> goto page_not_up_to_date_locked; >>> >>> page_not_up_to_date_locked: >>> if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT)) { >>> unlock_page(page); >>> put_page(page); >>> goto would_block; >>> } >>> ... >>> error = mapping->a_ops->readpage(filp, page); >>> (will unlock page on I/O completion) >>> if (!PageUptodate(page)) { >>> error = lock_page_killable(page); >>> >>> So if we have IOCB_WAITQ set but IOCB_NOWAIT clear, we'll call ->readpage() >>> and wait for the I/O to complete. I can't quite figure out if this is >>> intentional -- I think not; if I understand the semantics right, we >>> should be returning -EIOCBQUEUED and punting to an I/O thread to >>> kick off the I/O and wait. >>> >>> I think the right fix is to return -EIOCBQUEUED from >>> wait_on_page_locked_async() if the page isn't locked. ie this: >>> >>> @@ -1258,7 +1258,7 @@ static int wait_on_page_locked_async(struct page *page, >>> struct wait_page_queue *wait) >>> { >>> if (!PageLocked(page)) >>> - return 0; >>> + return -EIOCBQUEUED; >>> return __wait_on_page_locked_async(compound_head(page), wait, false); >>> } >>> But as I said, I'm not sure what the semantics are supposed to be. >>> >> Hi Matthew, >> which kernel version are you use, I believe I've fixed this case in the >> commit c8d317aa1887b40b188ec3aaa6e9e524333caed1 > > Ah, I don't have that commit in my tree. > > Nevertheless, there is still a problem. The ->readpage implementation > is not required to execute asynchronously. For example, it may enter > page reclaim by using GFP_KERNEL. Indeed, I feel it is better if it > works synchronously as it can then report the actual error from an I/O > instead of the almost-meaningless -EIO. > > This patch series documents 12 filesystems which implement ->readpage > in a synchronous way today (for at least some cases) and converts iomap > to be synchronous (making two more filesystems synchronous). > > https://lore.kernel.org/linux-fsdevel/[email protected]/ > Thanks, Matthew. I didn't have this knowledge before, thank you for your share and information. It's really kind of you. I'll look into it soon. ^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2020-10-15 12:17 UTC | newest] Thread overview: 14+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2020-10-12 21:13 Loophole in async page I/O Matthew Wilcox 2020-10-12 22:08 ` Jens Axboe 2020-10-12 22:22 ` Jens Axboe 2020-10-12 22:42 ` Jens Axboe 2020-10-14 20:31 ` Hao_Xu 2020-10-14 20:57 ` Jens Axboe 2020-10-15 11:27 ` Hao_Xu 2020-10-15 12:17 ` Hao_Xu 2020-10-13 5:31 ` Hao_Xu 2020-10-13 17:50 ` Jens Axboe 2020-10-13 19:50 ` Hao_Xu 2020-10-13 5:13 ` Hao_Xu 2020-10-13 12:01 ` Matthew Wilcox 2020-10-13 19:57 ` Hao_Xu
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox