Message ID | 20221103085004.1029763-1-ming.lei@redhat.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp401057wru; Thu, 3 Nov 2022 01:56:13 -0700 (PDT) X-Google-Smtp-Source: AMsMyM60yWg2txG076VcMQS2XTH+KeCwPQV+Ba2dI8X+6aBYg7HKgiUHeZQ1zTiSf3a2bfZlAKKO X-Received: by 2002:a17:907:2cd4:b0:7ad:e5b7:a530 with SMTP id hg20-20020a1709072cd400b007ade5b7a530mr16000347ejc.489.1667465773377; Thu, 03 Nov 2022 01:56:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667465773; cv=none; d=google.com; s=arc-20160816; b=sNH7tej7kGzAKIs1uodghSaF9Jpo0o993xxJLWA3g+wkB0dtaBRUuKTYsVss9Apf+r jxld9iPfVJzx0pojMZH0AWpw/3bwWbxBGUgqf3FyzJjBO/lmQNP5mdvKid8Ec+SFM1uA VO31aZEOt/1X1pJqXrpCZkEcqD4kCBdGa42HoId44UsMpRJs/N/twBPPopsycpgv1x78 UWWNHBUdUPt05DKbCZ5Uzyh6tc/dvtYlUQx6CyhjHJKnOgfYyljmOc/rsUTwTFfrtJnK b6T2nBGbbeV1iXzsdN0kQKzGbE3oQeVGcFjAGxwJWRaluaCBWIsXKMsMfTMib5xTis6e F1PA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=FeqABZBo26005zjL1Br5RZrJuJL5HVgW06cRmiuIaZg=; b=xHbNFgR2Nw8z4hmHyHqrvTLol4iG+cSSnDNPG1oZ8tIucwrBdGviyVHX8Cl86zz34n sCV5AxvDtIkGGFCfdL9E4pb7UEW3eCYkuoMIcJDoCB9XlkqyFtuXJrp07mY7RM6I4EVd FziHSs7hKskchXQVaExL1+hte0vQH7ieChKvCCBRrCDvUd7bnry9U0LsFCumFbmu9qUx xtdfgFKPD99L6sk3udIoWk2fCyA0OlIlmT7ioY8JWIC4bMuk2+fXg6i4HbMFc9H2cOKu O3YFXscBSDcJo3hvDSRaLf9H+tOw3wylvERaRIokiFHH/kTls0Tp6SunHH0rFN8WGvWl 3jvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hAe7c+oo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dn21-20020a17090794d500b007adf16570c3si753509ejc.17.2022.11.03.01.55.50; Thu, 03 Nov 2022 01:56:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=hAe7c+oo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231297AbiKCIva (ORCPT <rfc822;yves.mi.zy@gmail.com> + 99 others); Thu, 3 Nov 2022 04:51:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52282 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229379AbiKCIv1 (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 3 Nov 2022 04:51:27 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6A11BD2DA for <linux-kernel@vger.kernel.org>; Thu, 3 Nov 2022 01:50:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1667465428; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=FeqABZBo26005zjL1Br5RZrJuJL5HVgW06cRmiuIaZg=; b=hAe7c+oox8n9rrYyuKYT6zujshRu2HaAQlSmtwZSGzQUsGDMMiUDuhhZXZgkh5FJlRKXfN xBuN9F9SYqA4e316fF5t0WvEu69/Ps2MEmcLd79BNKDGZKNohuhinahiGn52894B2iIB/o LOmqwCSyClFn4LYzpSZGld/qxkagcas= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-100-LeVvhBuJPlGnBUxBUZBlrw-1; Thu, 03 Nov 2022 04:50:25 -0400 X-MC-Unique: LeVvhBuJPlGnBUxBUZBlrw-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 165491C0513A; Thu, 3 Nov 2022 08:50:25 +0000 (UTC) Received: from localhost (ovpn-8-20.pek2.redhat.com [10.72.8.20]) by smtp.corp.redhat.com (Postfix) with ESMTP id B7B9839D6A; Thu, 3 Nov 2022 08:50:23 +0000 (UTC) From: Ming Lei <ming.lei@redhat.com> To: Jens Axboe <axboe@kernel.dk>, io-uring@vger.kernel.org Cc: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Miklos Szeredi <mszeredi@redhat.com>, Stefan Hajnoczi <stefanha@redhat.com>, ZiyangZhang <ZiyangZhang@linux.alibaba.com>, Ming Lei <ming.lei@redhat.com> Subject: [RFC PATCH 0/4] io_uring/splice: extend splice for supporting ublk zero copy Date: Thu, 3 Nov 2022 16:50:00 +0800 Message-Id: <20221103085004.1029763-1-ming.lei@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.5 X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748464590815942044?= X-GMAIL-MSGID: =?utf-8?q?1748464590815942044?= |
Series |
io_uring/splice: extend splice for supporting ublk zero copy
|
|
Message
Ming Lei
Nov. 3, 2022, 8:50 a.m. UTC
Hello Guys, This patch extends io_uring/splice by adding two flags(SPLICE_F_DIRECT & SPLICE_F_READ_TO_READ) for supporting ublk zero copy, and fuse could benefit from the change too. - SPLICE_F_DIRECT is for using do_splice_direct() to support zero copy - SPLICE_F_READ_TO_READ is for supporting ublk READ zero copy, the plain splice can support WRITE zero copy by: splice(ublkc_fd, ublkc_pos, pipe_wr_fd, NULL, len, flags) splice(pipe_rd_fd, NULL, backing_fd, backing_off, len, flags) but can't support READ zc. Extend splice to allow to splice from the 1st ->splice_read()(producer) to the 2nd ->splice_read()(consumer), then READ request pages reference can be transferred to backing IO code path. The initial idea is suggested by Miklos Szeredi & Stefan Hajnoczi. The patchset has been verified basically by ublk builtin tests(loop/008, loop/009, generic/003), and basic mount, git clone, kernel building, umount tests on ublk-loop[1] which is created by 'ublk add -t loop -f $backing -z'. The next step is to allow io_uring to run do_splice_direct*() in async style like normal async RW instead of offloading to iowq context, so that top performance can be reached, and that depends on current work. Any comments are welcome. [1] https://github.com/ming1/ubdsrv/commits/splice-zc Ming Lei (4): io_uring/splice: support do_splice_direct fs/splice: add helper of splice_dismiss_pipe() io_uring/splice: support splice from ->splice_read to ->splice_read ublk_drv: support splice based read/write zero copy drivers/block/ublk_drv.c | 151 +++++++++++++++++++++++++- fs/read_write.c | 5 +- fs/splice.c | 193 +++++++++++++++++++++++++++++----- include/linux/fs.h | 2 + include/linux/pipe_fs_i.h | 9 ++ include/linux/splice.h | 14 +++ include/uapi/linux/ublk_cmd.h | 34 +++++- io_uring/splice.c | 16 ++- 8 files changed, 392 insertions(+), 32 deletions(-)
Comments
On 2022/11/3 16:50, Ming Lei wrote: > Hello Guys, > > This patch extends io_uring/splice by adding two flags(SPLICE_F_DIRECT & > SPLICE_F_READ_TO_READ) for supporting ublk zero copy, and fuse could benefit > from the change too. > > - SPLICE_F_DIRECT is for using do_splice_direct() to support zero copy > > - SPLICE_F_READ_TO_READ is for supporting ublk READ zero copy, the plain > splice can support WRITE zero copy by: > > splice(ublkc_fd, ublkc_pos, pipe_wr_fd, NULL, len, flags) > splice(pipe_rd_fd, NULL, backing_fd, backing_off, len, flags) > > but can't support READ zc. Extend splice to allow to splice from the 1st > ->splice_read()(producer) to the 2nd ->splice_read()(consumer), then READ > request pages reference can be transferred to backing IO code path. > > The initial idea is suggested by Miklos Szeredi & Stefan Hajnoczi. > > The patchset has been verified basically by ublk builtin tests(loop/008, > loop/009, generic/003), and basic mount, git clone, kernel building, umount > tests on ublk-loop[1] which is created by 'ublk add -t loop -f $backing -z'. > > The next step is to allow io_uring to run do_splice_direct*() > in async style like normal async RW instead of offloading to > iowq context, so that top performance can be reached, and that > depends on current work. > > Any comments are welcome. > > [1] https://github.com/ming1/ubdsrv/commits/splice-zc > > > Ming Lei (4): > io_uring/splice: support do_splice_direct > fs/splice: add helper of splice_dismiss_pipe() > io_uring/splice: support splice from ->splice_read to ->splice_read > ublk_drv: support splice based read/write zero copy > > drivers/block/ublk_drv.c | 151 +++++++++++++++++++++++++- > fs/read_write.c | 5 +- > fs/splice.c | 193 +++++++++++++++++++++++++++++----- > include/linux/fs.h | 2 + > include/linux/pipe_fs_i.h | 9 ++ > include/linux/splice.h | 14 +++ > include/uapi/linux/ublk_cmd.h | 34 +++++- > io_uring/splice.c | 16 ++- > 8 files changed, 392 insertions(+), 32 deletions(-) > Hi, Ming I have quickly scanned the code. It seems like biovec pages are successfully passed to the backend for READ/WRITE. I will learn your code and run some tests. I will give more feedback next week. Regards, Zhang