linux-ext4.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Theodore Tso <tytso@mit.edu>
To: Adrian Hunter <adrian.hunter@nokia.com>
Cc: Andrew.Morton.akpm@linux-foundation.org,
	Andreas.Dilger.adilger@sun.com, Stephen.Tweedie.sct@redhat.com,
	Artem Bityutskiy <artem.bityutskiy@nokia.com>,
	linux-ext4@vger.kernel.org
Subject: Re: [PATCH 0/2] ext3 HACKs
Date: Tue, 14 Jul 2009 11:51:18 -0400	[thread overview]
Message-ID: <20090714155118.GB10131@mit.edu> (raw)
In-Reply-To: <20090714140253.25993.64525.sendpatchset@ahunter-tower>

On Tue, Jul 14, 2009 at 05:02:53PM +0300, Adrian Hunter wrote:
> Hi
> 
> We are using linux 2.6.28 and we have a situation where ext3
> can take 30-60 seconds to mount.
> 
> The cause is the underlying device has extremely poor random
> write speed (several orders of magnitude slower than sequential
> write speed), and journal recovery can involve many small random
> writes.
> 
> To alleviate this situation somewhat, I have two moderately ugly
> hacks:
> 	HACK 1: ext3: mount fast even when recovering
> 	HACK 2: do I/O read requests while ext3 journal recovers
> 
> HACK 1 uses a I/O barrier in place of waiting for recovery I/O to be
> flushed.
> 
> HACK 2 crudely throws I/O read requests to the front of the dispatch
> queue until the I/O barrier from HACK 1 is reached.

Have you actually benchmarked these patches, ideally with a fixed
filesystem image so the two runs are done requiring exactly the same
number of blocks to recover?  We implement ordered I/O in terms of
doing a flush, so it would be surprising to see that a significant
difference in times.  Also, it would be useful to do a blktrace before
and after your patches, again with a fixed filesystem image so the
experiment can be carefully controlled.

Regards,

						- Ted

  parent reply	other threads:[~2009-07-14 15:51 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-07-14 14:02 [PATCH 0/2] ext3 HACKs Adrian Hunter
2009-07-14 14:03 ` [PATCH 1/2] HACK: ext3: mount fast even when recovering Adrian Hunter
2009-07-14 21:22   ` Andreas Dilger
2009-07-15 15:35     ` Adrian Hunter
2009-07-14 14:03 ` [PATCH 2/2] HACK: do I/O read requests while ext3 journal recovers Adrian Hunter
2009-07-14 21:26   ` Andreas Dilger
2009-07-15 15:35     ` Adrian Hunter
2009-07-14 15:51 ` Theodore Tso [this message]
  -- strict thread matches above, loose matches on Subject: below --
2009-07-14 14:05 [PATCH 0/2] ext3 HACKs Adrian Hunter

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20090714155118.GB10131@mit.edu \
    --to=tytso@mit.edu \
    --cc=Andreas.Dilger.adilger@sun.com \
    --cc=Andrew.Morton.akpm@linux-foundation.org \
    --cc=Stephen.Tweedie.sct@redhat.com \
    --cc=adrian.hunter@nokia.com \
    --cc=artem.bityutskiy@nokia.com \
    --cc=linux-ext4@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).