Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1605953imu; Wed, 9 Jan 2019 23:05:37 -0800 (PST) X-Google-Smtp-Source: ALg8bN40tQfJrzai3s/IQwbQemcTj8A7YXVztD4YNoB48i3HW7pVUReK5GfMPld+nsrh51Ffc/dU X-Received: by 2002:a17:902:fa2:: with SMTP id 31mr9270268plz.75.1547103937465; Wed, 09 Jan 2019 23:05:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547103937; cv=none; d=google.com; s=arc-20160816; b=zUmM59b2F7/hRTfuahZqiva8A3jLAxQP2wLIXaJTXxrKHjDjHb93Y/DtoWHjfJVJ/q +A0JTJbalknuvhFF/T3GMEuU1nUPmKpRf/3BUL1bFMrU5KGCoqDBi82KOm2I6o8v8PLa 8dS2Lh1ehs8piS1BmrmBnGHxDKW06MH29ZEqM5vy9axtjhyHAzvBRLotSuDd5cqlxz25 pc3cjtb+FiYZ5kcMQPmOUNlmxha7nnctiIOB4p8wMoNOKobgMR75wdzEmlADlbXUyr+H SXwDD4tEfNyT72m7V9C76cX6HXDaU8EPp10/SmuJ5ooUDWOgkkRZhVZXXtQ0uNqCFkbm fPCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Bw6a39DaQ1HS5CYKyoaWslJjxUuXbYtH5T4pM6Ofc2A=; b=hqQxJ6Zm31oTcN0+JQGgqQRbi84I0JDyug/tjYsw1RbuJ5TGM16aF8th+hjEXm0oX3 suW9dqznc3wxxiwLWKfh4rj88tNAEvE6l+UaPdRtlu4syLySezWsARvvjGLZPvFjsADY Ygk3UptsKp0oZK8o8YBEV0I9mce82C/5QpF5n9XV1ApCMYKzSIjM/kxrycGqRt2rsdEY U4Use22jH/q6ExFjRK02NBdZVeluzvJHG/OVpQj8hpepcXmQEElsD+pmM9RB5Zjug+KM Yw1MCWEST3MCKd5DEeBAilTtsrJiPzfmjOLwDtAbuQnUKSoH8IMZdWmS6XANKkEg6hBi jsww== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x12si12008347pgf.454.2019.01.09.23.05.22; Wed, 09 Jan 2019 23:05:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727481AbfAJHEC (ORCPT + 99 others); Thu, 10 Jan 2019 02:04:02 -0500 Received: from ipmail06.adl6.internode.on.net ([150.101.137.145]:52302 "EHLO ipmail06.adl6.internode.on.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727220AbfAJHEB (ORCPT ); Thu, 10 Jan 2019 02:04:01 -0500 Received: from ppp59-167-129-252.static.internode.on.net (HELO dastard) ([59.167.129.252]) by ipmail06.adl6.internode.on.net with ESMTP; 10 Jan 2019 17:33:58 +1030 Received: from dave by dastard with local (Exim 4.80) (envelope-from ) id 1ghUNf-0002Bx-TT; Thu, 10 Jan 2019 18:03:55 +1100 Date: Thu, 10 Jan 2019 18:03:55 +1100 From: Dave Chinner To: Linus Torvalds Cc: Jiri Kosina , Matthew Wilcox , Jann Horn , Andrew Morton , Greg KH , Peter Zijlstra , Michal Hocko , Linux-MM , kernel list , Linux API Subject: Re: [PATCH] mm/mincore: allow for making sys_mincore() privileged Message-ID: <20190110070355.GJ27534@dastard> References: <20190108044336.GB27534@dastard> <20190109022430.GE27534@dastard> <20190109043906.GF27534@dastard> <20190110004424.GH27534@dastard> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 09, 2019 at 05:18:21PM -0800, Linus Torvalds wrote: > On Wed, Jan 9, 2019 at 4:44 PM Dave Chinner wrote: > > > > I wouldn't look at ext4 as an example of a reliable, problem free > > direct IO implementation because, historically speaking, it's been a > > series of nasty hacks (*cough* mount -o dioread_nolock *cough*) and > > been far worse than XFS from data integrity, performance and > > reliability perspectives. > > That's some big words from somebody who just admitted to much worse hacks. Sorry, what hacks did I just admit to making? This O_DIRECT behaviour long predates me - I'm just the messenger and you are shooting from the hip. Linus, the point I was making is that there are many, many ways to control page cache invalidation and measure page cache residency, and that trying to address them one-by-one is just a game of whack-a-mole. In future, can you please try not to go off the rails when someone mentions O_DIRECT? You have a terrible habit of going off on misdirected rants about O_DIRECT and/or XFS at any opportunity you can get, and all it does is derail whatever useful conversation was taking place. > Seriously. XFS is buggy in this regard, ext4 apparently isn't. So you keep asserting despite being presented with evidence that it mitigates other longstanding bugs that are really hard to solve. Ignoring all the evidence you've been presented with and re-asserting your original statement doesn't make it correct. Did you not think to ask "what are those problems, and what can do to solve them so we can remove the invalidation mitigations that XFS uses?". That would be a useful contribution, whereas shouting about how O_DIRECT is broken just pisses off the people working their asses off to fix the problems you just heard about and are ranting about. > Thinking that it's better to just invalidate the cache for direct IO > reads is all kinds of odd. No, it's practicality. If we can't fix the problem, we have to mitigate it. When we fix the underlying problem we can remove the mitigation code. having you assert that it's broken and demand that it be removed doesn't change the fact that we haven't fixed the underlying problems. It's being worked on, but we're not there yet. -Dave. -- Dave Chinner david@fromorbit.com