Received: by 2002:ac0:8c8e:0:0:0:0:0 with SMTP id r14csp934770ima; Wed, 6 Feb 2019 10:44:57 -0800 (PST) X-Google-Smtp-Source: AHgI3IbpwqLmGzg70nCa4LYQu8xCd2GPwq0dTC26hzaK91BXthw6riECJmenBN7TrPjzOARFI2KU X-Received: by 2002:a62:3ad1:: with SMTP id v78mr11647453pfj.85.1549478697291; Wed, 06 Feb 2019 10:44:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549478697; cv=none; d=google.com; s=arc-20160816; b=0VQyLZ9VAq0E9w1L1yehti9k+1CpPS4bOG583jlzPqZfjG6jEJgzFo9dkIBZS+kpG/ yP5/qogf2TPp39ScmpmRSrOlsqJzA4EGfjzkTP/SIUQYyeS5+mwFZ8bmkCvu1430n8BR 9YOOOoC9tuNocqbjUFulIy6gVDNNWR+cEnBRqF4CxaBtoqkNgBQ6d1j6QSfqja5xuhD5 llXibXFljkyxWFqfD3MQv9rtQv33ptsZF6/eovrdJhz3XIpa9+ghESWkapfbmisYiBqk 1vd//q0wGazATbDxq78EbmwLNSwnY9CkH42c4FDj9AKztV4FG9IABYUHmsdPhUZoKUF3 Bgug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:organization :references:in-reply-to:date:cc:to:from:subject:message-id; bh=laiof55HCDMenvPuXo0LpjVlHiqgonuDwq7OTfSpkEE=; b=qaBfGy1eeZ+ao7/P0Rn2IdIy4ZOY5OJQgFvAA2erf6tZirZ4cLERnAAHaxG8vXKtaY pvsvRCylbm/NxgenHLWCgAFbL4LVViOe+SRu5mhC1FI4ClS61tcgREnWY4bJJPO6nDqj kYk8MuM40Ha+5Q0EI8sRlyOKh3VHQbP6fjDPIfWY9o2my+YWuQouPH8ezYUHfnXX/gdL aWE1SVhlHaTzIrBuvw6X6Z/l2PdkVRo6njAptlaqUt5VdxJZH9Y52l8tAqMTEgywZ4Xd TuCdus+zGz08W59kpcMsyDiskS98ricHa+NzKr5yRbTnWP9m4avLGZmKPm8yY5ndOTmD 94DA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p7si2232870pfj.115.2019.02.06.10.44.41; Wed, 06 Feb 2019 10:44:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726727AbfBFSoX (ORCPT + 99 others); Wed, 6 Feb 2019 13:44:23 -0500 Received: from mx1.redhat.com ([209.132.183.28]:33046 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725928AbfBFSoX (ORCPT ); Wed, 6 Feb 2019 13:44:23 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 38F08E6A65; Wed, 6 Feb 2019 18:44:22 +0000 (UTC) Received: from haswell-e.nc.xsintricity.com (ovpn-112-17.rdu2.redhat.com [10.10.112.17]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0DF4917CFF; Wed, 6 Feb 2019 18:44:19 +0000 (UTC) Message-ID: <411ec0e65f4aa430f5af71afc0a726226e962f61.camel@redhat.com> Subject: Re: [LSF/MM TOPIC] Discuss least bad options for resolving longterm-GUP usage by RDMA From: Doug Ledford To: Matthew Wilcox Cc: Jason Gunthorpe , Jan Kara , Ira Weiny , lsf-pc@lists.linux-foundation.org, linux-rdma@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, John Hubbard , Jerome Glisse , Dan Williams , Dave Chinner , Michal Hocko Date: Wed, 06 Feb 2019 13:44:17 -0500 In-Reply-To: <20190206183503.GO21860@bombadil.infradead.org> References: <20190205175059.GB21617@iweiny-DESK2.sc.intel.com> <20190206095000.GA12006@quack2.suse.cz> <20190206173114.GB12227@ziepe.ca> <20190206175233.GN21860@bombadil.infradead.org> <47820c4d696aee41225854071ec73373a273fd4a.camel@redhat.com> <20190206183503.GO21860@bombadil.infradead.org> Organization: Red Hat, Inc. Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-STkidJ/sDmjPcGJyIwmW" User-Agent: Evolution 3.30.4 (3.30.4-1.fc29) Mime-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Wed, 06 Feb 2019 18:44:22 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --=-STkidJ/sDmjPcGJyIwmW Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Wed, 2019-02-06 at 10:35 -0800, Matthew Wilcox wrote: > On Wed, Feb 06, 2019 at 01:32:04PM -0500, Doug Ledford wrote: > > On Wed, 2019-02-06 at 09:52 -0800, Matthew Wilcox wrote: > > > On Wed, Feb 06, 2019 at 10:31:14AM -0700, Jason Gunthorpe wrote: > > > > On Wed, Feb 06, 2019 at 10:50:00AM +0100, Jan Kara wrote: > > > >=20 > > > > > MM/FS asks for lease to be revoked. The revoke handler agrees wit= h the > > > > > other side on cancelling RDMA or whatever and drops the page pins= .=20 > > > >=20 > > > > This takes a trip through userspace since the communication protoco= l > > > > is entirely managed in userspace. > > > >=20 > > > > Most existing communication protocols don't have a 'cancel operatio= n'. > > > >=20 > > > > > Now I understand there can be HW / communication failures etc. in > > > > > which case the driver could either block waiting or make sure fut= ure > > > > > IO will fail and drop the pins.=20 > > > >=20 > > > > We can always rip things away from the userspace.. However.. > > > >=20 > > > > > But under normal conditions there should be a way to revoke the > > > > > access. And if the HW/driver cannot support this, then don't let = it > > > > > anywhere near DAX filesystem. > > > >=20 > > > > I think the general observation is that people who want to do DAX & > > > > RDMA want it to actually work, without data corruption, random proc= ess > > > > kills or random communication failures. > > > >=20 > > > > Really, few users would actually want to run in a system where revo= ke > > > > can be triggered. > > > >=20 > > > > So.. how can the FS/MM side provide a guarantee to the user that > > > > revoke won't happen under a certain system design? > > >=20 > > > Most of the cases we want revoke for are things like truncate(). > > > Shouldn't happen with a sane system, but we're trying to avoid users > > > doing awful things like being able to DMA to pages that are now part = of > > > a different file. > >=20 > > Why is the solution revoke then? Is there something besides truncate > > that we have to worry about? I ask because EBUSY is not currently > > listed as a return value of truncate, so extending the API to include > > EBUSY to mean "this file has pinned pages that can not be freed" is not > > (or should not be) totally out of the question. > >=20 > > Admittedly, I'm coming in late to this conversation, but did I miss the > > portion where that alternative was ruled out? >=20 > That's my preferred option too, but the preponderance of opinion leans > towards "We can't give people a way to make files un-truncatable". Has anyone looked at the laundry list of possible failures truncate already has? Among others, ETXTBSY is already in the list, and it allows someone to make a file un-truncatable by running it. There's EPERM for multiple failures. In order for someone to make a file untruncatable using this, they would have to have perms to the file already anyway as well as perms to get the direct I/O pin. I see no reason why, if they have the perms to do it, that you don't allow them to. If you don't want someone else to make a file untruncatable that you want to truncate, then don't share file perms with them. What's the difficulty here? Really, creating this complex revoke thing to tear down I/O when people really *don't* want that I/O getting torn down seems like forcing a bad API on I/O to satisfy not doing what is an entirely natural extension to an existing API. You *shouldn't* have the right to truncate a file that is busy, and ETXTBSY is a perfect example of that, and an example of the API done right. This other.... --=20 Doug Ledford GPG KeyID: B826A3330E572FDD Key fingerprint =3D AE6B 1BDA 122B 23B4 265B 1274 B826 A333 0E57 2FDD --=-STkidJ/sDmjPcGJyIwmW Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEErmsb2hIrI7QmWxJ0uCajMw5XL90FAlxbKwEACgkQuCajMw5X L93yBRAAhRGEMpj2vV32qd66hnUXo3c/jfmEjxn5HXrp5Gqq1PT+ppU7gsJc9GjC X1m2Dd9q6QfoV8rNlDiG9xHkXxu+AUmxOg24dCqJyOVji0kb0rhIgjgGobR9s7em /9lSxKrbSJmSVFFjhX7UnTc97MgVugE94wSuOGCcVsBljT5ZGM4Gvkwk3uXxSwDx juDfnuEKgcjs45ZA0DvZ/10u422pDHrHHCxjC9dVGA0BmaMK44hx2e7/XWWdiUV4 bn1vJM1t0Y3gavQwAXXV7uwS/55DZ9gFtOtTOb+qBnx59BzdZ0ntp3UxsZ3lPKG+ IjOW1gHlgI0m1NdDzFJwZC7o1ZGnTBMrhMRhMOUSjHS+qX4HZnvXcWEZJ9bGtbvT SWJE3zZ2P+0ssvLHD9iQKEBoZQaDnLzZmXlFWraHTAGgPTmxF9WId3rK6YPSWieC Vf7oyQNl7N3mxsmTlzB/Zz1f4OE7W4F3di6NntJaePOQ26L7yY7kMNDtGzKjF+GV F1DWnT7NDunXRHTnNgc6/dEOfcFrPQ79UZK2AHxy3wHRhljQvBxaJ5AHJWjAOz+8 TcOljAVacnW5oZb3i83NdLa6eg9ZBT4p/3PuehjjfaewOtMPzcFkW2jofSqqhZgY pUthVtuy3HEjYRrwKdZyz5G+LNUiu7iF84Q8KomsuDC1Sd6NTYw= =rH71 -----END PGP SIGNATURE----- --=-STkidJ/sDmjPcGJyIwmW--