Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1281yba; Thu, 25 Apr 2019 16:52:23 -0700 (PDT) X-Google-Smtp-Source: APXvYqwcpmTmaaLcGxJFr99qqXGdBkUZcBxTYxBcgU1pfgxIzmWzncIvSmGE3HV5qeRmo2fuy8T2 X-Received: by 2002:a17:902:ba85:: with SMTP id k5mr42301465pls.270.1556236343248; Thu, 25 Apr 2019 16:52:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556236343; cv=none; d=google.com; s=arc-20160816; b=NDFaWQkWVRiJTMxdFmFid2Dq8MThjsjjZBQtK4rF9I8O3nJlWtbi/TWbufHfHYfHQi 3ecVGCw4pQ1MpW6grETWttKg/DdVHpxXXU45MWj2lA7WLaXuJlYAueofjwETUK5fmY0h j9r1CjKfujFCjmQxLYv+1+2ZrLzQt0otWOuW4VeqOfsJKKP92tXKJ2+RYnnaQOMDjbZb B0BfcovxUrBjQyEu0MUxMgcJI+H1ZrQC3a1hXqvFER0Ij3wr3IWYasNYjno/s/p+wcNj g7QHmdop8cqZX1QY2if7QudX5vfVSD1ofAxn6qDCAdN92Obai7wAu5+AqNmhX73eV/w+ IJaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=Gts/lQwt0YxNynttr5N6RlbHIEh6gaCK+k2brjcuKl4=; b=pfH7b5QAahQHkac31jzgdldiRuehtiQeU/wfYY5LH14K4HtZTVRB8qFUmn/eVAWt91 zmUocJkSjQp3LQzQruDJWt05LYb+Icfc7X7F84VpbZbsERw0HYefIN4TOgfS7/8ZqVio FwcJJQv2TUCRFpJ9+TQGXazUqkCXq1GP+iNvo20Zkk9+6lUIrhpJf095B7vteCntr9IM +QcRHKxyssbPqSgIH8ScdwEyUe54xMu+EY2XPuFkTnVDuGpk/UGMSL6QBXJFF5XCvzHH eVZ1yfv9F6veKF5IvMPggFL7d+VUpnJreUe7bWuYXaS66r0OZdy0LPWxXi5HsZoChCYd YeWA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jRhaMNX3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b5si10423493pge.550.2019.04.25.16.51.34; Thu, 25 Apr 2019 16:52:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jRhaMNX3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730658AbfDYSg5 (ORCPT + 99 others); Thu, 25 Apr 2019 14:36:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:41632 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727381AbfDYSgz (ORCPT ); Thu, 25 Apr 2019 14:36:55 -0400 Received: from tleilax.poochiereds.net (cpe-71-70-156-158.nc.res.rr.com [71.70.156.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2E54B2067C; Thu, 25 Apr 2019 18:36:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556217415; bh=BlBnaTLAE7TBhCOz3IxNSscJLP0yJ+egegDku4/Lwp4=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=jRhaMNX3ilHyZkRydLziF9b0WG6fKkSHLJ4RG7zxXU6RfZ4eMi7+8Qo3PSpT45zVo ALT66RLZBLBQNkon/Yvnu7VVLvsRqgbLMu58/sZ2dGcoN8L783h/z+jb7xpzS2YyB0 Kyb+5gqnHXTAGBS3MvWHdRCRLl0Tj7VK/lS0EXUk= Message-ID: <7c25c38a57a61f0603364e64956a8f54026c6e3f.camel@kernel.org> Subject: Re: [GIT PULL] Ceph fixes for 5.1-rc7 From: Jeff Layton To: Linus Torvalds , Al Viro Cc: Ilya Dryomov , ceph-devel@vger.kernel.org, Linux List Kernel Mailing Date: Thu, 25 Apr 2019 14:36:53 -0400 In-Reply-To: References: <20190425174739.27604-1-idryomov@gmail.com> <20190425182100.GU2217@ZenIV.linux.org.uk> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.5 (3.30.5-1.fc29) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2019-04-25 at 11:24 -0700, Linus Torvalds wrote: > On Thu, Apr 25, 2019 at 11:21 AM Al Viro wrote: > > I really wonder if 76a495d666e5 (ceph: ensure d_name stability in > > ceph_dentry_hash()) makes any sense; OK, you have ->d_lock held > > over that, but what does it protect against? Sure, you'll get > > something that was valid while you held ->d_lock, but what good > > does it do to the callers? If they really have to care about > > races with d_move(), which value do they want? > > I suspect they only care that the data they gather for the network > packet is coherent, and passes internal sanity tests. You get either > old or new, but at least you don't get "not NUL terminated because the > length didn't match the data". > > Linus Right. My main concern was preventing oopses while iterating over d_name. The main use for this hash is to help determine to which MDS we should direct the request. My understanding is that if we get it wrong, we'll end up retrying the request and pick a different MDS, so it's not fatal if we do race in this fashion. -- Jeff Layton