Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp415184ybi; Thu, 13 Jun 2019 19:10:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqzntyf29kjaPYmvD9kFM7IzQg4d96LN3WKWx+oC5XJE2Ig+WkPHaoiqqhqmmCu7jZ9Vj6XR X-Received: by 2002:a62:78c2:: with SMTP id t185mr26838248pfc.142.1560478247506; Thu, 13 Jun 2019 19:10:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560478247; cv=none; d=google.com; s=arc-20160816; b=z74zrANK1BGiQ9FuLNWyRe9YPZLKY8xDBu3qgtIKvo3H8+UgL0ah9a2w6i6/wWhiDB LCj0stLUiMgJy8W+2xqR2TMgO9NvQaY5wuDhnQzg2Q7Htv9IjxMW1D2FYAJ+C9bxOYGC mpg0ctNvBJ/kPDbM+mUMTicwKF54RL/PB5b1Zv3kuW9k8P+YqTVRcrpWHvw987F8Z9cg piUd5V+y5xT6I7opxlWQjE99zyBoDO6/wlf+wl2PGfco6Dn8fFDE4nlnYyBbMaPy8MKr BDE2xMubNUzpVxcDVtJsyCBqmqlF8SIEkQuVfNsGL3ZzK2GOLbN3dh0xkBXiG46Nymng kTuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=0tXLkaCzSLVqIRJBBy/+3qJ537JyS734Ml26tc3myCY=; b=mBW0ycy1/PDSfzNtMK+3dAYQ0CGvzNf9MZAnpb7+X0za8/c9dbCl3pN5ChKIt9RSDx d6WfXyzXg17N0G1dZs+WKzKWh4STa6KmvmUXlkooPQ777LIQwblQN5uhSh+iWPCFCJYt 8DQ0ylBPw9vAUucfBtJgfh6ungiRJIcAtBCe+7pMVuM/L132jfY/03pQdC9MFg+Qov/4 FznLUM8FBOXeY3CkH/4uFCAa7zLhSt1uFha7//MNeBefzGd9jLfnELPQ81XRS++t4gOg bm2zpqcbKgFk0ntHmlh496ttOHAeR0FZKxhkk5fE5AvpnyjIEJ73oUbGUq8SXaW/USp5 AsLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x3si1153882pgk.413.2019.06.13.19.10.31; Thu, 13 Jun 2019 19:10:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726873AbfFNCK0 (ORCPT + 99 others); Thu, 13 Jun 2019 22:10:26 -0400 Received: from mail106.syd.optusnet.com.au ([211.29.132.42]:47003 "EHLO mail106.syd.optusnet.com.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726167AbfFNCKZ (ORCPT ); Thu, 13 Jun 2019 22:10:25 -0400 Received: from dread.disaster.area (pa49-195-189-25.pa.nsw.optusnet.com.au [49.195.189.25]) by mail106.syd.optusnet.com.au (Postfix) with ESMTPS id 6E77A3DCE8B; Fri, 14 Jun 2019 12:10:19 +1000 (AEST) Received: from dave by dread.disaster.area with local (Exim 4.92) (envelope-from ) id 1hbbeb-0005G5-AA; Fri, 14 Jun 2019 12:09:21 +1000 Date: Fri, 14 Jun 2019 12:09:21 +1000 From: Dave Chinner To: Jason Gunthorpe Cc: Ira Weiny , Matthew Wilcox , Jan Kara , Dan Williams , Theodore Ts'o , Jeff Layton , linux-xfs@vger.kernel.org, Andrew Morton , John Hubbard , =?iso-8859-1?B?Suly9G1l?= Glisse , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, linux-ext4@vger.kernel.org, linux-mm@kvack.org, linux-rdma@vger.kernel.org Subject: Re: [PATCH RFC 00/10] RDMA/FS DAX truncate proposal Message-ID: <20190614020921.GM14363@dread.disaster.area> References: <20190606104203.GF7433@quack2.suse.cz> <20190606220329.GA11698@iweiny-DESK2.sc.intel.com> <20190607110426.GB12765@quack2.suse.cz> <20190607182534.GC14559@iweiny-DESK2.sc.intel.com> <20190608001036.GF14308@dread.disaster.area> <20190612123751.GD32656@bombadil.infradead.org> <20190613002555.GH14363@dread.disaster.area> <20190613152755.GI32656@bombadil.infradead.org> <20190613211321.GC32404@iweiny-DESK2.sc.intel.com> <20190613234530.GK22901@ziepe.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190613234530.GK22901@ziepe.ca> User-Agent: Mutt/1.10.1 (2018-07-13) X-Optus-CM-Score: 0 X-Optus-CM-Analysis: v=2.2 cv=D+Q3ErZj c=1 sm=1 tr=0 cx=a_idp_d a=K5LJ/TdJMXINHCwnwvH1bQ==:117 a=K5LJ/TdJMXINHCwnwvH1bQ==:17 a=jpOVt7BSZ2e4Z31A5e1TngXxSK0=:19 a=kj9zAlcOel0A:10 a=dq6fvYVFJ5YA:10 a=7-415B0cAAAA:8 a=MIoJepgKeDxvTzH8FPQA:9 a=CjuIK1q_8ugA:10 a=biEYGPWJfzWAr4FL6Ov7:22 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 13, 2019 at 08:45:30PM -0300, Jason Gunthorpe wrote: > On Thu, Jun 13, 2019 at 02:13:21PM -0700, Ira Weiny wrote: > > On Thu, Jun 13, 2019 at 08:27:55AM -0700, Matthew Wilcox wrote: > > > On Thu, Jun 13, 2019 at 10:25:55AM +1000, Dave Chinner wrote: > > > > e.g. Process A has an exclusive layout lease on file F. It does an > > > > IO to file F. The filesystem IO path checks that Process A owns the > > > > lease on the file and so skips straight through layout breaking > > > > because it owns the lease and is allowed to modify the layout. It > > > > then takes the inode metadata locks to allocate new space and write > > > > new data. > > > > > > > > Process B now tries to write to file F. The FS checks whether > > > > Process B owns a layout lease on file F. It doesn't, so then it > > > > tries to break the layout lease so the IO can proceed. The layout > > > > breaking code sees that process A has an exclusive layout lease > > > > granted, and so returns -ETXTBSY to process B - it is not allowed to > > > > break the lease and so the IO fails with -ETXTBSY. > > > > > > This description doesn't match the behaviour that RDMA wants either. > > > Even if Process A has a lease on the file, an IO from Process A which > > > results in blocks being freed from the file is going to result in the > > > RDMA device being able to write to blocks which are now freed (and > > > potentially reallocated to another file). > > > > I don't understand why this would not work for RDMA? As long as the layout > > does not change the page pins can remain in place. > > Because process A had a layout lease (and presumably a MR) and the > layout was still modified in way that invalidates the RDMA MR. The lease holder is allowed to modify the mapping it has a lease over. That's necessary so lease holders can write data into unallocated space in the file. The lease is there to prevent third parties from modifying the layout without the lease holder being informed and taking appropriate action to allow that 3rd party modification to occur. If the lease holder modifies the mapping in a way that causes it's own internal state to screw up, then that's a bug in the lease holder application. Cheers, Dave. -- Dave Chinner david@fromorbit.com