Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2774896ybx; Fri, 8 Nov 2019 09:09:02 -0800 (PST) X-Google-Smtp-Source: APXvYqy872udWweGIgmfi/mhReGVNhMKO7TZwktSlolAHBMiFsRoZw06l8fW/pVgHuNz0TW5sMzt X-Received: by 2002:a17:906:52d3:: with SMTP id w19mr9952822ejn.268.1573232942043; Fri, 08 Nov 2019 09:09:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573232942; cv=none; d=google.com; s=arc-20160816; b=G81bNcLbPf2ThCmgdO7JJVWRkw6KHVJ57i8pqmVXHxSzgZP9ktdhCKe+tXpqFwzt3x FG8aspWos0mLw9/fUB8u4mwbFhNdI16EcwjfVG8hSikbJfLDj0lfrikb65vcjyFEBNaW dGp5m/gdu9aR4Z5H7z4xYJGOSUZO3JWQxTsHbURjYRS+cITQexEiPcyqak7xrfXOT2by GtTA9YURr1uVWYlQBg2YRcOuPASEJscFW8k+va6hqJjNByvTMFIewKPwqGReik5pTOwM OP2cCU6HRT8iVz1crzY2Tb6ovpfl1zDCP023QrU55FSTmJtrfjjR5Xfd88Us7NH+OAaR WIvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=1CmM0bmKR+fcBQ/bo53QwcouKqqUdHDOfUyuHrGe1NQ=; b=UPGSM7rBBtXwXaykcme1xP15h5LHMCTw+p85suwyOhAFH7lexwei7zrvUhUlGwDu+R qEk6blZli7KddP8qVUcq8vzG/cXLxw+BP5AuFwz7r7YCwV8eYE1zDRACjQCY90Ppez3d NY6jGAQRULlrseIet7t0bPZKP7xLq82RD2sBElk2WenhXw9tvrbTt1SaL+n1ejd1gN8d eMemZHogawaDVsbW3DZCDtvF1qmgIl5EGJjR7tFVc/e7UtnNrFhYAc5GVjswDIG8nhmx nwP3OF+6MF87ZOcMjgrz5tn3e5bTdWEjEOgxbSLtbv/kWnPD8W48ggIa+OUT65Mlfpa6 RDlA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e22si5169245ede.163.2019.11.08.09.08.38; Fri, 08 Nov 2019 09:09:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729007AbfKHRGD (ORCPT + 99 others); Fri, 8 Nov 2019 12:06:03 -0500 Received: from tragedy.dreamhost.com ([66.33.205.236]:45243 "EHLO tragedy.dreamhost.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727927AbfKHRGD (ORCPT ); Fri, 8 Nov 2019 12:06:03 -0500 X-Greylist: delayed 511 seconds by postgrey-1.27 at vger.kernel.org; Fri, 08 Nov 2019 12:06:02 EST Received: from localhost (localhost [127.0.0.1]) by tragedy.dreamhost.com (Postfix) with ESMTPS id D5C5715F8AC; Fri, 8 Nov 2019 08:57:29 -0800 (PST) Date: Fri, 8 Nov 2019 16:57:27 +0000 (UTC) From: Sage Weil X-X-Sender: sage@piezo.novalocal To: Luis Henriques cc: Ilya Dryomov , Jeff Layton , "Yan, Zheng" , Ceph Development , LKML Subject: Re: [RFC PATCH 0/2] ceph: safely use 'copy-from' Op on Octopus OSDs In-Reply-To: <20191108164758.GA1760@hermes.olymp> Message-ID: References: <20191108141555.31176-1-lhenriques@suse.com> <20191108164758.GA1760@hermes.olymp> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-VR-STATUS: OK X-VR-SCORE: -100 X-VR-SPAMCAUSE: gggruggvucftvghtrhhoucdtuddrgedufedruddvuddgleejucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuggftfghnshhusghstghrihgsvgdpffftgfetoffjqffuvfenuceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmnecujfgurhepfffhvffujgfkfhgfgggtsehttdertddtredvnecuhfhrohhmpefurghgvgcuhggvihhluceoshgrghgvsehnvgifughrvggrmhdrnhgvtheqnecukfhppeduvdejrddtrddtrddunecurfgrrhgrmhepmhhouggvpehsmhhtphdphhgvlhhopehlohgtrghlhhhoshhtpdhinhgvthepuddvjedrtddrtddruddprhgvthhurhhnqdhprghthhepufgrghgvucghvghilhcuoehsrghgvgesnhgvfigurhgvrghmrdhnvghtqedpmhgrihhlfhhrohhmpehsrghgvgesnhgvfigurhgvrghmrdhnvghtpdhnrhgtphhtthhopehlihhnuhigqdhkvghrnhgvlhesvhhgvghrrdhkvghrnhgvlhdrohhrghenucevlhhushhtvghrufhiiigvpedt Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 8 Nov 2019, Luis Henriques wrote: > On Fri, Nov 08, 2019 at 04:15:35PM +0100, Ilya Dryomov wrote: > > If the OSD checked for unknown flags, like newer syscalls do, it would > > be super easy, but it looks like it doesn't. > > > > An obvious solution is to look at require_osd_release in osdmap, but we > > don't decode that in the kernel because it lives the OSD portion of the > > osdmap. We could add that and consider the fact that the client now > > needs to decode more than just the client portion a design mistake. > > I'm not sure what can of worms does that open and if copy-from alone is > > worth it though. Perhaps that field could be moved to (or a copy of it > > be replicated in) the client portion of the osdmap starting with > > octopus? We seem to be running into it on the client side more and > > more... > > I can't say I'm thrilled with the idea of going back to hack into the > OSDs code again, I was hoping to be able to handle this with the > information we already have on the connection peer_features field. It > took me *months* to have the OSD fix merged in so I'm not really > convinced a change to the osdmap would make it into Octopus :-) > > (But I'll have a look at this and see if I can understand what moving or > replicating the field in the osdmap would really entail.) Adding a copy of require_osd_release in the client portion of the map is an easy thing to do (and probably where it should have gone in the first place!). Let's do that! sage