Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2786046ybx; Fri, 8 Nov 2019 09:17:24 -0800 (PST) X-Google-Smtp-Source: APXvYqwToKRXg3rIwL7m4H+bePb893FJHS40IgeajI30Q3/W9nv7Twpt64B8lMt4ff9uN9Z7YMD+ X-Received: by 2002:a50:ef17:: with SMTP id m23mr11369895eds.81.1573233443913; Fri, 08 Nov 2019 09:17:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573233443; cv=none; d=google.com; s=arc-20160816; b=MZT7b9fHAzyK2RivAHcaWVhefT8vusmsi8JuQkIYxr4m44zG9Ha8Z04+m9Oy0BXzzS n5w+zqZv3t6uCYxwoqzqgLCrBi7uL16zFnLvmw5/BT1nXtjsxT+pfL5C5OyouOE7vy6f F3t74Jm6XMFkDp/FU5B5HMCXyZ+iXPJiaIVT0KRpY4XykevAIHcoTCX8NetqDiVyE6Qu f0p5QrYmS9WA+me4yMzG3tgyhnp43oT2UZQY3dExMUSDSFgKEtRslWkcfo6eSZZ9aEih RCZ2lbWxqYTp2C34FhWRYLzVmdSLn4OB2L3TONVndnRIO2VRJtASVtlYWWFhzK6m+vQK bPww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=wqvkDG09fOQugvB4rM4W0AkNrUsMZ2Hpg6ZrFWciGHA=; b=P7xtY/R76AodgsPJaI1voc1Ye0OLp6W7zpKQ7Jp4JYg3SPGjxe/589aNynfTFRpP1R FFKtivI996bSamvMFUDU+EQMqHIa7QQ45x4ECN3r09eYljtt6SZddhKSwOCOteTkNFFp qwwTYWctDXTB7e46wFbaDTFJpiwHf++7RAi1WuR0NVWPhhSpGH51yh4MoAIN4diImn/x qc905/7qwDeL4DiIRK03SXfNFeuXaRo3J/K6kTjfiFmcUTwheZ+5xjo1ADXhrrSebHQq osJz3KdAzvKn33eh32SnuSg5qTHX2wNdH0/aUx1sh7kS60M9X3XDjyCoD+OGZEEUMc9x UcsA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y51si4723911edb.29.2019.11.08.09.17.00; Fri, 08 Nov 2019 09:17:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728206AbfKHRQT (ORCPT + 99 others); Fri, 8 Nov 2019 12:16:19 -0500 Received: from mx2.suse.de ([195.135.220.15]:54316 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726049AbfKHRQT (ORCPT ); Fri, 8 Nov 2019 12:16:19 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 45BB3AC75; Fri, 8 Nov 2019 17:16:17 +0000 (UTC) Date: Fri, 8 Nov 2019 17:16:16 +0000 From: Luis Henriques To: Sage Weil Cc: Ilya Dryomov , Jeff Layton , "Yan, Zheng" , Ceph Development , LKML Subject: Re: [RFC PATCH 0/2] ceph: safely use 'copy-from' Op on Octopus OSDs Message-ID: <20191108171616.GA2569@hermes.olymp> References: <20191108141555.31176-1-lhenriques@suse.com> <20191108164758.GA1760@hermes.olymp> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 08, 2019 at 04:57:27PM +0000, Sage Weil wrote: > On Fri, 8 Nov 2019, Luis Henriques wrote: > > On Fri, Nov 08, 2019 at 04:15:35PM +0100, Ilya Dryomov wrote: > > > If the OSD checked for unknown flags, like newer syscalls do, it would > > > be super easy, but it looks like it doesn't. > > > > > > An obvious solution is to look at require_osd_release in osdmap, but we > > > don't decode that in the kernel because it lives the OSD portion of the > > > osdmap. We could add that and consider the fact that the client now > > > needs to decode more than just the client portion a design mistake. > > > I'm not sure what can of worms does that open and if copy-from alone is > > > worth it though. Perhaps that field could be moved to (or a copy of it > > > be replicated in) the client portion of the osdmap starting with > > > octopus? We seem to be running into it on the client side more and > > > more... > > > > I can't say I'm thrilled with the idea of going back to hack into the > > OSDs code again, I was hoping to be able to handle this with the > > information we already have on the connection peer_features field. It > > took me *months* to have the OSD fix merged in so I'm not really > > convinced a change to the osdmap would make it into Octopus :-) > > > > (But I'll have a look at this and see if I can understand what moving or > > replicating the field in the osdmap would really entail.) > > Adding a copy of require_osd_release in the client portion of the map is > an easy thing to do (and probably where it should have gone in the first > place!). Let's do that! Yeah, after sending my reply to Ilya I took a quick look and it _seems_ to be as easy as adding a new encode(require_osd_release...) in the OSDMap. And handle the versions, of course. Let me spend some time playing with that and I'll try to come up with something during the next few days. Thanks for your feedback. Cheers, -- Lu?s