Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp393481iob; Fri, 13 May 2022 04:10:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/+7pBjGEvWbdxgMrMCO8KjiArcRzmRt7rTt2+tEXDfPmHPNzOvPhTNxDRkEh61zv2PDST X-Received: by 2002:a17:907:900a:b0:6f3:8e8f:4236 with SMTP id ay10-20020a170907900a00b006f38e8f4236mr3726412ejc.390.1652440230678; Fri, 13 May 2022 04:10:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652440230; cv=none; d=google.com; s=arc-20160816; b=KUBBbNhOedhPKtSqkgVJFGVUgjmX1xWOj8un1Kn1/mGAlF+uruYg8yI9uifNgP3Z9k CQryqrlRQt26r2AUGQjB7+uedKXT1f8MD07DXcZGaahydnHWcqsfh4+BELgNmAi4HDEs pTtPb3sXzb6AUukxmF7wgdOwvJBA1YrTylR70I4Zkv5A6jpGyUvpCPDW2BRTJbSlQOC+ PwhmETG3+UbucIU+WrllA2XpZMjimsB0ndNkCcKIzmMIwp7zvrPELtNLpDLxFtqJCvov knv2vJ2nukCAjn1leWxp0FAJQAxZwcoejOqNIvuFwIWMd2f+8Ab5RY1x2x6zrAETTt5i /y2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=P0ZMRf6XVZewaOqT448gyZFnbajFDAGG3sPBbY/imMo=; b=aeUB+5lVglHhOgdmT9RHSnv7tGOb/tACKGdiFT3s3RVbMJWIcI04bChLqLFW1eT1+O DfCBxcnNGa+3xJwBwyevbyt0xEnyGdL2f33DZQ4jcXx0duEXz2WQ0QUbXyDbHhDoGBDK JlsdKCkSaw4odf3kcPkqZj67Lbbv0AiH50zIOLDcuRqk4slqeXT/c44pV4dBKlvgtfo8 E4V6k81oCrC0kFqfN9+zhvj2Ukv/kgfkGmldX7KjVWvc1mKsW9VzKkyhUePx3V/iXSgU GIsoLt5sP66PMHwoWXCwsu7A8YFaL/8nrKSCknADCq/w7cIjGN1LsFhwzz7Dnarlh3dK L6Rg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qSot7MYj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p6-20020a50cd86000000b00427c0b1dd52si1729023edi.444.2022.05.13.04.10.02; Fri, 13 May 2022 04:10:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qSot7MYj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245731AbiEKPUE (ORCPT + 99 others); Wed, 11 May 2022 11:20:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56304 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245736AbiEKPUA (ORCPT ); Wed, 11 May 2022 11:20:00 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BB20A218FCD; Wed, 11 May 2022 08:19:57 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 39A9B618C8; Wed, 11 May 2022 15:19:57 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 831A7C34116; Wed, 11 May 2022 15:19:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1652282396; bh=joIzrZGOxLsqbcRc0VMzZQ0L7R/xhNhcMB/bFdMJecY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=qSot7MYj00eHckTgvQJT1nELlQjLTCT2Ti43H6u9Ym09lTZRWZ0lhyDvHku9kMw4O /Ytp53/sJZmPYBee9BEaD4BEN2RixhSpGVgY7LkiG8E4fOFitcGy/5QDTpQX7rg2+G JwhKHLV2GfEUYimBu6TtBQgK8CSLEzSXBnHkD6KuaaNiiYn9vrHDG/flbDwve77fdR SyT16NuYUSHEmamagyHKZGDrVuhivSRV+/SB3X4+5fF6etuBMvGH9z/Q31mxJTnthu VZxX37BdCldSE2iFSBX4FiGPQbkO3YZgK8hPgTykZE6XpS5W9LYqeOyBhlZL3qdYTj XGb74FjcKl/aw== Date: Wed, 11 May 2022 08:19:55 -0700 From: "Darrick J. Wong" To: Andrew Morton Cc: Dan Williams , Dave Chinner , Shiyang Ruan , Linux Kernel Mailing List , linux-xfs , Linux NVDIMM , Linux MM , linux-fsdevel , Christoph Hellwig , Jane Chu , Goldwyn Rodrigues , Al Viro , Matthew Wilcox , Naoya Horiguchi , linmiaohe@huawei.com Subject: Re: [PATCHSETS] v14 fsdax-rmap + v11 fsdax-reflink Message-ID: <20220511151955.GC27212@magnolia> References: <20220508143620.1775214-1-ruansy.fnst@fujitsu.com> <20220511000352.GY27195@magnolia> <20220511014818.GE1098723@dread.disaster.area> <20220510192853.410ea7587f04694038cd01de@linux-foundation.org> <20220511024301.GD27195@magnolia> <20220510222428.0cc8a50bd007474c97b050b2@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220510222428.0cc8a50bd007474c97b050b2@linux-foundation.org> X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Oan Tue, May 10, 2022 at 10:24:28PM -0700, Andrew Morton wrote: > On Tue, 10 May 2022 19:43:01 -0700 "Darrick J. Wong" wrote: > > > On Tue, May 10, 2022 at 07:28:53PM -0700, Andrew Morton wrote: > > > On Tue, 10 May 2022 18:55:50 -0700 Dan Williams wrote: > > > > > > > > It'll need to be a stable branch somewhere, but I don't think it > > > > > really matters where al long as it's merged into the xfs for-next > > > > > tree so it gets filesystem test coverage... > > > > > > > > So how about let the notify_failure() bits go through -mm this cycle, > > > > if Andrew will have it, and then the reflnk work has a clean v5.19-rc1 > > > > baseline to build from? > > > > > > What are we referring to here? I think a minimal thing would be the > > > memremap.h and memory-failure.c changes from > > > https://lkml.kernel.org/r/20220508143620.1775214-4-ruansy.fnst@fujitsu.com ? > > > > > > Sure, I can scoot that into 5.19-rc1 if you think that's best. It > > > would probably be straining things to slip it into 5.19. > > > > > > The use of EOPNOTSUPP is a bit suspect, btw. It *sounds* like the > > > right thing, but it's a networking errno. I suppose livable with if it > > > never escapes the kernel, but if it can get back to userspace then a > > > user would be justified in wondering how the heck a filesystem > > > operation generated a networking errno? > > > > most filesystems return EOPNOTSUPP rather enthusiastically when > > they don't know how to do something... > > Can it propagate back to userspace? AFAICT, the new code falls back to the current (mf_generic_kill_procs) failure code if the filesystem doesn't provide a ->memory_failure function or if it returns -EOPNOSUPP. mf_generic_kill_procs can also return -EOPNOTSUPP, but all the memory_failure() callers (madvise, etc.) convert that to 0 before returning it to userspace. I suppose the weirder question is going to be what happens when madvise starts returning filesystem errors like EIO or EFSCORRUPTED when pmem loses half its brains and even the fs can't deal with it. --D