Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1105931rwb; Tue, 29 Nov 2022 09:04:01 -0800 (PST) X-Google-Smtp-Source: AA0mqf4VLnLL66gVcXVKJdkf59uPjuT+tdb6zVc1Lwa3wwev930K5HLFeb5TIeBGBkMuaVcarTbR X-Received: by 2002:a05:6402:114f:b0:462:1e07:1dd7 with SMTP id g15-20020a056402114f00b004621e071dd7mr53408387edw.293.1669741441478; Tue, 29 Nov 2022 09:04:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669741441; cv=none; d=google.com; s=arc-20160816; b=w3JxdRH1EaZA/Zj5kIjlN5Bd91G+TJVngooz+BdxCBnd0uqkOR5yOqbZ6qGFAIaRqH 7yDSqvalJy+f1bxRMrVIQ4hftvf8nrR02nrBGop8M65ubJ4WXVvN/7YUeyA7UNWFJK6f ZYDoGfDUIZ7ozijYlGzZVlSPIqU8Gu+A+tPFe2oeQNIu7niUVsRRHGJh65BA80r5cNT9 x3HHATrNl0clt4RO9t0oKvejITjlfkygAZkLThumHJ395kk8kCR5BGjIkr+NAY/absrB tScBSfczaxmC0IAQm8W+qJEX0EiMhASlQHM9HXJuEKhKrC7FS7LgDuj5pNynxOYhA+2+ SI0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=e0muEHBDbnLFxSz/8uKrynkgUxzkHQQXyf0Q/GGNCDo=; b=FkDIpFUHSqrYXdPvOQI6V/u8aCTOeDN5VHwD89KXI1qBvRdwaDwe8oS2ZT0Nw/ZNMs jYjcSbmjp6ArKkhKOTOvfcu98gAKV+cAoIl+TrAp4l77uU8mvBnbLudhnCF06LFjPOrT bj+WRhCVcPF7MN1sy4Qa+OouM9lAejAJRi56oXWh2QjPKedEKsiUpL6jvDo1p38r9dU9 Ap3emOG7DWavUt6Ku/9XHS8j6tNRzxylLlDmTDyo1v4xXrnTeuqxBJStjYmZEETy1yI7 1Y3FEFTrwMvRIrguc7o9EJIMS38ttNOIESsbPTtLPT9sLYEnCd906o4I/vhvgHkdUXst OkWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="PdLSH/C+"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t1-20020a056402240100b0046aff50132asi6707195eda.316.2022.11.29.09.03.24; Tue, 29 Nov 2022 09:04:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="PdLSH/C+"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236407AbiK2QzC (ORCPT + 99 others); Tue, 29 Nov 2022 11:55:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52180 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236326AbiK2Qy3 (ORCPT ); Tue, 29 Nov 2022 11:54:29 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D9CFD748D2 for ; Tue, 29 Nov 2022 08:49:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1669740480; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=e0muEHBDbnLFxSz/8uKrynkgUxzkHQQXyf0Q/GGNCDo=; b=PdLSH/C+BpPDtfUIHgqkj0E8cNeZUwoj1CT9+VFwTiIUuq9gkjqBiiyM8Um6/6YuI5NYXQ 5QB6kauLYXBNvach6wXw4Yx3LbZXkaMwGLYjxXZzZ3J2sQNUd0oMFk/iUy6BZ0q4umuQmg 9D29gaYVRhQV6GdiBr9eMuG+pGw/JnI= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-97-NLEV3qqHMjm2VIHjZofz1g-1; Tue, 29 Nov 2022 11:47:58 -0500 X-MC-Unique: NLEV3qqHMjm2VIHjZofz1g-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id EA346101E155; Tue, 29 Nov 2022 16:47:53 +0000 (UTC) Received: from [10.22.16.202] (unknown [10.22.16.202]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 417A52166B2D; Tue, 29 Nov 2022 16:47:51 +0000 (UTC) From: Benjamin Coddington To: Christoph Hellwig Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Philipp Reisner , Lars Ellenberg , =?utf-8?q?Christoph_B=C3=B6hmwalder?= , Jens Axboe , Josef Bacik , Keith Busch , Sagi Grimberg , Lee Duncan , Chris Leech , Mike Christie , "James E.J. Bottomley" , "Martin K. Petersen" , Valentina Manea , Shuah Khan , Greg Kroah-Hartman , David Howells , Marc Dionne , Steve French , Christine Caulfield , David Teigland , Mark Fasheh , Joel Becker , Joseph Qi , Eric Van Hensbergen , Latchesar Ionkov , Dominique Martinet , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Ilya Dryomov , Xiubo Li , Trond Myklebust , Anna Schumaker , Chuck Lever , Jeff Layton , drbd-dev@lists.linbit.com, linux-block@vger.kernel.org, nbd@other.debian.org, linux-nvme@lists.infradead.org, open-iscsi@googlegroups.com, linux-scsi@vger.kernel.org, linux-usb@vger.kernel.org, linux-afs@lists.infradead.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org, cluster-devel@redhat.com, ocfs2-devel@oss.oracle.com, v9fs-developer@lists.sourceforge.net, ceph-devel@vger.kernel.org, linux-nfs@vger.kernel.org Subject: Re: [PATCH v1 2/3] Treewide: Stop corrupting socket's task_frag Date: Tue, 29 Nov 2022 11:47:47 -0500 Message-ID: <794DBAB0-EDAF-4DA2-A837-C1F99916BC8E@redhat.com> In-Reply-To: <20221129140242.GA15747@lst.de> References: <20221129140242.GA15747@lst.de> MIME-Version: 1.0 Content-Type: text/plain X-Scanned-By: MIMEDefang 3.1 on 10.11.54.6 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On 29 Nov 2022, at 9:02, Christoph Hellwig wrote: > Hmm. Having to set a flag to not accidentally corrupt per-task > state seems a bit fragile. Wouldn't it make sense to find a way to opt > into the feature only for sockets created from the syscall layer? It's totally fragile, and that's why it's currently broken in production. The fragile ship sailed when networking decided to depend on users setting the socket's GFP_ flags correctly to avoid corruption. Meantime, this problem needs fixing in a way that makes everyone happy. This fix doesn't make it less fragile, but it may (hopefully) address the previous criticisms enough that something gets done to fix it. Ben