Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp7101984ybi; Thu, 13 Jun 2019 09:34:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqyaDeZ8ytoMuRV4RZNUPLZEAExfv8oK+dLZ8AmU9ZipAtTSUmyDhxKAQ63lh4Np7trmHoBU X-Received: by 2002:a17:902:27e6:: with SMTP id i35mr88162020plg.190.1560443681853; Thu, 13 Jun 2019 09:34:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560443681; cv=none; d=google.com; s=arc-20160816; b=oRbyOYGMClBG7hs5XAPWjlN2Y7PoOqFIlBRndCkiG7TRbJkGvSrfr4whiqDH36nQj/ KEGFyw/VA9gbRLdgVfhBQFOctdr2pyqNI2Dj0BcbGqQuGmyOj/HAkWg7RqgDVZRssN2B LvhkP7K3pFxM4WNg072tLoW0OI0P7RNxemD1YVBjaOKi8TyrNN79uEHo76L0DYEze8S3 etcQDbEnMwJiq0wgS1f0B7F8YLkM8TpZwKaH76mj46QDOmHjOxtV3tAMJ+Cd70v1Ug6D shgVBX/EupQXjOMnqT9Uaor6KBC4mCiIoad0cnJyc88RMOlzoWWCtClZE9x/BHgTE30Y c+aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=oGvbP6qCBzG9TV7lWUqJlpKLXarG0nshnBnGIEIh+XQ=; b=0lDg95etLdA0MQutrmm8rCbavGfoA+iiDXoIqKqKCNUtxug21Gnz6hQjwNwNQM2NPl M51n54+CZDZ8dPtIAmKI2cItmwdN28YX0SUQZlBSr8dEBoZ3QDG0NULyXlD3U3syCCVs 2Rekiupn3EOnIJ7hpf3FaPeq6BWr0AqWx4J/kAVLJw+1eqlTrM4iSstL5gGWJERX8DbD Lg4DEddfICVmJj6lpTdz7GZ0MoMbUPK/Wbdr6UAWRJin2tSeTvKTvsQexDRp8tzjZsE5 9n3Eyf0akTglrlEwTz9uVS4nYvlEK5QQsN5BenZAkYOUGcEinkMU4ETYcnf0HL4eAnSa I+2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bc7si27596plb.108.2019.06.13.09.34.27; Thu, 13 Jun 2019 09:34:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726660AbfFMQeN (ORCPT + 99 others); Thu, 13 Jun 2019 12:34:13 -0400 Received: from mx2.suse.de ([195.135.220.15]:40610 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730782AbfFMHxk (ORCPT ); Thu, 13 Jun 2019 03:53:40 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B6CC4AD1E; Thu, 13 Jun 2019 07:53:37 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 4A7821E4328; Thu, 13 Jun 2019 09:53:33 +0200 (CEST) Date: Thu, 13 Jun 2019 09:53:33 +0200 From: Jan Kara To: Ira Weiny Cc: Jason Gunthorpe , Jan Kara , Dan Williams , Theodore Ts'o , Jeff Layton , Dave Chinner , Matthew Wilcox , linux-xfs@vger.kernel.org, Andrew Morton , John Hubbard , =?iso-8859-1?B?Suly9G1l?= Glisse , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, linux-ext4@vger.kernel.org, linux-mm@kvack.org Subject: Re: [PATCH RFC 00/10] RDMA/FS DAX truncate proposal Message-ID: <20190613075333.GC26505@quack2.suse.cz> References: <20190606195114.GA30714@ziepe.ca> <20190606222228.GB11698@iweiny-DESK2.sc.intel.com> <20190607103636.GA12765@quack2.suse.cz> <20190607121729.GA14802@ziepe.ca> <20190607145213.GB14559@iweiny-DESK2.sc.intel.com> <20190612102917.GB14578@quack2.suse.cz> <20190612114721.GB3876@ziepe.ca> <20190612120907.GC14578@quack2.suse.cz> <20190612191421.GM3876@ziepe.ca> <20190612221336.GA27080@iweiny-DESK2.sc.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190612221336.GA27080@iweiny-DESK2.sc.intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Wed 12-06-19 15:13:36, Ira Weiny wrote: > On Wed, Jun 12, 2019 at 04:14:21PM -0300, Jason Gunthorpe wrote: > > On Wed, Jun 12, 2019 at 02:09:07PM +0200, Jan Kara wrote: > > > On Wed 12-06-19 08:47:21, Jason Gunthorpe wrote: > > > > On Wed, Jun 12, 2019 at 12:29:17PM +0200, Jan Kara wrote: > > > > > > > > > > > The main objection to the current ODP & DAX solution is that very > > > > > > > little HW can actually implement it, having the alternative still > > > > > > > require HW support doesn't seem like progress. > > > > > > > > > > > > > > I think we will eventually start seein some HW be able to do this > > > > > > > invalidation, but it won't be universal, and I'd rather leave it > > > > > > > optional, for recovery from truely catastrophic errors (ie my DAX is > > > > > > > on fire, I need to unplug it). > > > > > > > > > > > > Agreed. I think software wise there is not much some of the devices can do > > > > > > with such an "invalidate". > > > > > > > > > > So out of curiosity: What does RDMA driver do when userspace just closes > > > > > the file pointing to RDMA object? It has to handle that somehow by aborting > > > > > everything that's going on... And I wanted similar behavior here. > > > > > > > > It aborts *everything* connected to that file descriptor. Destroying > > > > everything avoids creating inconsistencies that destroying a subset > > > > would create. > > > > > > > > What has been talked about for lease break is not destroying anything > > > > but very selectively saying that one memory region linked to the GUP > > > > is no longer functional. > > > > > > OK, so what I had in mind was that if RDMA app doesn't play by the rules > > > and closes the file with existing pins (and thus layout lease) we would > > > force it to abort everything. Yes, it is disruptive but then the app didn't > > > obey the rule that it has to maintain file lease while holding pins. Thus > > > such situation should never happen unless the app is malicious / buggy. > > > > We do have the infrastructure to completely revoke the entire > > *content* of a FD (this is called device disassociate). It is > > basically close without the app doing close. But again it only works > > with some drivers. However, this is more likely something a driver > > could support without a HW change though. > > > > It is quite destructive as it forcibly kills everything RDMA related > > the process(es) are doing, but it is less violent than SIGKILL, and > > there is perhaps a way for the app to recover from this, if it is > > coded for it. > > I don't think many are... I think most would effectively be "killed" if this > happened to them. Yes, I repeat we are in a situation when the application has a bug and didn't propely manage its long term pins which are fully under its control. So in my mind a situation similar to application using memory it has already freed. The kernel has to manage that but we don't really care what's left from the application when this happens. That being said I'm not insisting this has to happen - tracking associated "RDMA file" with a layout lease and somehow invalidating it on close of a leased file is somewhat ugly anyway. But it is still an option if exposing pins to userspace for lsof to consume proves even worse... Honza -- Jan Kara SUSE Labs, CR