Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp7126359ybi; Thu, 13 Jun 2019 10:01:53 -0700 (PDT) X-Google-Smtp-Source: APXvYqz0fzGmRqCA4ARVauI2PTGz1uBeO0AN5a9CbmFKVj+0f1G/0IsHFtsKZHNzM0DGvMCl7SWc X-Received: by 2002:a17:902:d695:: with SMTP id v21mr72439839ply.342.1560445313183; Thu, 13 Jun 2019 10:01:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560445313; cv=none; d=google.com; s=arc-20160816; b=CbTSt5bonk9xFyZuip+AUUAhjefI7+bInDkbcvxyQwUw+VnhKRgu4fcQobKqbJVaFm fjyVbeGHcdo/2Da6DJ4W8nPmCGd8pdV0l3lGHYwAokoOGT2lKLtXkaVazt1jsbcG8Lgm GqFsCy7KM7RuYOiXiMje8tVuwoxN9pIxlwXLYpQz8F665XQ0rrmLrLZpzvBfHvP2hl4a kBtpKhpRPp4Cx2RiHsrwBQzM/JTJhnlNzQ+ER4IXdvMRVD5hEfKeJcU+Tl5tVRKbEPie yDaabVJayZJ5qVu2Dl/uD6Js56qxa2aETnxc9G3hjlcmlnv5spMz+L/9x0rc1JlTCwPn 8p2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=0x3EZ2qz400B7bsnKl9xr8zap7UvajgnitBR8/hs1jc=; b=gHCuX+nxub4g1dDkxvVNYa+AASLeBvpTerelOhfwKajvq8LbrR40VD4Jm1mCzeXkoL 385tLSgU9utExsqKTt2+Cm1VYO7/3c9lTKl5aPhGiqcC82fg9FoeHmJJoRaq/zUKFCkO WDcJg0Uqv05GzhKfubTikyAN+xfWUlUqvpqIvJPZokMxN9q0cz0c6z83LJIsNwabkTF+ pd9zY5Mbd0vIZl1HZwQ7wWp4HqzurHSUSqFDQKEfLui3W9PLHsWPWV9mbwzPSust8s9N FsCWLdbNG47coYOLV/NOSAvr8lzr00HeJ+cPQSw1RhMJB3D0wA9uQcdfO20IQBD2P7zh Yc2A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x14si205644pgk.416.2019.06.13.10.01.38; Thu, 13 Jun 2019 10:01:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729570AbfFMRBh (ORCPT + 99 others); Thu, 13 Jun 2019 13:01:37 -0400 Received: from mga01.intel.com ([192.55.52.88]:46452 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729566AbfFLXcF (ORCPT ); Wed, 12 Jun 2019 19:32:05 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 12 Jun 2019 16:32:05 -0700 X-ExtLoop1: 1 Received: from iweiny-desk2.sc.intel.com ([10.3.52.157]) by fmsmga004.fm.intel.com with ESMTP; 12 Jun 2019 16:32:04 -0700 Date: Wed, 12 Jun 2019 16:33:25 -0700 From: Ira Weiny To: Dan Williams Cc: Jason Gunthorpe , Jan Kara , Theodore Ts'o , Jeff Layton , Dave Chinner , Matthew Wilcox , linux-xfs , Andrew Morton , John Hubbard , =?iso-8859-1?B?Suly9G1l?= Glisse , linux-fsdevel , Linux Kernel Mailing List , linux-nvdimm , linux-ext4 , Linux MM Subject: Re: [PATCH RFC 00/10] RDMA/FS DAX truncate proposal Message-ID: <20190612233324.GE14336@iweiny-DESK2.sc.intel.com> References: <20190606222228.GB11698@iweiny-DESK2.sc.intel.com> <20190607103636.GA12765@quack2.suse.cz> <20190607121729.GA14802@ziepe.ca> <20190607145213.GB14559@iweiny-DESK2.sc.intel.com> <20190612102917.GB14578@quack2.suse.cz> <20190612114721.GB3876@ziepe.ca> <20190612120907.GC14578@quack2.suse.cz> <20190612191421.GM3876@ziepe.ca> <20190612221336.GA27080@iweiny-DESK2.sc.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.1 (2018-12-01) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Wed, Jun 12, 2019 at 03:54:19PM -0700, Dan Williams wrote: > On Wed, Jun 12, 2019 at 3:12 PM Ira Weiny wrote: > > > > On Wed, Jun 12, 2019 at 04:14:21PM -0300, Jason Gunthorpe wrote: > > > On Wed, Jun 12, 2019 at 02:09:07PM +0200, Jan Kara wrote: > > > > On Wed 12-06-19 08:47:21, Jason Gunthorpe wrote: > > > > > On Wed, Jun 12, 2019 at 12:29:17PM +0200, Jan Kara wrote: > > > > > > > > > > > > > The main objection to the current ODP & DAX solution is that very > > > > > > > > little HW can actually implement it, having the alternative still > > > > > > > > require HW support doesn't seem like progress. > > > > > > > > > > > > > > > > I think we will eventually start seein some HW be able to do this > > > > > > > > invalidation, but it won't be universal, and I'd rather leave it > > > > > > > > optional, for recovery from truely catastrophic errors (ie my DAX is > > > > > > > > on fire, I need to unplug it). > > > > > > > > > > > > > > Agreed. I think software wise there is not much some of the devices can do > > > > > > > with such an "invalidate". > > > > > > > > > > > > So out of curiosity: What does RDMA driver do when userspace just closes > > > > > > the file pointing to RDMA object? It has to handle that somehow by aborting > > > > > > everything that's going on... And I wanted similar behavior here. > > > > > > > > > > It aborts *everything* connected to that file descriptor. Destroying > > > > > everything avoids creating inconsistencies that destroying a subset > > > > > would create. > > > > > > > > > > What has been talked about for lease break is not destroying anything > > > > > but very selectively saying that one memory region linked to the GUP > > > > > is no longer functional. > > > > > > > > OK, so what I had in mind was that if RDMA app doesn't play by the rules > > > > and closes the file with existing pins (and thus layout lease) we would > > > > force it to abort everything. Yes, it is disruptive but then the app didn't > > > > obey the rule that it has to maintain file lease while holding pins. Thus > > > > such situation should never happen unless the app is malicious / buggy. > > > > > > We do have the infrastructure to completely revoke the entire > > > *content* of a FD (this is called device disassociate). It is > > > basically close without the app doing close. But again it only works > > > with some drivers. However, this is more likely something a driver > > > could support without a HW change though. > > > > > > It is quite destructive as it forcibly kills everything RDMA related > > > the process(es) are doing, but it is less violent than SIGKILL, and > > > there is perhaps a way for the app to recover from this, if it is > > > coded for it. > > > > I don't think many are... I think most would effectively be "killed" if this > > happened to them. > > > > > > > > My preference would be to avoid this scenario, but if it is really > > > necessary, we could probably build it with some work. > > > > > > The only case we use it today is forced HW hot unplug, so it is rarely > > > used and only for an 'emergency' like use case. > > > > I'd really like to avoid this as well. I think it will be very confusing for > > RDMA apps to have their context suddenly be invalid. I think if we have a way > > for admins to ID who is pinning a file the admin can take more appropriate > > action on those processes. Up to and including killing the process. > > Can RDMA context invalidation, "device disassociate", be inflicted on > a process from the outside? Identifying the pid of a pin holder only > leaves SIGKILL of the entire process as the remediation for revoking a > pin, and I assume admins would use the finer grained invalidation > where it was available. No not in the way you are describing it. As Jason said you can hotplug the device which is "from the outside" but this would affect all users of that device. Effectively, we would need a way for an admin to close a specific file descriptor (or set of fds) which point to that file. AFAIK there is no way to do that at all, is there? Ira