Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1345845ybl; Tue, 13 Aug 2019 11:01:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqy6HRbxZ1Hcy2fNXxLidddOTUv3d+NK9aQpKfAEw20GEDPPUXqG3Bn5s/dv2cQwnxJYy30h X-Received: by 2002:a17:90a:8688:: with SMTP id p8mr3406626pjn.57.1565719294798; Tue, 13 Aug 2019 11:01:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565719294; cv=none; d=google.com; s=arc-20160816; b=dd5J870mXYm9qvyBYmDFTo5OGaCUJAWCRICD7W9Kaa0msa+nSwuOxOU0s12cg+lzr9 xOBbLyvtmSWzMDtf2AD9t+QPSkc8AF2+dT9LIpWpKvKn9R4rR6FA6f+w/JlTtRquRpUd baKyaE0S4+l3zscTLknUS/P6RCBLFBGBt5ufSWL43cDJKFllazPDV63dMy4gsHM9A1Yy zTRoSxfRQFNLuR2GBf8qTHtr4tSbrc9DXgTOpk2HVH4bgKpQ2wfQLGFdDRnniC/1EstF Jz1tI2vQGkmG3xXmysK7hVTvPDcA1Rp0fESlvNBatg1JG0r2Ip1rBlNQ5YQktctZ4oeu 8vqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=IBxnXq2Ic/FEKXbpZLemvQFxGE32/we3wuo4f4S9MyU=; b=azpuOLEdcbqr+d9tP7MgHCG/p4mve93BO1NcvWpQLJGRgfy26N1bGmmCNLQd3ugugE u0Ey+m7P4Tw9Hy8U2rMV0cy3F0jcRqybO938oAGgm9Rwq9OzLDXqZ7/437ei1/3n794O nvMc/slIjLfG+jg5mJOkZeatISKGJDNPN7uDD6iWLqgH0x2TsrTGBv7Nd1OngAvWGn7X 9LlcE9jnc5ir2ONZyOGlDOxp5E+NG3d1/XyLEnLEk86Xo/XR27ZQ/wO61RSvakoAnOHk WtsGEbDq0YZ8/vq76c35j6U/LHaA/LXj5mo0NMtyFLSX5YWc/aVQ9nTH04EPYrRpcXhq Ak4w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ziepe.ca header.s=google header.b=JkdPDFhK; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b18si6027819pls.125.2019.08.13.11.01.20; Tue, 13 Aug 2019 11:01:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ziepe.ca header.s=google header.b=JkdPDFhK; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728261AbfHMSAY (ORCPT + 99 others); Tue, 13 Aug 2019 14:00:24 -0400 Received: from mail-qt1-f196.google.com ([209.85.160.196]:41683 "EHLO mail-qt1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728255AbfHMSAY (ORCPT ); Tue, 13 Aug 2019 14:00:24 -0400 Received: by mail-qt1-f196.google.com with SMTP id d17so28295314qtj.8 for ; Tue, 13 Aug 2019 11:00:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ziepe.ca; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=IBxnXq2Ic/FEKXbpZLemvQFxGE32/we3wuo4f4S9MyU=; b=JkdPDFhKWlCBD9Qi7RNp1yC1abkdUc7/1dY6LV39VmLNemSn9Powu35LNiuyO8uczt Nadnkpe9izQcaWOyGGeQHJ23tWPRR6bGmsg+cyaAilqF+z1rDRrm+slvgHjrpOBu79SN 04/Y6/+5Ps6m17X0m+HDUinYIh8C32SkpSSPGyvi4DXoJS3WXfpvU9blzoRZ5bcDgJEL IDg+rbA5MUkHi8mQ00jNvvGVGA9O50CHREVVTEuNyId2Vgr0BUJk+6udZ7yoDqN0JsU4 gZy0AfBcuVAFDG6OCN/ZVHt5uncO6CdDnK24oMMrw6a/bv0Qfkyj1OjJY0s/rkuU/UyI PpFg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=IBxnXq2Ic/FEKXbpZLemvQFxGE32/we3wuo4f4S9MyU=; b=n1NQwhU7t3/apXdQ7fPdmnByAtOW2EUlzPqdSYzFVg9P7nzA8v+tORqdOBU0JkEV/d xGx6V/6NduqzeWhcwpuRqJcVdww8uFJrYjPzaMonkYzT3v4Y0ZOMNAg1fcJrrV5pQkdV elW6ZZtv09tqy66PaxDDAbnH0M+GFSCcgdPmKHaqpbJlk/unXr+MbVu7eUiWk5EYv7b4 x/6ZblY4ETg7jNyulN9MjVy3UMDC+xgGm3CZKSo1P997RMmH68ueFefRk2KaJaRaNJyR X4UALnvKMXF88yr5S4nldqUDAPZKS2vVpWTdhb606uaWvBrQAAXs0u5CgKSljEJJMJPA Fsng== X-Gm-Message-State: APjAAAXFd5EkaQv3bd73b5XvjUlUy9ykJHmFhCEkMGguCO/mQIkZWNgW 7KPiZhJWPP0BWyn/4cDis257SA== X-Received: by 2002:ac8:1a6c:: with SMTP id q41mr32662928qtk.217.1565719223137; Tue, 13 Aug 2019 11:00:23 -0700 (PDT) Received: from ziepe.ca (hlfxns017vw-156-34-55-100.dhcp-dynamic.fibreop.ns.bellaliant.net. [156.34.55.100]) by smtp.gmail.com with ESMTPSA id y204sm5010562qka.54.2019.08.13.11.00.22 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 13 Aug 2019 11:00:22 -0700 (PDT) Received: from jgg by mlx.ziepe.ca with local (Exim 4.90_1) (envelope-from ) id 1hxb5q-0000sY-7l; Tue, 13 Aug 2019 15:00:22 -0300 Date: Tue, 13 Aug 2019 15:00:22 -0300 From: Jason Gunthorpe To: Ira Weiny Cc: Andrew Morton , Dan Williams , Matthew Wilcox , Jan Kara , Theodore Ts'o , John Hubbard , Michal Hocko , Dave Chinner , linux-xfs@vger.kernel.org, linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-nvdimm@lists.01.org, linux-ext4@vger.kernel.org, linux-mm@kvack.org Subject: Re: [RFC PATCH v2 16/19] RDMA/uverbs: Add back pointer to system file object Message-ID: <20190813180022.GF29508@ziepe.ca> References: <20190809225833.6657-1-ira.weiny@intel.com> <20190809225833.6657-17-ira.weiny@intel.com> <20190812130039.GD24457@ziepe.ca> <20190812172826.GA19746@iweiny-DESK2.sc.intel.com> <20190812175615.GI24457@ziepe.ca> <20190812211537.GE20634@iweiny-DESK2.sc.intel.com> <20190813114842.GB29508@ziepe.ca> <20190813174142.GB11882@iweiny-DESK2.sc.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190813174142.GB11882@iweiny-DESK2.sc.intel.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Tue, Aug 13, 2019 at 10:41:42AM -0700, Ira Weiny wrote: > And I was pretty sure uverbs_destroy_ufile_hw() would take care of (or ensure > that some other thread is) destroying all the MR's we have associated with this > FD. fd's can't be revoked, so destroy_ufile_hw() can't touch them. It deletes any underlying HW resources, but the FD persists. > > This is why having a back pointer like this is so ugly, it creates a > > reference counting cycle > > Yep... I worked through this... and it was giving me fits... > > Anyway, the struct file is the only object in the core which was reasonable to > store this information in since that is what is passed around to other > processes... It could be passed down in the uattr_bundle, once you are in file operations handle the file is guarenteed to exist, and we've now arranged things so the uattr_bundle flows into the umem, as umems can only be established under a system call. Jason