[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <01000168f1d25e3a-2857236c-a7cc-44b8-a5f3-f51c2cfe6ce4-000000@email.amazonses.com>
Date: Fri, 15 Feb 2019 15:42:02 +0000
From: Christopher Lameter <cl@...ux.com>
To: Dave Chinner <david@...morbit.com>
cc: Jerome Glisse <jglisse@...hat.com>,
Matthew Wilcox <willy@...radead.org>,
Jason Gunthorpe <jgg@...pe.ca>,
Dan Williams <dan.j.williams@...el.com>,
Jan Kara <jack@...e.cz>, Doug Ledford <dledford@...hat.com>,
Ira Weiny <ira.weiny@...el.com>,
lsf-pc@...ts.linux-foundation.org,
linux-rdma <linux-rdma@...r.kernel.org>,
Linux MM <linux-mm@...ck.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
John Hubbard <jhubbard@...dia.com>,
Michal Hocko <mhocko@...nel.org>
Subject: Re: [LSF/MM TOPIC] Discuss least bad options for resolving longterm-GUP
usage by RDMA
On Fri, 15 Feb 2019, Dave Chinner wrote:
> Which tells us filesystem people that the applications are doing
> something that _will_ cause data corruption and hence not to spend
> any time triaging data corruption reports because it's not a
> filesystem bug that caused it.
>
> See open(2):
>
> Applications should avoid mixing O_DIRECT and normal I/O to
> the same file, and especially to overlapping byte regions in
> the same file. Even when the filesystem correctly handles
> the coherency issues in this situation, overall I/O
> throughput is likely to be slower than using either mode
> alone. Likewise, applications should avoid mixing mmap(2)
> of files with direct I/O to the same files.
Since RDMA is something similar: Can we say that a file that is used for
RDMA should not use the page cache?
And can we enforce this in the future? I.e. have some file state that says
that this file is direct/RDMA or contains long term pinning and thus
allows only a certain type of operations to ensure data consistency?
If we cannot enforce it then we may want to spit out some warning?
Powered by blists - more mailing lists