From: Shakeel Butt <shakeel.butt@linux.dev>
To: Matthew Wilcox <willy@infradead.org>
Cc: David Hildenbrand <david@redhat.com>,
"lsf-pc@lists.linux-foundation.org"
<lsf-pc@lists.linux-foundation.org>,
linux-fsdevel@vger.kernel.org,
"linux-mm@kvack.org" <linux-mm@kvack.org>,
Jeff Layton <jlayton@kernel.org>, Zi Yan <ziy@nvidia.com>,
Joanne Koong <joannelkoong@gmail.com>,
Miklos Szeredi <miklos@szeredi.hu>
Subject: Re: [LSF/MM/BPF TOPIC] Migrating the un-migratable
Date: Thu, 30 Jan 2025 14:33:56 -0800 [thread overview]
Message-ID: <euzurxcimhegubx7cisr7rh7z2jymd2zkc65zy6x2t2dv44ycz@m6skjuezgup3> (raw)
In-Reply-To: <Z5vzuii9-zS-WsCH@casper.infradead.org>
On Thu, Jan 30, 2025 at 09:48:42PM +0000, Matthew Wilcox wrote:
> On Wed, Jan 29, 2025 at 05:10:03PM +0100, David Hildenbrand wrote:
> > As one example, in context of FUSE we recently discovered that folios that
> > are under writeback cannot be migrated, and user space in control of when
> > writeback will end. Something similar can happen ->readahead() where user
> > space is in charge of supplying page content. Networking filesystems in
> > general seem to be prone to this as well.
>
> You're not wrong. The question is whether we're willing to put the
> asterisk on "In the presence of a misbehaving server (network or fuse),
> our usual guarantees do not apply". I'm not sure it's a soluble
> problem, though. Normally writeback (or, as you observed, readahead)
> completes just fine and we don't need to use non-movable pages for them.
>
> But if someone trips over the network cable, anything in flight becomes
> unmovable until someone plugs it back in. We've given the DMA address
> of the memory to a network adapter, and that's generally a non-revokable
> step (maybe the iommu could save us, but at what cost?)
>
My position is more aligned with Willy's. We definitely should discuss
if we can solve the general problem of (im)movability due to writeback
or readahead but I think targeting precise problem will be more
fruitful. Untrusted fuse server deliberatly causing immovable memory is
a real problem as anyone can run fuse server and mount fuse without any
permissions. At least to me a misbehaving but trusted server is less of
an (practical) issue. (Please correct me if I miss something like this
is also a real issue in multi-tenancy world).
Joanne has some ideas [1] on fuse specific solution but having a
discussion on general solution would be beneficial as well.
[1] https://lore.kernel.org/all/CAJnrk1ZCgff6ZWmqKzBXFq5uAEbms46OexA1axWS5v-PCZFqJg@mail.gmail.com/
next prev parent reply other threads:[~2025-01-30 22:34 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-01-29 16:10 David Hildenbrand
2025-01-30 19:39 ` Frank van der Linden
2025-01-31 9:21 ` Shakeel Butt
2025-01-30 21:48 ` Matthew Wilcox
2025-01-30 22:33 ` Shakeel Butt [this message]
2025-01-30 22:52 ` David Hildenbrand
2025-03-24 18:55 ` David Hildenbrand
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=euzurxcimhegubx7cisr7rh7z2jymd2zkc65zy6x2t2dv44ycz@m6skjuezgup3 \
--to=shakeel.butt@linux.dev \
--cc=david@redhat.com \
--cc=jlayton@kernel.org \
--cc=joannelkoong@gmail.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=lsf-pc@lists.linux-foundation.org \
--cc=miklos@szeredi.hu \
--cc=willy@infradead.org \
--cc=ziy@nvidia.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox