> On Mar 23, 2016, at 17:51, Ilya Dryomov <idryomov@xxxxxxxxx> wrote: > > On Wed, Mar 23, 2016 at 4:37 AM, Yan, Zheng <zyan@xxxxxxxxxx> wrote: >> >>> On Mar 23, 2016, at 00:13, Ilya Dryomov <idryomov@xxxxxxxxx> wrote: >>> >>> On Tue, Mar 22, 2016 at 2:57 PM, Yan, Zheng <zyan@xxxxxxxxxx> wrote: >>>> >>>>> On Mar 22, 2016, at 19:00, Ilya Dryomov <idryomov@xxxxxxxxx> wrote: >>>>> >>>>> On Tue, Mar 22, 2016 at 10:17 AM, Yan, Zheng <zyan@xxxxxxxxxx> wrote: >>>>>> >>>>>>> On Mar 22, 2016, at 14:05, Ilya Dryomov <idryomov@xxxxxxxxx> wrote: >>>>> >>>>> [ snip ] >>>>> >>>>>>> Hi Zheng, >>>>>>> >>>>>>> A one and a half line commit message and an equally short cover letter >>>>>>> for a series such as this isn't enough. I *happen* to know that the >>>>>>> basic use case for namespaces in cephfs is going to be restricting >>>>>>> users to different parts of the directory tree, with the enforcement >>>>>>> happening in ceph on the server side, as opposed to in ceph on the >>>>>>> client side, but I would appreciate some details on what the actual >>>>>>> namespace names are going to be, whether it's user input or not, >>>>>>> whether there are plans to use namespaces for anything else, etc. >>>>>>> >>>>>> >>>>>> The namespace restriction you mentioned is for cephfs metadata. This >>>>>> namespace is restricting users to different namespaces in cephfs data >>>>>> pool. (At present, the only way to restrict data access is, creating >>>>>> multiple cephfs data pools, restrict users to different data pool. >>>>>> Creating lost of pools is not efficient for the cluster) >>>>> >>>>> What about the namespace names, who is generating them, how long are >>>>> they going to be? Please describe in detail how this is going to work >>>>> for both data and metadata pools. >>>> >>>> For example, to restrict user foo to directory /foo_dir >>>> >>>> // create auth caps for user foo. >>>> ceph auth get-or-create client.foo mon 'allow r' mds 'allow r, allow rw path=/foo_dir' osd 'allow rw pool=data namespace=foo_ns’ >>>> >>>> // mount cephfs by user admin >>>> mount -t ceph 10.0.0.1:/ /mnt/ceph_mount -o name=admin,secret=xxxx >>>> >>>> // set directory’s layout.pool_namespace >>>> setfattr -n ceph.dir.pool_namespace -v foo_ns /mnt/ceph_mount/foo_dir >>>> >>>> Admin user chooses namespace name. In most cases, namespace name does not change. >>> >>> Good, I guess limiting it to 100 chars (or maybe even a smaller >>> number) is sensible then. >>> >>>> >>>>> >>>>>> >>>>>> >>>>>>> I don't like the idea of sharing namespace name strings between libceph >>>>>>> and ceph modules, especially with the strings themselves hosted in >>>>>>> libceph. rbd has no use for namespaces, so libceph can live with >>>>>>> namespace names embedded into ceph_osd_request by value or with >>>>>>> a simple non-owning pointer, leaving reference counting to the outside >>>>>>> modules, if one of the use cases is "one namespace with a long name for >>>>>>> the entire directory tree" or something close to it. >>>>>>> >>>>>>> I think the sharing infrastructure should be moved into cephfs, and >>>>>>> probably changed to share entire file layouts along the way. I don't >>>>>>> know this code well enough to be sure, but it seems that by sharing >>>>>>> file layouts and making ci->i_layout an owning pointer you might be >>>>>>> able to piggy back on i_ceph_lock and considerably simplify the whole >>>>>>> thing by dropping RCU and eliminating numerous get/put calls. >>>>>> >>>>>> RBD may use namespace later. >>>>>> http://tracker.ceph.com/projects/ceph/wiki/Rbd_-_namespace_support >>>>> >>>>> Well, compared to cephfs, it's hard to call that "using" - in that >>>>> case, there will only ever be one namespace per image. My point is >>>>> it's never going to use the string sharing infrastructure and is fine >>>>> with a non-owning pointer to a string in the file layout field of the >>>>> in-memory rbd image header. >>>>> >>>>>> >>>>>> The reason I use RCU here is that ci->i_layout.pool_ns can change at >>>>>> any time. For the same reason, using non-owning pointer for namespace >>>>>> or entire layout is unfeasible. Using embedded namespace is not >>>>>> elegant either. When allocating ceph_osd_request, cephfs needs to >>>>>> lock i_ceph_lock, copy namespace to a temporary buffer, unlock >>>>>> i_ceph_lock, pass ci->i_layout and the temporary buffer to the >>>>>> ceph_osdc_xxx_request(). >>>>> >>>>> Hmm, RCU doesn't protect you from pool_ns or other file layout fields >>>>> changing while the OSD request is in flight. As used above, it allows >>>>> ceph_try_get_string() to not take any locks and that's it. >>>> >>>> Yes. But not taking lock simplify the code a lot. we don't need to >>>> lock/unlock i_ceph_lock each time i_layout is used. >>> >>> I wouldn't call a bunch of rcu_dereference_* variants sprinkled around >>> the code base a simplification, but, more importantly, is keeping the >>> pool_ns pointer valid really all you need? Shouldn't there be some >>> kind of synchronization around "OK, I'm switching to a new layout for >>> this inode"? As it is, pool_ns is grabbed in ceph_osdc_new_request(), >>> with two successive calls to ceph_osdc_new_request() potentially ending >>> up with two different namespaces, e.g. ceph_uninline_data(). >> >> There is synchronisation. When changing file layout, MDS revokes Frw caps from client (block new read/write, for in-progress read/write). But this synchronisation is not complete reliable when client session state is toggled between stale and active. > > I have a bit of trouble parsing "block new read/write, for in-progress > read/write". So the client will stop issuing requests as soon as it > learns that it no longer has a cap, but what happens with the in-flight > requests? When client know MDS is revoking Frw caps, it stops issuing new request and waits for in-flight requests. After all in-flight requests completes, client releases Frw caps to MDS. > >> >>>>> >>>>> Why exactly can't file layouts be shared? ci->i_layout would become >>>>> reference counted and you would give libceph a pointer to the pool_ns >>>>> string (or entire layout) after bumping it. It doesn't matter if >>>>> pool_ns or the rest of the layout changes due to a cap grant or revoke >>>>> while libceph is servicing the OSD request: you would unlink it from >>>>> the tree but the bumped reference will keep the layout around, to be >>>>> put in the OSD request completion callback or so. Layout lookup would >>>>> have to happen in exactly two places: when newing an inode and handling >>>>> cap grant/revoke, in other places you would simply bump the count on >>>>> the basis of already holding a valid pointer. You wouldn't have to >>>>> unlink in the destructor, so no hassle with kref_get_unless_zero() and >>>>> no need for RCU, with i_ceph_lock providing the exclusion around the >>>>> tree. >>>> >>>> This means cephfs needs to set r_callback for all ceph_osd_request, >>>> ceph_osd_request also needs a new field to store layout pointer. >>>> I don’t think it’s better/simpler than reference counted namespace >>>> string. >>> >>> Not necessarily - you can put after ceph_osdc_wait_request() returns. >>> Somewhat unrelated, I'm working on refactoring osdc's handle_reply(), >>> and it'll probably be required that all OSD requests set one of the >>> callbacks, except for stateless fire-and-forget ones. >> >> For the r_callback case (no wait case), without saving a pointer in ceph_osd_request, how can I know which layout to put? >> >>> >>> Sharing ->i_layout as opposed to ->i_layout->pool_ns seemed sensible to >>> me because a) it naturally hangs off of ceph inode and b) logically, >>> it is entire layouts and not just namespaces that are shared across the >>> directory tree. If you think reference counted pool_ns strings are >>> better, I won't argue with that, but, with cephfs being the only user >>> of either solution, it'll have to live in fs/ceph. >> >> I’m OK with both approaches. When sharing i_layout, we need to add a layout pointer to ceph_osd_request. After adding the layout pointer, why not let libceph release it when request finishes. >> >>> Separately, I think passing non-owning pool_ns pointers into libceph is >>> worth exploring, but if that doesn't easily map onto cephfs lifetime or >>> ownership rules, we will go with embedding namespace names by value into >>> ceph_osd_request (or, rather, ceph_object_locator). >>> >> >> As I stated in previous mail, embedded namespace is nightmare for cephfs. Every time namespace is used, cephfs needs to lock i_ceph_lock, copy namespace to a temporary buffer. > > So you are maintaining that all that is needed is to keep the memory > valid and there is no locking around installing a new namespace for an > inode. I didn't realize that when I suggested layout sharing, it makes > it much less attractive. Yes. That’s the main reason I decided to use RCU. Regards Yan, Zheng > > Thanks, > > Ilya -- To unsubscribe from this list: send the line "unsubscribe ceph-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html