From: "Darrick J. Wong" <darrick.wong@oracle.com>
To: Christoph Hellwig <hch@infradead.org>
Cc: linux-xfs@vger.kernel.org, Richard Wareing <rwareing@fb.com>,
david@fromorbit.com
Subject: Re: [ZOMG RFCRAP PATCH 0/2] xfs: horrifying eBPF hacks
Date: Thu, 21 Dec 2017 08:45:35 -0800 [thread overview]
Message-ID: <20171221164535.GS12613@magnolia> (raw)
In-Reply-To: <20171221133338.GD1567@infradead.org>
On Thu, Dec 21, 2017 at 05:33:38AM -0800, Christoph Hellwig wrote:
> Eek. Whie eBPF is a really nice debug tool we should never use
> it for actual required kernel I/O functionality.
Certainly not in its current hacky form. I'm curious if Richard has had
a chance to try out these patches to see if it affects performance in a
noticeable way?
I /think/ bpf has enough safety mechanisms (no loops, no direct writing
to kernel memory, bytecode verifiers, opcode count limits) that such a
beast could be hidden behind a kconfig option that isn't turned for the
general public. For people who have these particularly specific use
cases I think it better to have a general mechanism to accomodate them
vs. scattering code all over xfs vs. "no sorry go away", though this
ebpf thing isn't necessarily the final answer. We do validate that the
proposed iflags are allowed for the fs geometry, though I acknowledge
that the prospect of running ebpf with ilock_excl does give me pause.
I'm curious, though, what are your (and everyone else's) concerns about
this?
--D
> --
> To unsubscribe from this list: send the line "unsubscribe linux-xfs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
next prev parent reply other threads:[~2017-12-21 16:46 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-12-13 6:18 [ZOMG RFCRAP PATCH 0/2] xfs: horrifying eBPF hacks Darrick J. Wong
2017-12-13 6:21 ` [PATCH 1/2] xfs: eBPF user hacks insanity Darrick J. Wong
2017-12-13 6:22 ` [PATCH 2/2] tools/xfs: use XFS hacks to override data block device placement Darrick J. Wong
2017-12-21 13:33 ` [ZOMG RFCRAP PATCH 0/2] xfs: horrifying eBPF hacks Christoph Hellwig
2017-12-21 16:45 ` Darrick J. Wong [this message]
2018-01-04 0:05 ` Richard Wareing
2018-01-04 0:52 ` Darrick J. Wong
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20171221164535.GS12613@magnolia \
--to=darrick.wong@oracle.com \
--cc=david@fromorbit.com \
--cc=hch@infradead.org \
--cc=linux-xfs@vger.kernel.org \
--cc=rwareing@fb.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).