Message ID | 1504507859-39323-1-git-send-email-houtao1@huawei.com (mailing list archive) |
---|---|
State | Deferred, archived |
Headers | show |
On Mon, Sep 04, 2017 at 02:50:59PM +0800, Hou Tao wrote: > It will be useful if there is a corresponding online uevent after > a XFS filesystem has been mounted. A typical usage of the uevent > is setting the error configuration for a specific XFS filesystem > or all XFS filesystems by using udevd. > > The following is an example of udevd rule which will shutdown > any XFS filesystem (except the one with the matched UUID) after > the filesystem gets any IO error and the filesystem with the matched > UUID will retry 5 times before its shutdown: > > ACTION=="online", SUBSYSTEM=="xfs", \ > ENV{ID_FS_UUID}=="6c1eebfd-d1af-4b69-a0f1-c9b4663df44d", \ > RUN+="/bin/sh -c 'echo 5 > /sys%p/error/metadata/EIO/max_retries'", \ > GOTO="end" > > ACTION=="online", SUBSYSTEM=="xfs", DEVPATH=="/fs/xfs/*", \ > RUN+="/bin/sh -c 'echo 0 > /sys%p/error/metadata/default/max_retries; \ > echo 0 > /sys%p/error/metadata/EIO/max_retries; \ > echo 0 > /sys%p/error/metadata/ENOSPC/max_retries; \ > echo 0 > /sys%p/error/metadata/ENODEV/max_retries'" > > LABEL="end" > > Suggested-by: Dave Chinner <david@fromorbit.com> > Signed-off-by: Hou Tao <houtao1@huawei.com> > --- > v3: > * code style fixes > * use "ID_FS_UUID" instead of "UUID" as the name of uuid environment > v2: > * add UUID property for mount uevent > * add an udev example for UUID filtering > v1: > * http://www.spinics.net/lists/linux-xfs/msg09484.html > --- > fs/xfs/xfs_super.c | 24 ++++++++++++++++++++++++ > 1 file changed, 24 insertions(+) > > diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c > index 3a3812b4..1f0d895 100644 > --- a/fs/xfs/xfs_super.c > +++ b/fs/xfs/xfs_super.c > @@ -1530,6 +1530,28 @@ xfs_destroy_percpu_counters( > percpu_counter_destroy(&mp->m_fdblocks); > } > > +static void > +xfs_fs_uevent( > + struct xfs_mount *mp, > + enum kobject_action action) > +{ > +#define XFS_UEVENT_MAX_ENV_COUNT 1 > + /* "+ 1" for the trailing NULL pointer */ > + char *envp[XFS_UEVENT_MAX_ENV_COUNT + 1]; > + const char *prefix = "ID_FS_UUID="; > + char buf[strlen(prefix) + UUID_STRING_LEN + 1]; > + int i = 0; > + int err; > + > + snprintf(buf, sizeof(buf), "%s%pUb", prefix, &mp->m_super->s_uuid); > + envp[i++] = buf; > + envp[i] = NULL; > + err = kobject_uevent_env(&mp->m_kobj.kobject, action, envp); > + if (err) > + xfs_notice(mp, "Sending XFS uevent %d got error %d", kobject_uevent_env() can fail for a few reasons, most commonly it can fail for when we're out of memory. I've seen quite a bit of use cases these days where tons of remounts can happen, one example is actually is when there is not enough space dockers instances can get restarted. There are many reasons for restarts of docker instance, but as stupid as it is, since -ENOMEM could actually be common, I think we should consider treating it as fatal and not mount. Otherwise the assumption that userspace will configure the filesystem correctly may be false. Note that kobject_uevent_env() can also fail during netlink_broadcast_filtered(), so perhaps we should consider all errors well here. Luis -- To unsubscribe from this list: send the line "unsubscribe linux-xfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Hi Luis, On 2017/9/6 8:52, Luis R. Rodriguez wrote: > On Mon, Sep 04, 2017 at 02:50:59PM +0800, Hou Tao wrote: >> It will be useful if there is a corresponding online uevent after >> a XFS filesystem has been mounted. A typical usage of the uevent >> is setting the error configuration for a specific XFS filesystem >> or all XFS filesystems by using udevd. >> >> The following is an example of udevd rule which will shutdown >> any XFS filesystem (except the one with the matched UUID) after >> the filesystem gets any IO error and the filesystem with the matched >> UUID will retry 5 times before its shutdown: >> >> ACTION=="online", SUBSYSTEM=="xfs", \ >> ENV{ID_FS_UUID}=="6c1eebfd-d1af-4b69-a0f1-c9b4663df44d", \ >> RUN+="/bin/sh -c 'echo 5 > /sys%p/error/metadata/EIO/max_retries'", \ >> GOTO="end" >> >> ACTION=="online", SUBSYSTEM=="xfs", DEVPATH=="/fs/xfs/*", \ >> RUN+="/bin/sh -c 'echo 0 > /sys%p/error/metadata/default/max_retries; \ >> echo 0 > /sys%p/error/metadata/EIO/max_retries; \ >> echo 0 > /sys%p/error/metadata/ENOSPC/max_retries; \ >> echo 0 > /sys%p/error/metadata/ENODEV/max_retries'" >> >> LABEL="end" >> >> Suggested-by: Dave Chinner <david@fromorbit.com> >> Signed-off-by: Hou Tao <houtao1@huawei.com> >> --- >> v3: >> * code style fixes >> * use "ID_FS_UUID" instead of "UUID" as the name of uuid environment >> v2: >> * add UUID property for mount uevent >> * add an udev example for UUID filtering >> v1: >> * http://www.spinics.net/lists/linux-xfs/msg09484.html >> --- >> fs/xfs/xfs_super.c | 24 ++++++++++++++++++++++++ >> 1 file changed, 24 insertions(+) >> >> diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c >> index 3a3812b4..1f0d895 100644 >> --- a/fs/xfs/xfs_super.c >> +++ b/fs/xfs/xfs_super.c >> @@ -1530,6 +1530,28 @@ xfs_destroy_percpu_counters( >> percpu_counter_destroy(&mp->m_fdblocks); >> } >> >> +static void >> +xfs_fs_uevent( >> + struct xfs_mount *mp, >> + enum kobject_action action) >> +{ >> +#define XFS_UEVENT_MAX_ENV_COUNT 1 >> + /* "+ 1" for the trailing NULL pointer */ >> + char *envp[XFS_UEVENT_MAX_ENV_COUNT + 1]; >> + const char *prefix = "ID_FS_UUID="; >> + char buf[strlen(prefix) + UUID_STRING_LEN + 1]; >> + int i = 0; >> + int err; >> + >> + snprintf(buf, sizeof(buf), "%s%pUb", prefix, &mp->m_super->s_uuid); >> + envp[i++] = buf; >> + envp[i] = NULL; >> + err = kobject_uevent_env(&mp->m_kobj.kobject, action, envp); >> + if (err) >> + xfs_notice(mp, "Sending XFS uevent %d got error %d", > > > kobject_uevent_env() can fail for a few reasons, most commonly it can fail for > when we're out of memory. I've seen quite a bit of use cases these days where > tons of remounts can happen, one example is actually is when there is not > enough space dockers instances can get restarted. There are many reasons for > restarts of docker instance, but as stupid as it is, since -ENOMEM could > actually be common, I think we should consider treating it as fatal and not > mount. Otherwise the assumption that userspace will configure the filesystem > correctly may be false. I understand and agree your opinion on error handler, but i don't follow the example about docker instances. Do you mean the docker instances will be restarted and the filesystem will be unmounted and mounted again when there is not enough memory for the cgroup where the docker instance residents in ? If there is not enough memory, the mount may abort before the uevent sending. > Note that kobject_uevent_env() can also fail during > netlink_broadcast_filtered(), so perhaps we should consider all errors well > here. Yes, to deliver the uevent reliably we need to handle the error returned by kobject_uevent_evn(), and abort the filesystem mount if any error occurs. Tao > Luis > > . > -- To unsubscribe from this list: send the line "unsubscribe linux-xfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
On Thu, Sep 07, 2017 at 04:56:56PM +0800, Hou Tao wrote: > > Note that kobject_uevent_env() can also fail during > > netlink_broadcast_filtered(), so perhaps we should consider all errors well > > here. > Yes, to deliver the uevent reliably we need to handle the error returned by > kobject_uevent_evn(), and abort the filesystem mount if any error occurs. Failing to delivery a mount uevent is not a fatal error. An inconvenience, yes, but it does not prevent the filesystem from operating. We do not consider errors when other user events we push to userspace through netlink fail (e.g. quota warnings), so I don't see why we should treat this any differently, especially as a user can still configure the filesystem as they need without the mount uevent... Cheers, Dave.
On Fri, Sep 08, 2017 at 10:49:05AM +1000, Dave Chinner wrote: > On Thu, Sep 07, 2017 at 04:56:56PM +0800, Hou Tao wrote: > > > Note that kobject_uevent_env() can also fail during > > > netlink_broadcast_filtered(), so perhaps we should consider all errors well > > > here. > > Yes, to deliver the uevent reliably we need to handle the error returned by > > kobject_uevent_evn(), and abort the filesystem mount if any error occurs. > > Failing to delivery a mount uevent is not a fatal error. An > inconvenience, yes, but it does not prevent the filesystem from > operating. We do not consider errors when other user events we push to > userspace through netlink fail (e.g. quota warnings), so I don't see > why we should treat this any differently, especially as a user can > still configure the filesystem as they need without the mount > uevent... I agree with Dave that it seems excessive to fail the mount just because the uevent transmission failed. I don't see any use case where it's absolutely critical that a configuration knob gets turned. I would also reiterate that I want to see at least an RFC of the userland side of this because I'd rather not have to maintain a kernel feature that is totally unused by upstream userspace. --D > > Cheers, > > Dave. > -- > Dave Chinner > david@fromorbit.com > -- > To unsubscribe from this list: send the line "unsubscribe linux-xfs" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe linux-xfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/fs/xfs/xfs_super.c b/fs/xfs/xfs_super.c index 3a3812b4..1f0d895 100644 --- a/fs/xfs/xfs_super.c +++ b/fs/xfs/xfs_super.c @@ -1530,6 +1530,28 @@ xfs_destroy_percpu_counters( percpu_counter_destroy(&mp->m_fdblocks); } +static void +xfs_fs_uevent( + struct xfs_mount *mp, + enum kobject_action action) +{ +#define XFS_UEVENT_MAX_ENV_COUNT 1 + /* "+ 1" for the trailing NULL pointer */ + char *envp[XFS_UEVENT_MAX_ENV_COUNT + 1]; + const char *prefix = "ID_FS_UUID="; + char buf[strlen(prefix) + UUID_STRING_LEN + 1]; + int i = 0; + int err; + + snprintf(buf, sizeof(buf), "%s%pUb", prefix, &mp->m_super->s_uuid); + envp[i++] = buf; + envp[i] = NULL; + err = kobject_uevent_env(&mp->m_kobj.kobject, action, envp); + if (err) + xfs_notice(mp, "Sending XFS uevent %d got error %d", + action, err); +} + STATIC int xfs_fs_fill_super( struct super_block *sb, @@ -1667,6 +1689,8 @@ xfs_fs_fill_super( goto out_unmount; } + xfs_fs_uevent(mp, KOBJ_ONLINE); + return 0; out_filestream_unmount:
It will be useful if there is a corresponding online uevent after a XFS filesystem has been mounted. A typical usage of the uevent is setting the error configuration for a specific XFS filesystem or all XFS filesystems by using udevd. The following is an example of udevd rule which will shutdown any XFS filesystem (except the one with the matched UUID) after the filesystem gets any IO error and the filesystem with the matched UUID will retry 5 times before its shutdown: ACTION=="online", SUBSYSTEM=="xfs", \ ENV{ID_FS_UUID}=="6c1eebfd-d1af-4b69-a0f1-c9b4663df44d", \ RUN+="/bin/sh -c 'echo 5 > /sys%p/error/metadata/EIO/max_retries'", \ GOTO="end" ACTION=="online", SUBSYSTEM=="xfs", DEVPATH=="/fs/xfs/*", \ RUN+="/bin/sh -c 'echo 0 > /sys%p/error/metadata/default/max_retries; \ echo 0 > /sys%p/error/metadata/EIO/max_retries; \ echo 0 > /sys%p/error/metadata/ENOSPC/max_retries; \ echo 0 > /sys%p/error/metadata/ENODEV/max_retries'" LABEL="end" Suggested-by: Dave Chinner <david@fromorbit.com> Signed-off-by: Hou Tao <houtao1@huawei.com> --- v3: * code style fixes * use "ID_FS_UUID" instead of "UUID" as the name of uuid environment v2: * add UUID property for mount uevent * add an udev example for UUID filtering v1: * http://www.spinics.net/lists/linux-xfs/msg09484.html --- fs/xfs/xfs_super.c | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+)