On Fri, Mar 13, 2020 at 11:18:15AM +0100, Miklos Szeredi wrote: [..] > > > > +/* offset passed in should be aligned to FUSE_DAX_MEM_RANGE_SZ */ > > > > +static int fuse_setup_one_mapping(struct inode *inode, loff_t offset, > > > > + struct fuse_dax_mapping *dmap, bool writable, > > > > + bool upgrade) > > > > +{ > > > > + struct fuse_conn *fc = get_fuse_conn(inode); > > > > + struct fuse_inode *fi = get_fuse_inode(inode); > > > > + struct fuse_setupmapping_in inarg; > > > > + FUSE_ARGS(args); > > > > + ssize_t err; > > > > + > > > > + WARN_ON(offset % FUSE_DAX_MEM_RANGE_SZ); > > > > + WARN_ON(fc->nr_free_ranges < 0); > > > > + > > > > + /* Ask fuse daemon to setup mapping */ > > > > + memset(&inarg, 0, sizeof(inarg)); > > > > + inarg.foffset = offset; > > > > + inarg.fh = -1; > > > > + inarg.moffset = dmap->window_offset; > > > > + inarg.len = FUSE_DAX_MEM_RANGE_SZ; > > > > + inarg.flags |= FUSE_SETUPMAPPING_FLAG_READ; > > > > + if (writable) > > > > + inarg.flags |= FUSE_SETUPMAPPING_FLAG_WRITE; > > > > + args.opcode = FUSE_SETUPMAPPING; > > > > + args.nodeid = fi->nodeid; > > > > + args.in_numargs = 1; > > > > + args.in_args[0].size = sizeof(inarg); > > > > + args.in_args[0].value = &inarg; > > > > > > args.force = true? > > > > I can do that but I am not sure what exactly does args.force do and > > why do we need it in this case. > > Hm, it prevents interrupts. Looking closely, however it will only > prevent SIGKILL from immediately interrupting the request, otherwise > it will send an INTERRUPT request and the filesystem can ignore that. > Might make sense to have a args.nonint flag to prevent the sending of > INTERRUPT... Hi Miklos, virtiofs does not support interrupt requests yet. Its fiq interrupt handler just does not do anything. static void virtio_fs_wake_interrupt_and_unlock(struct fuse_iqueue *fiq) __releases(fiq->lock) { /* * TODO interrupts. * * Normal fs operations on a local filesystems aren't interruptible. * Exceptions are blocking lock operations; for example fcntl(F_SETLKW) * with shared lock between host and guest. */ spin_unlock(&fiq->lock); } So as of now setting force or not will not make any difference. We will still end up waiting for request to finish. Infact, I think there is no mechanism to set fc->no_interrupt in virtio_fs. If I am reading request_wait_answer(), correctly, it will see fc->no_interrupt is not set. That means filesystem supports interrupt requests and it will do wait_event_interruptible() and not even check for FR_FORCE bit. Right now fc->no_interrupt is set in response to INTERRUPT request reply. Will it make sense to also be able to set it as part of connection negotation protocol and filesystem can tell in the beginning itself that it does not support interrupt and virtiofs can make use of that. So force flag is only useful if filesystem does not support interrupt and in that case we do wait_event_killable() and upon receiving SIGKILL, cancel request if it is still in pending queue. For virtiofs, we take request out of fiq->pending queue in submission path itself and if it can't be dispatched it waits on virtiofs speicfic queue with FR_PENDING cleared. That means, setting FR_FORCE for virtiofs does not mean anything as caller will end up waiting for request to finish anyway. IOW, setting FR_FORCE will make sense when we have mechanism to detect that request is still queued in virtiofs queues and have mechanism to cancel it. We don't have it. In fact, given we are a push model, we dispatch request immediately to filesystem, until and unless virtqueue is full. So probability of a request still in virtiofs queue is low. So may be we can start setting force at some point of time later when we have mechanism to cancel detect and cancel pending requests in virtiofs. > > > First thing it does is that request is allocated with flag __GFP_NOFAIL. > > Second thing it does is that caller is forced to wait for request > > completion and its not an interruptible sleep. > > > > I am wondering what makes FUSE_SETUPMAPING/FUSE_REMOVEMAPPING requests > > special that we need to set force flag. > > Maybe not for SETUPMAPPING (I was confused by the error log). > > However if REMOVEMAPPING fails for some reason, than that dax mapping > will be leaked for the lifetime of the filesystem. Or am I > misunderstanding it? FUSE_REMVOEMAPPING is not must. If we send another FUSE_SETUPMAPPING, then it will create the new mapping and free up resources associated with the previous mapping, IIUC. So at one point of time we were thinking that what's the point of sending FUSE_REMOVEMAPPING. It helps a bit with freeing up filesystem resources earlier. So if cache size is big, then there will not be much reclaim activity going and if we don't send FUSE_REMOVEMAPPING, all these filesystem resources will remain busy on host for a long time. > > > > > + ret = fuse_setup_one_mapping(inode, > > > > + ALIGN_DOWN(pos, FUSE_DAX_MEM_RANGE_SZ), > > > > + dmap, true, true); > > > > + if (ret < 0) { > > > > + printk("fuse_setup_one_mapping() failed. err=%d pos=0x%llx\n", > > > > + ret, pos); > > > > > > Again. > > > > Will remove. How about converting some of them to pr_debug() instead? It > > can help with debugging if something is not working. > > Okay, and please move it to fuse_setup_one_mapping() where there's > already a pr_debug() for the success case. Will do. > > > > + > > > > + /* Do not use dax for file extending writes as its an mmap and > > > > + * trying to write beyong end of existing page will generate > > > > + * SIGBUS. > > > > > > Ah, here it is. So what happens in case of a race? Does that > > > currently crash KVM? > > > > In case of race, yes, KVM hangs. So no shared directory operation yet > > till we have designed proper error handling in kvm path. > > I think before this is merged we have to fix the KVM crash; that's not > acceptable even if we explicitly say that shared directory is not > supported for the time being. Ok, I will look into it. I had done some work in the past and realized its not trivial to fix kvm error paths. There are no users and propagating signals back into qemu instances and finding the right process is going to be tricky. Given the complexity of that work, I thought that for now we say that shared directory is not supported and once basic dax patches get merged, focus on kvm work. Thanks Vivek