> > > If event queue becomes too full, we might drop these events. But I guess > > > in that case we will have to generate IN_Q_OVERFLOW and that can somehow > > > be used to cleanup such S_DEAD inodes? > > > > That depends on the server implementation. > > If the server is watching host fs using fanotify filesystem mark, then > > an overflow > > event does NOT mean that other new events on inode may be missed only > > that old events could have been missed. > > Server should know about all the watched inodes, so it can check on overflow > > if any of the watched inodes were deleted and notify the client using a reliable > > channel. > > Ok. We have only one channel for notifications. I guess we can program > the channel in such a way so that it does not drop overflow events but > can drop other kind of events if things get crazy. If too many overflow > events and we allocate too much of memory, I guess at some point of > time, oom killer will kick in a kill server. > The kernel implementation of fsnotify events queue pre-allocates a single overflow event and never queues more than a single overflow event. IN_Q_OVERFLOW must be delivered reliably, but delivering one overflow event is enough (until it is consumed). > > > > Given the current server implementation with inotify, IN_Q_OVERFLOW > > means server may have lost an IN_IGNORED event and may not get any > > more events on inode, so server should check all the watched inodes after > > overflow, notify the client of all deleted inodes and try to re-create > > the watches > > for all inodes with known path or use magic /prod/pid/fd path if that > > works (??). > > Re-doing the watches sounds very painful. Event overflow is a painful incident and systems usually pay a large penalty when it happens (e.g. full recrawl of watched tree). If virtiofsd is going to use inotify, it is no different than any other inotify application that needs to bear the consequence of event overflow. > That means we will need to > keep track of aggregated mask in server side inode as well. As of > now we just pass mask to kernel using inotify_add_watch() and forget > about it. > It costs nothing to keep the aggregated mask in server side inode and it makes sense to do that anyway. This allows an implementation to notify about changes that the server itself handles even if there is no backing filesystem behind it or host OS has no fs notification support. > /proc/pid/fd should work because I think that's how ioannis is putting > current watches on inodes. We don't send path info to server. > > > > > > > > > nodeid is managed by server. So I am assuming that FORGET messages will > > > not be sent to server for this inode till we have seen FS_IN_IGNORED > > > and FS_DELETE_SELF events? > > > > > > > Or until the application that requested the watch calls > > inotify_rm_watch() or closes > > the inotify fd. > > > > IOW, when fs implements remote fsnotify, the local watch keeps the local deleted > > inode object in limbo until the local watch is removed. > > When the remote fsnotify server informs that the remote watch (or remote inode) > > is gone, the local watch is removed as well and then the inotify > > application also gets > > an FS_IN_IGNORED event. > > Hmm.., I guess remote server will simply send IN_DELETE event when it > gets it and forward to client. And client will have to then cleanup > this S_DEAD inode which is in limbo waiting for IN_DELETE_SELF event. > And that should trigger cleanup of marks/local-watches on the inode, IIUC. > In very broad lines, but the server notification must be delivered reliably. > > > > Lifetime of local inode is complicated and lifetime of this "shared inode" > > is much more complicated, so I am not pretending to claim that I have this all > > figured out or that it could be reliably done at all. > > Yes this handling of IN_DELETE_SELF is turning out to be the most > complicated piece of this proposal. I wish initial implementation > could just be designed that it does not send IN_DELETE_SELF and > IN_INGORED is generated locally. And later enhance it to support > reliable delivery of IN_DELETE_SELF. > Not allowing DELETE_SELF in the mask sounds reasonable, but as Ioannis explained, other events can be missed on local file delete. If you want to preserve inotify semantics, you could queue an overflow event if a fuse inode that gets evicted still has inotify marks. That's a bit harsh though. Alternatively, you could document in inotify man page that IN_INGORED could mean that some events were dropped and hope for the best... Thanks, Amir.