[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Making forced unmounts work
On Sun, Dec 02, 2012 at 05:29:01PM +0100, J. Hannken-Illjes wrote:
> I'm convinced -- having fstrans_start() return ERESTART is the way to go.
Ok then :-)
> >>> Also I wonder if there's any way to accomplish this that doesn't
> >>> require adding fstrans calls to every operation in every fs.
> >> Not in a clean way. We would need some kind of reference counting for
> >> vnode operations and that is quite impossible as vnode operations on
> >> devices or fifos sometimes wait forever and are called from other fs
> >> like ufsspec_read() for example. How could we protect UFS updating
> >> access times here?
> > I'm not entirely convinced of that. There are basically three
> > problems: (a) new incoming threads, (b) threads that are already in
> > the fs and running, and (c) threads that are already in the fs and
> > that are stuck more or less permanently because something broke.
> > Admittedly I don't really understand how fstrans suspending works.
> > Does it keep track of all the threads that are in the fs, so the (b)
> > ones can be interrupted somehow, or so we at least can wait until all
> > of them either leave the fs or enter fstrans somewhere and stall?
> Fstrans is a recursive rw-lock. Vnode operations take the reader lock
> on entry. To suspend a fs we take the writer lock and therefore
> it will catch both (a) and (b). New threads will block on first entry,
> threads already inside the fs will continue until they leave the fs
> and block on next entry.
Ok, fair enough, but...
> A suspended fs has the guarantee that no other thread will be inside
> fstrans_suspend / fstrans_done of any vnode operation.
> Threads stuck permanently as in (c) are impossible to catch.
...doesn't that mean the (c) threads are going to be holding read
locks, so the suspend will hang forever?
We have to assume there will be at least one such thread, as people
don't generally attempt umount -f unless something's wedged.
> > If we're going to track that information we should really do it from
> > vnode_if.c, both to avoid having to modify every fs and to make sure
> > all fses support it correctly. (We also need to be careful about how
> > it's done to avoid causing massive lock contention; that's why such
> > logic doesn't already exist.)
> Some cases are nearly impossible to track at the vnode_if.c level:
> - Both VOP_GETPAGES() and VOP_PUTPAGES() cannot block or sleep here
> as they run part or all of the operation with vnode interlock held.
Ugh. But this doesn't, for example, preclude atomically incrementing a
per-cpu counter or setting a flag in the lwp structure.
> - Accessing devices and fifos through a file system cannot be tracked
> at the vnode_if.c level. Take ufs_spec_read() for example:
> VTOI(vp)->i_flag |= IN_ACCESS;
> return VOCALL(spec_vnodeop_p, ...)
> Here the VOCALL may sleep forever if the device has no data.
This I don't understand. To the extent it's "in" the fs while it's
doing this, vnode_if.c can know that, because it called ufs_spec_read
and ufs_spec_read hasn't returned yet. To the extent that it's in
specfs, specfs won't itself ever be umount -f'd, since it isn't
mounted, so there's no danger.
If umount -f currently blats over the data that specfs uses, then it's
currently not safe, but I don't see how it's different from any other
similar case with ufs data.
I expect I'm missing something.
David A. Holland
Main Index |
Thread Index |