From: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
To: Vivek Goyal <vgoyal@redhat.com>
Cc: virtio-fs@redhat.com, qemu-devel@nongnu.org, miklos@szeredi.hu
Subject: Re: [Virtio-fs] [PATCH 4/4] virtiofsd: Implement blocking posix locks
Date: Tue, 26 Nov 2019 13:02:29 +0000 [thread overview]
Message-ID: <20191126130229.GG2928@work-vm> (raw)
In-Reply-To: <20191125154414.GC13247@redhat.com>
* Vivek Goyal (vgoyal@redhat.com) wrote:
> On Fri, Nov 22, 2019 at 05:47:32PM +0000, Dr. David Alan Gilbert wrote:
>
> [..]
> > > +static int virtio_send_notify_msg(struct fuse_session *se, struct iovec *iov,
> > > + int count)
> > > +{
> > > + struct fv_QueueInfo *qi;
> > > + VuDev *dev = &se->virtio_dev->dev;
> > > + VuVirtq *q;
> > > + FVRequest *req;
> > > + VuVirtqElement *elem;
> > > + unsigned int in_num, bad_in_num = 0, bad_out_num = 0;
> > > + struct fuse_out_header *out = iov[0].iov_base;
> > > + size_t in_len, tosend_len = iov_size(iov, count);
> > > + struct iovec *in_sg;
> > > + int ret = 0;
> > > +
> > > + /* Notifications have unique == 0 */
> > > + assert (!out->unique);
> > > +
> > > + if (!se->notify_enabled)
> > > + return -EOPNOTSUPP;
> > > +
> > > + /* If notifications are enabled, queue index 1 is notification queue */
> > > + qi = se->virtio_dev->qi[1];
> > > + q = vu_get_queue(dev, qi->qidx);
> > > +
> > > + pthread_rwlock_rdlock(&qi->virtio_dev->vu_dispatch_rwlock);
> > > + pthread_mutex_lock(&qi->vq_lock);
> > > + /* Pop an element from queue */
> > > + req = vu_queue_pop(dev, q, sizeof(FVRequest), &bad_in_num, &bad_out_num);
> >
> > You don't need bad_in_num/bad_out_num - just pass NULL for both; they're
> > only needed if you expect to read/write data that's not mappable (i.e.
> > in our direct write case).
>
> Will do.
>
> [..]
> > > @@ -1950,21 +1948,54 @@ static void lo_setlk(fuse_req_t req, fuse_ino_t ino,
> > >
> > > if (!plock) {
> > > saverr = ret;
> > > + pthread_mutex_unlock(&inode->plock_mutex);
> > > goto out;
> > > }
> > >
> > > + /*
> > > + * plock is now released when inode is going away. We already have
> > > + * a reference on inode, so it is guaranteed that plock->fd is
> > > + * still around even after dropping inode->plock_mutex lock
> > > + */
> > > + ofd = plock->fd;
> > > + pthread_mutex_unlock(&inode->plock_mutex);
> > > +
> > > + /*
> > > + * If this lock request can block, request caller to wait for
> > > + * notification. Do not access req after this. Once lock is
> > > + * available, send a notification instead.
> > > + */
> > > + if (sleep && lock->l_type != F_UNLCK) {
> > > + /*
> > > + * If notification queue is not enabled, can't support async
> > > + * locks.
> > > + */
> > > + if (!se->notify_enabled) {
> > > + saverr = EOPNOTSUPP;
> > > + goto out;
> > > + }
> > > + async_lock = true;
> > > + unique = req->unique;
> > > + fuse_reply_wait(req);
> > > + }
> > > /* TODO: Is it alright to modify flock? */
> > > lock->l_pid = 0;
> > > - ret = fcntl(plock->fd, F_OFD_SETLK, lock);
> > > + if (async_lock)
> > > + ret = fcntl(ofd, F_OFD_SETLKW, lock);
> > > + else
> > > + ret = fcntl(ofd, F_OFD_SETLK, lock);
> >
> > What happens if the guest is rebooted after it's asked
> > for, but not been granted a lock?
>
> I think a regular reboot can't be done till a request is pending, because
> virtio-fs can't be unmounted and unmount will wait for all pending
> requests to finish.
>
> Destroying qemu will destroy deamon too.
>
> Are there any other reboot paths I have missed.
Yes, there are a few other ways the guest can reboot:
a) A echo b > /proc/sysrq-trigger
b) Telling qemu to do a reset
probably a few more as well; but they all end up with the daemon
still running over the same connection. See
'virtiofsd: Handle hard reboot' where I handle that case where
a FUSE_INIT turns up unexpectedly.
Dave
> Thanks
> Vivek
--
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK
next prev parent reply other threads:[~2019-11-26 13:03 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-11-15 20:55 [PATCH 0/4] [RFC] virtiofsd, vhost-user-fs: Add support for notification queue Vivek Goyal
2019-11-15 20:55 ` [PATCH 1/4] virtiofsd: Release file locks using F_UNLCK Vivek Goyal
2019-11-22 10:07 ` Stefan Hajnoczi
2019-11-22 13:45 ` Vivek Goyal
2019-11-15 20:55 ` [PATCH 2/4] virtiofd: Create a notification queue Vivek Goyal
2019-11-22 10:19 ` Stefan Hajnoczi
2019-11-22 14:47 ` Vivek Goyal
2019-11-22 17:29 ` Dr. David Alan Gilbert
2019-11-15 20:55 ` [PATCH 3/4] virtiofsd: Specify size of notification buffer using config space Vivek Goyal
2019-11-22 10:33 ` Stefan Hajnoczi
2019-11-25 14:57 ` Vivek Goyal
2019-11-15 20:55 ` [PATCH 4/4] virtiofsd: Implement blocking posix locks Vivek Goyal
2019-11-22 10:53 ` Stefan Hajnoczi
2019-11-25 15:38 ` [Virtio-fs] " Vivek Goyal
2019-11-22 17:47 ` Dr. David Alan Gilbert
2019-11-25 15:44 ` [Virtio-fs] " Vivek Goyal
2019-11-26 13:02 ` Dr. David Alan Gilbert [this message]
2019-11-27 19:08 ` Vivek Goyal
2019-12-09 11:06 ` Dr. David Alan Gilbert
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20191126130229.GG2928@work-vm \
--to=dgilbert@redhat.com \
--cc=miklos@szeredi.hu \
--cc=qemu-devel@nongnu.org \
--cc=vgoyal@redhat.com \
--cc=virtio-fs@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).