From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D721EC433F5 for ; Fri, 14 Jan 2022 20:17:44 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id C1B0B6B0071; Fri, 14 Jan 2022 15:17:43 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id BC94B6B0073; Fri, 14 Jan 2022 15:17:43 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A910D6B0074; Fri, 14 Jan 2022 15:17:43 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0110.hostedemail.com [216.40.44.110]) by kanga.kvack.org (Postfix) with ESMTP id 99F0B6B0071 for ; Fri, 14 Jan 2022 15:17:43 -0500 (EST) Received: from smtpin03.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id 5DF9F181FFCB8 for ; Fri, 14 Jan 2022 20:17:43 +0000 (UTC) X-FDA: 79030003206.03.E6E505D Received: from bhuna.collabora.co.uk (bhuna.collabora.co.uk [46.235.227.227]) by imf20.hostedemail.com (Postfix) with ESMTP id B6F771C0007 for ; Fri, 14 Jan 2022 20:17:42 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (Authenticated sender: krisman) with ESMTPSA id 85F4E1F46CAE DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1642191460; bh=5gap1sbN9Pjz9MLgo45/GFPwSC3LfIP6QwcTn/koopg=; h=From:To:Cc:Subject:References:Date:In-Reply-To:From; b=T7Yw7ccTBDrVNfrmZbWJHmpw5WA7wt1UKbOQMdms4kJRJYsrlVnEvS9+DejGx6d91 bccew9ywocNWS13wo8kbg/2VUPucsVagU8yoKbhSSn/dnZGoazRJD+r2Xt51aeGyEt F40SWXrLeGFpw4Fc/+HEqWewRRRs+Z88s9GAaOlsgNEDIFV+UfT5owQ4zPwOwBzHbP jKT9ychfy9lfov5bkLD2/XT99vuMC/1Yfw/Gj9VT7Uz4DD7OrsJfJvuqV1Xq0hMsH0 O0/C1FIdETJF9tA75t9vjSDszlFZGra9FTNO4KZyF7+VV0RoTTNm4AFMK/Tx9g8Tpf 857eocQAN3UOA== From: Gabriel Krisman Bertazi To: Amir Goldstein Cc: Hugh Dickins , Andrew Morton , Linux MM , Jan Kara , Matthew Bobrowski , Khazhismel Kumykov , kernel@collabora.com Subject: Re: [PATCH 0/2] shmem: Notify user space when file system is full Organization: Collabora References: <20211116220742.584975-1-krisman@collabora.com> <87fspv9gr2.fsf@collabora.com> <875yqp1w04.fsf@collabora.com> Date: Fri, 14 Jan 2022 15:17:37 -0500 In-Reply-To: (Amir Goldstein's message of "Wed, 12 Jan 2022 07:59:01 +0200") Message-ID: <871r1aysv2.fsf@collabora.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain Authentication-Results: imf20.hostedemail.com; dkim=pass header.d=collabora.com header.s=mail header.b=T7Yw7ccT; dmarc=pass (policy=none) header.from=collabora.com; spf=pass (imf20.hostedemail.com: domain of krisman@collabora.com designates 46.235.227.227 as permitted sender) smtp.mailfrom=krisman@collabora.com X-Stat-Signature: m7qpyujyew3f6h7eht5u56wz3t9ceyo8 X-Rspamd-Queue-Id: B6F771C0007 X-Rspamd-Server: rspam12 X-HE-Tag: 1642191462-342220 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Amir Goldstein writes: >> > But the question remains, what is so special about shmem that >> > your use case requires fsnotify events to handle ENOSPC? >> > >> > Many systems are deployed on thin provisioned storage these days >> > and monitoring the state of the storage to alert administrator before >> > storage gets full (be it filesystem inodes or blocks or thinp space) >> > is crucial to many systems. >> > >> > Since the ENOSPC event that you are proposing is asynchronous >> > anyway, what is the problem with polling statfs() and meminfo? >> >> Amir, >> >> I spoke a bit with Khazhy (in CC) about the problems with polling the >> existing APIs, like statfs. He has been using a previous version of >> this code in production to monitor machines for a while now. Khazhy, >> feel free to pitch in with more details. >> >> Firstly, I don't want to treat shmem as a special case. The original >> patch implemented support only for tmpfs, because it was a fs specific >> solution, but I think this would be useful for any other (non-pseudo) >> file system in the kernel. >> >> The use case is similar to the use case I brought up for FAN_FS_ERROR. >> A sysadmin monitoring a fleet of machines wants to be notified when a >> service failed because of lack of space, without having to trust the >> failed application to properly report the error. >> >> Polling statfs is prone to missing the ENOSPC occurrence if the error is >> ephemeral from a monitoring tool point of view. Say the application is >> writing a large file, hits ENOSPC and, as a recovery mechanism, removes >> the partial file. If that happens, a daemon might miss the chance to >> observe the lack of space in statfs. Doing it through fsnotify, on the >> other hand, always catches the condition and allows a monitoring >> tool/sysadmin to take corrective action. >> >> > I guess one difference is that it is harder to predict page allocation failure >> > that causes ENOSPC in shmem, but IIUC, your patch does not report >> > an fsevent in that case only in inode/block accounting error. >> > Or maybe I did not understand it correctly? >> >> Correct. But we cannot predict the enospc, unless we know the >> application. I'm looking for a way for a sysadmin to not have to rely >> on the application caring about the file system size. >> > > In the real world, ENOSPC can often be anticipated way ahead of time > and sysadmins are practically required to take action when storage space is low. > Getting near 90% full filesystem is not healthy on many traditional disk > filesystems and causes suboptimal performance and in many cases > (especially cow filesystems) may lead to filesystem corruption. > > All that said, yes, *sometimes* ENOSPC cannot be anticipated, > but EIO can never be anticipated, so why are we talking about ENOSPC? > Focusing on ENOSPC seems too specific for the purpose of adding fsnotify > monitoring for filesystem ephemeral errors. > > The problem with fsnotify events for ephemeral filesystem errors > and that there can be a *lot* of them compared to filesystem corruption > errors that would usually put the filesystem in an "emergency" state > and stop the events from flooding. > For that reason I still think that a polling API for fs ephemeral errors > is a better idea. > > w.r.t to ephemeral errors on writeback we already have syncfs() as > a means to provide publish/subscribe API for monitoring applications, > to check if there was any error since last check, but we do not have an > API that provides this information without the added costs of performing > syncfs(). > > IMO, a proper solution would look something like this: > > /* per-sb errseq_t for reporting writeback errors via syncfs */ > errseq_t s_wb_err; > + /* per-sb errseq_t for reporting vfs errors via fstatfs */ > + errseq_t s_vfs_err; > I think making it a polling API wouldn't be a problem for our use case, as long as it is kept as an always increasing counter, we should be able to detect changes and not miss events. The problem with the proposal, in my opinion, is the lack of differentiation of the errors. We want to be able to tell apart an EIO from a ENOSPC, and it might not be clear from the other fields in fstatfs what has happened. Also, I suspect Google might care about what inode triggered the error. If I understand correctly their use case, that would allow them to trace back the origin of the issue. Either way, wouldn't it be useful for applications in general to be able to know what specific writeback failed? > fstatfs() is just an example that may be a good fit for fs monitoring > applications we can add the error state in f_spare space, but we can > also create a dedicated API for polling for errors. That would be an option. But f_spare is only 4 words long. That isn't enough if we want to report the errors that occurred. I think a new api should report the specific inodes that had a failed writeback. -- Gabriel Krisman Bertazi