All of lore.kernel.org
 help / color / mirror / Atom feed
From: NeilBrown <neilb@suse.com>
To: Chuck Lever <chuck.lever@oracle.com>
Cc: Jeff Layton <jlayton@kernel.org>,
	Bruce Fields <bfields@fieldses.org>,
	Joshua Watt <jpewhacker@gmail.com>,
	Linux NFS Mailing List <linux-nfs@vger.kernel.org>
Subject: Re: NFS Force Unmounting
Date: Thu, 02 Nov 2017 11:15:43 +1100	[thread overview]
Message-ID: <87bmklv8ls.fsf@notabene.neil.brown.name> (raw)
In-Reply-To: <8EB53737-9126-4D26-A22F-D09639BE5130@oracle.com>

[-- Attachment #1: Type: text/plain, Size: 12991 bytes --]

On Tue, Oct 31 2017, Chuck Lever wrote:

>> On Oct 31, 2017, at 8:53 PM, NeilBrown <neilb@suse.com> wrote:
>> 
>> On Tue, Oct 31 2017, Jeff Layton wrote:
>> 
>>> On Tue, 2017-10-31 at 08:09 +1100, NeilBrown wrote:
>>>> On Mon, Oct 30 2017, J. Bruce Fields wrote:
>>>> 
>>>>> On Wed, Oct 25, 2017 at 12:11:46PM -0500, Joshua Watt wrote:
>>>>>> I'm working on a networking embedded system where NFS servers can come
>>>>>> and go from the network, and I've discovered that the Kernel NFS server
>>>>> 
>>>>> For "Kernel NFS server", I think you mean "Kernel NFS client".
>>>>> 
>>>>>> make it difficult to cleanup applications in a timely manner when the
>>>>>> server disappears (and yes, I am mounting with "soft" and relatively
>>>>>> short timeouts). I currently have a user space mechanism that can
>>>>>> quickly detect when the server disappears, and does a umount() with the
>>>>>> MNT_FORCE and MNT_DETACH flags. Using MNT_DETACH prevents new accesses
>>>>>> to files on the defunct remote server, and I have traced through the
>>>>>> code to see that MNT_FORCE does indeed cancel any current RPC tasks
>>>>>> with -EIO. However, this isn't sufficient for my use case because if a
>>>>>> user space application isn't currently waiting on an RCP task that gets
>>>>>> canceled, it will have to timeout again before it detects the
>>>>>> disconnect. For example, if a simple client is copying a file from the
>>>>>> NFS server, and happens to not be waiting on the RPC task in the read()
>>>>>> call when umount() occurs, it will be none the wiser and loop around to
>>>>>> call read() again, which must then try the whole NFS timeout + recovery
>>>>>> before the failure is detected. If a client is more complex and has a
>>>>>> lot of open file descriptor, it will typical have to wait for each one
>>>>>> to timeout, leading to very long delays.
>>>>>> 
>>>>>> The (naive?) solution seems to be to add some flag in either the NFS
>>>>>> client or the RPC client that gets set in nfs_umount_begin(). This
>>>>>> would cause all subsequent operations to fail with an error code
>>>>>> instead of having to be queued as an RPC task and the and then timing
>>>>>> out. In our example client, the application would then get the -EIO
>>>>>> immediately on the next (and all subsequent) read() calls.
>>>>>> 
>>>>>> There does seem to be some precedence for doing this (especially with
>>>>>> network file systems), as both cifs (CifsExiting) and ceph
>>>>>> (CEPH_MOUNT_SHUTDOWN) appear to implement this behavior (at least from
>>>>>> looking at the code. I haven't verified runtime behavior).
>>>>>> 
>>>>>> Are there any pitfalls I'm oversimplifying?
>>>>> 
>>>>> I don't know.
>>>>> 
>>>>> In the hard case I don't think you'd want to do something like
>>>>> this--applications expect mounts to be stay pinned while they're using
>>>>> them, not to get -EIO.  In the soft case maybe an exception like this
>>>>> makes sense.
>>>> 
>>>> Applications also expect to get responses to read() requests, and expect
>>>> fsync() to complete, but if the servers has melted down, that isn't
>>>> going to happen.  Sometimes unexpected errors are better than unexpected
>>>> infinite delays.
>>>> 
>>>> I think we need a reliable way to unmount an NFS filesystem mounted from
>>>> a non-responsive server.  Maybe that just means fixing all the places
>>>> where use we use TASK_UNINTERRUTIBLE when waiting for the server.  That
>>>> would allow processes accessing the filesystem to be killed.  I don't
>>>> know if that would meet Joshua's needs.
>>>> 
>>>> Last time this came up, Trond didn't want to make MNT_FORCE too strong as
>>>> it only makes sense to be forceful on the final unmount, and we cannot
>>>> know if this is the "final" unmount (no other bind-mounts around) until
>>>> much later than ->umount_prepare.  Maybe umount is the wrong interface.
>>>> Maybe we should expose "struct nfs_client" (or maybe "struct
>>>> nfs_server") objects via sysfs so they can be marked "dead" (or similar)
>>>> meaning that all IO should fail.
>>>> 
>>> 
>>> I like this idea.
>>> 
>>> Note that we already have some per-rpc_xprt / per-rpc_clnt info in
>>> debugfs sunrpc dir. We could make some writable files in there, to allow
>>> you to kill off individual RPCs or maybe mark a whole clnt and/or xprt
>>> dead in some fashion.
>>> 
>>> I don't really have a good feel for what this interface should look like
>>> yet. debugfs is attractive here, as it's supposedly not part of the
>>> kernel ABI guarantee. That allows us to do some experimentation in this
>>> area, without making too big an initial commitment.
>> 
>> debugfs might be attractive to kernel developers: "all care but not
>> responsibility", but not so much to application developers (though I do
>> realize that your approch was "something to experiment with" so maybe
>> that doesn't matter).
>
> I read Jeff's suggestion as "start in debugfs and move to /sys
> with the other long-term administrative interfaces". <shrug>
>
>
>> My particular focus is to make systemd shutdown completely reliable.
>
> In particular: umount.nfs has to be reliable, and/or stuck NFS
> mounts have to avoid impacting other aspects of system
> operation (like syncing other filesystems).
>
>
>> It should not block indefinitely on any condition, including inaccessible
>> servers and broken networks.
>
> There are occasions where a "hard" semantic is appropriate,
> and killing everything unconditionally can result in unexpected
> and unwanted consequences. I would strongly object to any
> approach that includes automatically discarding data without
> user/administrator choice in the matter. One size does not fit
> all here.

Unix has always had a shutdown sequence that sends SIGTERM to all
processes, then waits a while, then sends SIGKILL.  If those processes
had data in memory which had not yet been written to storage, then that
process automatically discards data.
I don't see an important difference between that, and purging
the cache of filesystems which cannot write out to storage.
Just like with SIGTERM, we first trigger a sync() and give it a
reasonable chance to make progress (ideally monitoring the progress
somehow so we know when it completes, or when it stalls).  But
if sync isn't making progress, and if the  sysadmin has requested a
system shutdown, then I think it is entirely appropriate to use a bigger
hammer.

>
> At least let's stop and think about consequences. I'm sure I
> don't understand all of them yet.
>
>
>> In stark contrast to Chuck's suggestion that
>> 
>> 
>>   Any RPC that might alter cached data/metadata is not, but others
>>   would be safe.
>> 
>> ("safe" here meaning "safe to kill the RPC"), I think that everything
>> can and should be killed.  Maybe the first step is to purge any dirty
>> pages from the cache.
>> - the server is up, we write the data
>> - if we are happy to wait, we wait
>> - otherwise (the case I'm interested in), we just destroy anything
>>  that gets in the way of unmounting the filesystem.
>
> (The technical issue still to be resolved is how to kill
> processes that are sleeping uninterruptibly, but for the
> moment let's assume we can do that, and think about the
> policy questions).
>
> How do you decide the server is "up" without possibly hanging
> or human intervention? Certainly there is a point where we
> want to scorch the earth, but I think the user and administrator
> get to decide where that is. systemd is not the place for that
> decision.

When I tell the system to shutdown, I want it to do that.  No ifs or
buts or maybes.  I don't expect it to be instant (though I expect
"poweroff -f -n" to be jolly close), but do expect it to be prompt.

>
> Actually, I think that dividing the RPC world into "safe to
> kill" and "need to ask first" is roughly the same as the
> steps you outline above: at some point we both eventually get
> to kill_all. The question is how to get there allowing as much
> automation as possible and without compromising data integrity.

Once upon a time there was an NFS implementation which had a "spongy"
mount option, that was meant to be a compromise between "soft"
and "hard".

http://uw714doc.sco.com/en/FS_manager/nfsD.nfsopt.html

I don't know why it didn't catch on, but I suspect because the question
of whether or not it is "safe" to abort an NFS operation doesn't
actually depend on the operation itself, but depends on the use that the
result will be put to, and on the care put into error handling in the
application code.

So I don't think we can meaningfully draw that line (tempting though it
is).  Either the NFS server is working, and we wait for it, or we give
up waiting and cancel everything equally.

>
> There are RPCs that are always safe to kill, eg NFS READ and
> GETATTR. If those are the only waiters, then they can always be
> terminated on umount. That is already a good start at making
> NFSv3 umount more reliable, since often the only thing it is
> waiting for is a single GETATTR.
>
> Question marks arise when we are dealing with WRITE, SETATTR,
> and so on, when we know the server is still there somewhere,
> and even when we're not sure whether the server is still
> available. It is here where we assess our satisfaction for
> waiting out a network partition or server restart.
>
> There's no way to automate that safely, unless you state in
> advance that "your data is not protected during an umount."
> There are some environments where that is OK, and some where
> it is absolute disaster. Again, the user and administrator get
> to make that choice, IMO. Maybe a new mount option?
>
> Data integrity is critical up until some point where it isn't.
> A container is no longer needed, all the data it cared about
> can be discarded. I think that line needs to be drawn while
> the system is still operational. It's not akin to umount at
> all, since it involves possible destruction of data. It's more
> like TRIM.
>
>
>> I'd also like to make the interface completely generic.  I'd rather
>> systemd didn't need to know any specific details about nfs (it already
>> does to some extend - it knows it is a "remote" filesystem) but
>> I'd rather not require more.
>
>> Maybe I could just sweep the problem under the carpet and use lazy
>> unmounts.  That hides some of the problem, but doesn't stop sync(2) from
>> blocking indefinitely.  And once you have done the lazy unmount, there
>> is no longer any opportunity to use MNT_FORCE.
>
> IMO a partial answer could be data caching in local files. If
> the client can't flush, then it can preserve the files until
> after the umount and reboot (using, say, fscache). Multi-client
> sharing is still hazardous, but that isn't a very frequent use
> case.

What data is it, exactly, that we are worried about here?
Data that an application has written, but that it hasn't called fsync()
on?  Do it isn't really all that important.  It might just be scratch
data.  It might be event logs.  It certainly isn't committed database
data, or an incoming email message, or data saved by an editor, or
really anything else important.
It is data that would be lost if you kicked the powerplug out by
mistake.
It is data that we would rather save if we could, but data that is not
worth bending over backwards to keep a copy of in a non-standard
location just in case someone really cares.

That's how I see it anyway.

Thanks,
NeilBrown


>
>
>> Another way to think about this is to consider the bdi rather than the
>> mount point.  If the NFS server is never coming back, then the "backing
>> device" is broken.  If /sys/class/bdi/* contained suitable information
>> to identify the right backing device, and had some way to "terminate
>> with extreme prejudice", then and admin process (like systemd or
>> anything else) could choose to terminate a bdi that was not working
>> properly.
>> 
>> We would need quite a bit of integration so that this "terminate"
>> command would take effect, cause various syscalls to return EIO, purge
>> dirty memory, avoid stalling sync().  But it hopefully it would be
>> a well defined interface and a good starting point.
>
> Unhooking the NFS filesystem's "sync" method might be helpful,
> though, to let the system preserve other filesystems before
> shutdown. The current situation can indeed result in local
> data corruption, and should be considered a bug IMO.
>
>
>> If the bdi provided more information and more control, it would be a lot
>> safer to use lazy unmounts, as we could then work with the filesystem
>> even after it had been unmounted.
>> 
>> Maybe I'll trying playing with bdis in my spare time (if I ever find out
>> what "spare time" is).
>> 
>> Thanks,
>> NeilBrown
>
> --
> Chuck Lever

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]

  parent reply	other threads:[~2017-11-02  0:15 UTC|newest]

Thread overview: 36+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-10-25 17:11 NFS Force Unmounting Joshua Watt
2017-10-30 20:20 ` J. Bruce Fields
2017-10-30 21:04   ` Joshua Watt
2017-10-30 21:09   ` NeilBrown
2017-10-31 14:41     ` Jeff Layton
2017-10-31 14:55       ` Chuck Lever
2017-10-31 17:04         ` Joshua Watt
2017-10-31 19:46           ` Chuck Lever
2017-11-01  0:53       ` NeilBrown
2017-11-01  2:22         ` Chuck Lever
2017-11-01 14:38           ` Joshua Watt
2017-11-02  0:15           ` NeilBrown [this message]
2017-11-02 19:46             ` Chuck Lever
2017-11-02 21:51               ` NeilBrown
2017-11-01 17:24     ` Jeff Layton
2017-11-01 23:13       ` NeilBrown
2017-11-02 12:09         ` Jeff Layton
2017-11-02 14:54           ` Joshua Watt
2017-11-08  3:30             ` NeilBrown
2017-11-08 12:08               ` Jeff Layton
2017-11-08 15:52                 ` J. Bruce Fields
2017-11-08 22:34                   ` NeilBrown
2017-11-08 23:52                     ` Trond Myklebust
2017-11-09 19:48                       ` Joshua Watt
2017-11-10  0:16                         ` NeilBrown
2017-11-08 14:59             ` [RFC 0/4] " Joshua Watt
2017-11-08 14:59               ` [RFC 1/4] SUNRPC: Add flag to kill new tasks Joshua Watt
2017-11-10  1:39                 ` NeilBrown
2017-11-08 14:59               ` [RFC 2/4] SUNRPC: Kill client tasks from debugfs Joshua Watt
2017-11-10  1:47                 ` NeilBrown
2017-11-10 14:13                   ` Joshua Watt
2017-11-08 14:59               ` [RFC 3/4] SUNRPC: Simplify client shutdown Joshua Watt
2017-11-10  1:50                 ` NeilBrown
2017-11-08 14:59               ` [RFC 4/4] NFS: Add forcekill mount option Joshua Watt
2017-11-10  2:01                 ` NeilBrown
2017-11-10 14:16                   ` Joshua Watt

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87bmklv8ls.fsf@notabene.neil.brown.name \
    --to=neilb@suse.com \
    --cc=bfields@fieldses.org \
    --cc=chuck.lever@oracle.com \
    --cc=jlayton@kernel.org \
    --cc=jpewhacker@gmail.com \
    --cc=linux-nfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.