You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If a process issuing a FUSE filesystem request is interrupted, the following will happen:
If the request is not yet sent to userspace AND the signal is fatal (SIGKILL or unhandled fatal signal), then the request is dequeued and returns immediately.
If the request is not yet sent to userspace AND the signal is not fatal, then an interrupted flag is set for the request. When the request has been successfully transferred to userspace and this flag is set, an INTERRUPT request is queued.
If the request is already sent to userspace, then an INTERRUPT request is queued.
The InterruptOp is being handled and cancels the operation
Others, such as Docker and Gitea, have solved this by filtering out the SIGURG as referenced in golang/go#37942 . However as far as I can tell there's no option to ignore the SIGURG since it's FUSE which is handling them, and by the time it reaches this library as an interrupt the context is lost.
Our current workaround is to set GODEBUG="asyncpreemptoff=1" for the applications which use gcsfuse mounts.
Whilst the issue is happening whilst using gcsfuse I think the solution lies in this package but please let me know if that's not right. Happy to create a PR for this but I'm not entirely sure how to solve it. Can you think of any solutions for this as it seems like more people are running into this issue: GoogleCloudPlatform/gcsfuse#288GoogleCloudPlatform/gcsfuse#562 ?
The text was updated successfully, but these errors were encountered:
I’m not sure yet I fully understand the issue, though. It sounds like the problem is in the Linux kernel, when the SIGURG signal is received while the program is in a syscall that works with a FUSE file system.
I would assume that the process’s signal mask should be respected by the kernel here, so if you ignore SIGURG in your program, the kernel wouldn’t interrupt?
Either way, do you have an easy way to reproduce this issue? Perhaps with one of the example libfuse file systems, and a minimal Go program that triggers the issue?
I suspect what is happening:
A Go application accesses the mount
The application raises
SIGURG
signals due to a Go feature introduced in 1.14 for non-cooperative goroutine preemptionFUSE handles the signal and raises an INTERRUPT:
The
InterruptOp
is being handled and cancels the operationThis cancels the context which is passed to the HTTP request to GCS resulting in errors such as:
Others, such as Docker and Gitea, have solved this by filtering out the
SIGURG
as referenced in golang/go#37942 . However as far as I can tell there's no option to ignore theSIGURG
since it's FUSE which is handling them, and by the time it reaches this library as an interrupt the context is lost.Our current workaround is to set
GODEBUG="asyncpreemptoff=1"
for the applications which usegcsfuse
mounts.Whilst the issue is happening whilst using
gcsfuse
I think the solution lies in this package but please let me know if that's not right. Happy to create a PR for this but I'm not entirely sure how to solve it. Can you think of any solutions for this as it seems like more people are running into this issue: GoogleCloudPlatform/gcsfuse#288 GoogleCloudPlatform/gcsfuse#562 ?The text was updated successfully, but these errors were encountered: