Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S263770AbTKLPUk (ORCPT ); Wed, 12 Nov 2003 10:20:40 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263794AbTKLPUk (ORCPT ); Wed, 12 Nov 2003 10:20:40 -0500 Received: from 34.mufa.noln.chcgil24.dsl.att.net ([12.100.181.34]:27894 "EHLO tabby.cats.internal") by vger.kernel.org with ESMTP id S263770AbTKLPUe (ORCPT ); Wed, 12 Nov 2003 10:20:34 -0500 Content-Type: text/plain; charset="CP 1252" From: Jesse Pollard To: Albert Cahalan , linux-kernel mailing list Subject: Re: OT: why no file copy() libc/syscall ?? Date: Wed, 12 Nov 2003 09:19:53 -0600 X-Mailer: KMail [version 1.2] Cc: davide.rossetti@roma1.infn.it, filia@softhome.net, jesse@cats-chateau.net, dwmw2@infradead.org, moje@vabo.cz, kakadu_croc@yahoo.com References: <1068512710.722.161.camel@cube> In-Reply-To: <1068512710.722.161.camel@cube> MIME-Version: 1.0 Message-Id: <03111209195300.11900@tabby> Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6626 Lines: 185 On Monday 10 November 2003 19:05, Albert Cahalan wrote: > > It is too simple to implement in user mode. > > That works for a plain byte-stream on a > local UNIX-style filesystem. (though it > likely isn't the fastest) Yes - this was the local copy > It doesn't work for Macintosh files. > It's too slow for CIFS over a modem. > It doesn't work for Windows security data. > It doesn't allow copy-on-write files. > It eats CPU time on compressed filesystems. > > > The security context of the output depends > > on the user process. If it is a privileged > > process (ie, may change the context of the > > result) then the user process has to setup > > that context before the file is copied. > > So open the file, change context, and then: > > long copy_fd_to_file(int fd, const char *name, ...) Easy to do in user mode. > > (if you can no longer read from the OPEN fd, > either we override that or we just don't care > about such mostly-fictional cases) correct - If you can't read, fail. > > There are also some issues with mandatory > > security controls. If it is copied in kernel > > mode, then the previous labels could be > > automatically carried over to the resulting > > file... But that may not be what you want > > (and frequently, it isn't). > > If it matters: > > // security as if a new file were created > #define CF_REPLACE_SECURITY 0x00000001 > // if unable to replicate, up or down? > #define CF_ROUND_SECURITY_UP 0x00000002 > #define CF_ROUND_SECURITY_DOWN 0x00000004 > // fail if security can't be replicated > #define CF_SECURITY_EXACT 0x00000008 > > > Now back to the copy.. You don't have to > > use a read/write loop- mmap is faster. > > It's slower. (this is Linux, not SunOS) > Use a 4 kB or 8 kB read/write loop. yup local. > > And this is the other reason for not doing > > it in Kernel mode. Buffer management of > > this type is much easier in user space > > since the copy procedure doesn't have to > > deal with memory limitations, cache flushes > > page faulting of processes unrelated to the > > copy, but is related to cache pressure. > > Buffer management is very much a kernel thing. Yes it is, but do you want to push process dependant buffer management into the page management? It's just easier to do this in user mode, and allow the kernel to handle global page managment. > >> Is it? Please explain the simple steps which > >> cp(1) should take in order to observe that it > >> is being asked to duplicate a file on a file > >> system such as CIFS (or NFSv4?) which allows > >> the client to issue a 'copy file' command > >> over the network without actually transferring > >> the data twice, and to invoke such a command. > > > > Ah. That is an optimization question, not a > > question of kernel/user mode. > > Note that /bin/cp isn't always going to have > the necessary passwords and such. You're headed > down a path toward setuid /bin/cp. If cp doesn't have access to the proper security credentials, then the file should not be copied. > > Since the error checking for source and > > destination both include doing a stat and > > statfs, the device information (and FS info) > > can both be retrieved. > > > > And mmap doesn't require data transfer "twice" > > (local copy). > > Huh? Over the network from server to client > counts as once. Then /bin/cp gets the data. > Then it goes back over the network from the > client to the server. That's "twice". That's > horribly painful for a multi-gigabyte file > and a DSL or cable-modem connection, never > mind a dial-up connection. True for all networked file systems. I had ment to say (local filesystem copy). > > Since that copy only pagefaults (though > > read/write may be faster for some files > > - I thought that was true for small files > > that fit in cache, and large files faster > > via mmap and depends on the page size; > > and the tradeoff would be system dependant). > > Keep the read/write loop small for speed. yes. > > And since both source and destination may > > be remote you do get to decide based on > > source and destination devices: if they > > are the same, and one on a remote node, > > then BOTH will be on the remote, then you > > get to use the CIFS/NFS file copy. (check > > the doc on "stat/statfs" for additional info). > > > > I don't believe it works when source and > > destination are on DIFFERENT remote nodes, > > though. > > > > Strictly up to the implementation of cp/mv. > > > > Though you will loose portability of cp/mv. > > (Of course, you also loose it with a syscall > > for file copy too; as well as the MUCH more > > complicated implementation/security checks). > > Doing that in cp/mv is just insane. For one, > it bypasses any local security control over > access to the filesystem. There's not even a > way to be sure you're dealing with the server > you think you're dealing with. It shouldn't matter - first the source file must be opened for read AND the destination file opened for write. This should give the proper local security evaluation and context for the copy. Once this has been approved, the remote copy request can be made (provided they are on the same "networked" device). Just making the request still doesn't mean that it will succeed - after all, the final security decisions are made by the remote server implementing the file copy. Though if the copy is valid locally, then the use of the filesystem supported copy should work. It is an equivalent operation, it just all takes place on the server. Identity of the server is irrelevent, as long as it is the same server (or farm) for both source and destination. If the remote file copy is defined, then it should work even when the actual source and destination are different physical machines - the remote filesystem CLAIMS it will work (identical is determined from the "device" mounted, one mount, one device as far as network filesystems go). And if they are not identical then you fall back to using a local copy. All bets are off if the local pathnames are required by the remote server. That is silly. How would a networked client even know what the pathname would be? The parameters should be the two file handles passed to the remote filesystem. Personally, I don't think any changes should be made. It's just that this level of transfer is what the original poster was talking about. It just shouldn't be done in kernel mode. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/