Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp3718411pxy; Mon, 26 Apr 2021 08:12:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqrO3VlTm9zw/mfk17kmRnO9GHC+RUuQCpzgikYdoGlvWbKIw7dueGPlmLsOBLn88zTgHk X-Received: by 2002:a05:6402:17a8:: with SMTP id j8mr21769707edy.43.1619449934281; Mon, 26 Apr 2021 08:12:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619449934; cv=none; d=google.com; s=arc-20160816; b=02pj55mmr7bd0Q67lzkSnJwkwifKbOENPV0uR5OZcRbdSMsl4ZmTbf2vFXxZqicscn p3cPqls9oky++K5cau73Xnooh0od9EcVsLhrNZXZDzmP6ovn5QIB9FsfyXFPhgTW+/mX U9wQP9YXkJ0A4chh7fTjXH47JZMRqEw4MIfCsiny2DKe0T4OyhbJljdQWUHfGsD8fBbS wV8sFSzEH4Sff+9rzOfl3BCGMpNCKl+iFX6eew9cLCrtK9gA/VmjrjC4TRwbEyIj1Ed/ PGUJku6OXnoWbrLMHuy3al2bPqGo9jRXg4q08sOlblHmup2mZNAvcdfgQA5FxUlgDBFO BwuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=xcrg+mwVtPfEOG6L/UC+9sJ0yIsapzZ2Tays7xNZIyk=; b=0GJffLHv23kje6JpbX0fYEsg3c8Xn/ev7eq6ziZtQnbl2QmUN4ldqZV66i0qXVaw9n oXiBPg/Pz//W/4vkzKjBpMCDm1I85sOGz5RF4KM/XzWdDZZNYr/UF0e4sGeOmYWtwMZz CW3+FT1i6CcpilgfrI/p+nDAvhqjfxlttolWpOmKT8o08DAlKlUkNlxmA3S4rr92xzok LMQsDEfW8AQKZDZfUAnDF4sluRYH1DKmLyVopWCgA5HrMqJkqLpZJDa7DL5Mv0kS9hFE fdBuf/yz0GAp2QfnaYI90A/eQMDeGjarmX5LSmOeZF6OIHMiyxnIWCRJB+TU3ltDoQMy L7Dw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d6si65814edz.514.2021.04.26.08.11.51; Mon, 26 Apr 2021 08:12:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234044AbhDZPLV convert rfc822-to-8bit (ORCPT + 99 others); Mon, 26 Apr 2021 11:11:21 -0400 Received: from us-smtp-delivery-44.mimecast.com ([207.211.30.44]:36779 "EHLO us-smtp-delivery-44.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233978AbhDZPLR (ORCPT ); Mon, 26 Apr 2021 11:11:17 -0400 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-283-obd3W_4uOXievqI3B6206g-1; Mon, 26 Apr 2021 11:10:30 -0400 X-MC-Unique: obd3W_4uOXievqI3B6206g-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id C37DD6D24E; Mon, 26 Apr 2021 15:10:28 +0000 (UTC) Received: from bahia.redhat.com (ovpn-113-148.ams2.redhat.com [10.36.113.148]) by smtp.corp.redhat.com (Postfix) with ESMTP id D12745D6BA; Mon, 26 Apr 2021 15:10:12 +0000 (UTC) From: Greg Kurz To: Miklos Szeredi Cc: Vivek Goyal , virtualization@lists.linux-foundation.org, Stefan Hajnoczi , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, virtio-fs@redhat.com, Greg Kurz , Robert Krawitz Subject: [PATCH v2] virtiofs: propagate sync() to file server Date: Mon, 26 Apr 2021 17:10:11 +0200 Message-Id: <20210426151011.840459-1-groug@kaod.org> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=groug@kaod.org X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: kaod.org Content-Transfer-Encoding: 8BIT Content-Type: text/plain; charset=WINDOWS-1252 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Even if POSIX doesn't mandate it, linux users legitimately expect sync() to flush all data and metadata to physical storage when it is located on the same system. This isn't happening with virtiofs though : sync() inside the guest returns right away even though data still needs to be flushed from the host page cache. This is easily demonstrated by doing the following in the guest: $ dd if=/dev/zero of=/mnt/foo bs=1M count=5K ; strace -T -e sync sync 5120+0 records in 5120+0 records out 5368709120 bytes (5.4 GB, 5.0 GiB) copied, 5.22224 s, 1.0 GB/s sync() = 0 <0.024068> +++ exited with 0 +++ and start the following in the host when the 'dd' command completes in the guest: $ strace -T -e fsync /usr/bin/sync virtiofs/foo fsync(3) = 0 <10.371640> +++ exited with 0 +++ There are no good reasons not to honor the expected behavior of sync() actually : it gives an unrealistic impression that virtiofs is super fast and that data has safely landed on HW, which isn't the case obviously. Implement a ->sync_fs() superblock operation that sends a new FUSE_SYNC request type for this purpose. Provision a 64-bit flags field for possible future extensions. Since the file server cannot handle the wait == 0 case, we skip it to avoid a gratuitous roundtrip. Like with FUSE_FSYNC and FUSE_FSYNCDIR, lack of support for FUSE_SYNC in the file server is treated as permanent success. This ensures compatibility with older file servers : the client will get the current behavior of sync() not being propagated to the file server. Note that such an operation allows the file server to DoS sync(). Since a typical FUSE file server is an untrusted piece of software running in userspace, this is disabled by default. Only enable it with virtiofs for now since virtiofsd is supposedly trusted by the guest kernel. Reported-by: Robert Krawitz Signed-off-by: Greg Kurz --- v2: - clarify compatibility with older servers in changelog (Vivek) - ignore the wait == 0 case (Miklos) - 64-bit aligned argument structure (Vivek, Miklos) fs/fuse/fuse_i.h | 3 +++ fs/fuse/inode.c | 35 +++++++++++++++++++++++++++++++++++ fs/fuse/virtio_fs.c | 1 + include/uapi/linux/fuse.h | 10 +++++++++- 4 files changed, 48 insertions(+), 1 deletion(-) diff --git a/fs/fuse/fuse_i.h b/fs/fuse/fuse_i.h index 63d97a15ffde..68e9ae96cbd4 100644 --- a/fs/fuse/fuse_i.h +++ b/fs/fuse/fuse_i.h @@ -755,6 +755,9 @@ struct fuse_conn { /* Auto-mount submounts announced by the server */ unsigned int auto_submounts:1; + /* Propagate syncfs() to server */ + unsigned int sync_fs:1; + /** The number of requests waiting for completion */ atomic_t num_waiting; diff --git a/fs/fuse/inode.c b/fs/fuse/inode.c index b0e18b470e91..ac184069b40f 100644 --- a/fs/fuse/inode.c +++ b/fs/fuse/inode.c @@ -506,6 +506,40 @@ static int fuse_statfs(struct dentry *dentry, struct kstatfs *buf) return err; } +static int fuse_sync_fs(struct super_block *sb, int wait) +{ + struct fuse_mount *fm = get_fuse_mount_super(sb); + struct fuse_conn *fc = fm->fc; + struct fuse_syncfs_in inarg; + FUSE_ARGS(args); + int err; + + /* + * Userspace cannot handle the wait == 0 case. Avoid a + * gratuitous roundtrip. + */ + if (!wait) + return 0; + + if (!fc->sync_fs) + return 0; + + memset(&inarg, 0, sizeof(inarg)); + args.in_numargs = 1; + args.in_args[0].size = sizeof(inarg); + args.in_args[0].value = &inarg; + args.opcode = FUSE_SYNCFS; + args.out_numargs = 0; + + err = fuse_simple_request(fm, &args); + if (err == -ENOSYS) { + fc->sync_fs = 0; + err = 0; + } + + return err; +} + enum { OPT_SOURCE, OPT_SUBTYPE, @@ -909,6 +943,7 @@ static const struct super_operations fuse_super_operations = { .put_super = fuse_put_super, .umount_begin = fuse_umount_begin, .statfs = fuse_statfs, + .sync_fs = fuse_sync_fs, .show_options = fuse_show_options, }; diff --git a/fs/fuse/virtio_fs.c b/fs/fuse/virtio_fs.c index 4ee6f734ba83..a3c025308743 100644 --- a/fs/fuse/virtio_fs.c +++ b/fs/fuse/virtio_fs.c @@ -1441,6 +1441,7 @@ static int virtio_fs_get_tree(struct fs_context *fsc) fc->release = fuse_free_conn; fc->delete_stale = true; fc->auto_submounts = true; + fc->sync_fs = true; fsc->s_fs_info = fm; sb = sget_fc(fsc, virtio_fs_test_super, set_anon_super_fc); diff --git a/include/uapi/linux/fuse.h b/include/uapi/linux/fuse.h index 54442612c48b..1265ca17620c 100644 --- a/include/uapi/linux/fuse.h +++ b/include/uapi/linux/fuse.h @@ -179,6 +179,9 @@ * 7.33 * - add FUSE_HANDLE_KILLPRIV_V2, FUSE_WRITE_KILL_SUIDGID, FATTR_KILL_SUIDGID * - add FUSE_OPEN_KILL_SUIDGID + * + * 7.34 + * - add FUSE_SYNCFS */ #ifndef _LINUX_FUSE_H @@ -214,7 +217,7 @@ #define FUSE_KERNEL_VERSION 7 /** Minor version number of this interface */ -#define FUSE_KERNEL_MINOR_VERSION 33 +#define FUSE_KERNEL_MINOR_VERSION 34 /** The node ID of the root inode */ #define FUSE_ROOT_ID 1 @@ -499,6 +502,7 @@ enum fuse_opcode { FUSE_COPY_FILE_RANGE = 47, FUSE_SETUPMAPPING = 48, FUSE_REMOVEMAPPING = 49, + FUSE_SYNCFS = 50, /* CUSE specific operations */ CUSE_INIT = 4096, @@ -957,4 +961,8 @@ struct fuse_removemapping_one { #define FUSE_REMOVEMAPPING_MAX_ENTRY \ (PAGE_SIZE / sizeof(struct fuse_removemapping_one)) +struct fuse_syncfs_in { + uint64_t flags; +}; + #endif /* _LINUX_FUSE_H */ -- 2.26.3