Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.5 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 643BAC67863 for ; Wed, 24 Oct 2018 11:09:36 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 0DE5120824 for ; Wed, 24 Oct 2018 11:09:35 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="2oK2DxX3" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0DE5120824 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726428AbeJXThP (ORCPT ); Wed, 24 Oct 2018 15:37:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:33272 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726426AbeJXThP (ORCPT ); Wed, 24 Oct 2018 15:37:15 -0400 Received: from tleilax.poochiereds.net (cpe-71-70-156-158.nc.res.rr.com [71.70.156.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 02D0320824; Wed, 24 Oct 2018 11:09:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1540379373; bh=PT84j2+Vcv169NzWi8IWR/2HqcuCK4vacd4r8zFBUEc=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=2oK2DxX3o3IdR7+KtHzRVqPYtRl2LMeMzgnxllLMjs+549r7X9TUaKyiceNvqdpHG bj1fVr05yaBx8W6/KAHSm9U4JRwvZuE3EMoSBIgtk6oYAGDRRljvGg3E1VsoP7CR9K khtNeriHNClECY6GQfYeW0UzCdSgWtu1M6QICejM= Message-ID: <0b8e3d09268821c286fa3ed58994e325de79ba0f.camel@kernel.org> Subject: Re: [PATCH v1 01/11] fs: Don't copy beyond the end of the file From: Jeff Layton To: Olga Kornievskaia Cc: Trond Myklebust , Anna Schumaker , linux-nfs Date: Wed, 24 Oct 2018 07:09:31 -0400 In-Reply-To: References: <20181019152932.32462-1-olga.kornievskaia@gmail.com> <20181019152932.32462-2-olga.kornievskaia@gmail.com> <1c269f7a09c24638ed3105b1fc934ca2c25383c9.camel@kernel.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 (3.28.5-1.fc28) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Tue, 2018-10-23 at 12:50 -0400, Olga Kornievskaia wrote: > On Mon, Oct 22, 2018 at 7:23 PM Jeff Layton wrote: > > > > On Mon, 2018-10-22 at 14:32 -0400, Olga Kornievskaia wrote: > > > On Sun, Oct 21, 2018 at 10:29 AM Jeff Layton wrote: > > > > > > > > On Fri, 2018-10-19 at 11:29 -0400, Olga Kornievskaia wrote: > > > > > From: Anna Schumaker > > > > > > > > > > Signed-off-by: Anna Schumaker > > > > > --- > > > > > fs/read_write.c | 3 +++ > > > > > 1 file changed, 3 insertions(+) > > > > > > > > > > diff --git a/fs/read_write.c b/fs/read_write.c > > > > > index 39b4a21..c60790f 100644 > > > > > --- a/fs/read_write.c > > > > > +++ b/fs/read_write.c > > > > > @@ -1570,6 +1570,9 @@ ssize_t vfs_copy_file_range(struct file *file_in, loff_t pos_in, > > > > > if (unlikely(ret)) > > > > > return ret; > > > > > > > > > > + if (pos_in >= i_size_read(inode_in)) > > > > > + return -EINVAL; > > > > > + > > > > > if (!(file_in->f_mode & FMODE_READ) || > > > > > !(file_out->f_mode & FMODE_WRITE) || > > > > > (file_out->f_flags & O_APPEND)) > > > > > > > > The patch description could use a bit more fleshing-out. The > > > > copy_file_range manpage says: > > > > > > > > EINVAL Requested range extends beyond the end of the source file; or the flags argument is not 0. > > > > > > > > So I guess this is intended to satisfy that requirement? > > > > > > I agree the description of the patch is poor. It sort of falls under > > > the the man page's description of range beyond the end of the source > > > file. But in NFSv4.2, there is an explicit wording for the validity of > > > the input parameters and having an input source offset that's beyond > > > the end of the file is what this patch is attempting to check. > > > > > > > Side note: > > > > One has to wonder why they decided to make that an -EINVAL condition? > > To me that sounds like a correct use of -EINVAL error to check for > invalid arguments. > > You can argue that since there were no bytes to copy then returning 0 > would be an appropriate "size" of the copy. However, I would argue how > would a caller distinguish this 0 size which really means don't try to > copy more vs another case when copy_file_range() returned less byte > (0) and so that caller should loop to get the rest. > I don't know -- it seems to run contrary to how read(2) and write(2) work with an EOF condition. I don't see why the implementation wouldn't want to just copy what you can up to the EOF of the source file. Maybe I need to go back and review the discussion from when the syscall was merged... > > The system call returns ssize_t. Why not just return a fewer number of > > bytes in that situation? > > > > In fact, the RETURN VALUE section of the manpage says: > > > > Upon successful completion, copy_file_range() will return the number of > > bytes copied between files. This could be less than the length origiā€ > > nally requested. > > > > Under what conditions would that occur that do not include the file > > being shorter than the range you wanted to copy? > > > > I wonder if we ought to lobby to get that changed. > > Do you mean ask NFSv4.2 spec to be changed? I thought that's stuff is > "written in stone". > No, I meant the copy_file_range spec (such as it is). I guess the v4.2 spec has this though: If the source offset or the source offset plus count is greater than the size of the source file, the operation MUST fail with NFS4ERR_INVAL. I wonder if you'd be better off not trying to enforce this on the client and simply let the server return NFS4ERR_INVAL if we're beyond EOF on the source? That way it doesn't matter whether the client's attr cache is up to date or not. > > > > > > If so, > > > > i_size_read is just going to return whatever is in inode->isize. > > > > Could a copy_file_range call end up getting issued to copy from a file > > > > that is already open on a range that it doesn't know about yet? i.e. > > > > where the inode cache has not yet been updated. > > > > > > I thought that with NFSv4 cache consistency, the inode->isize is > > > accurate. If previous open had a read delegation, any modification on > > > a server would trigger a CB_RECALL and the open for the copy offload > > > would retrieve the latest size. In case of no delegations, the open > > > retrieves the latest size and the call to copy_file_range() would have > > > an update size. > > > > > > It seems like that could on network filesystems (like NFS). Would this > > > > be better handled in ->copy_file_range instead, where the driver could > > > > make a better determination of the file size? > > > > > > I'm not opposed to moving the size check into the NFS's copy_file_size > > > (again in my opinion NFS attribute cache has the same file size as the > > > inode's size). I think the thought was that such check should be done > > > at the VFS layer as oppose to doing it by each of the file systems. > > > > > > > > > > The attribute cache is not revalidated before the i_size is fetched with > > i_size_read. You're just reading what happens to be in the in-memory > > inode structure. So both clients have the file open already, and neither > > has a delegation: > > > > client 1: fetches attributes from file and sees a size of 1000 > > client 2: writes 20 bytes at offset 1000 > > client 1: calls copy file range to copy 1020 bytes starting at offset 0 > > > > If client1 didn't get an attribute update before the copy_file_range > > call came in, then it would still think the size was 1000 and fail the > > operation. It may even be many seconds before client1 sees the updated > > size. > > > > You could argue that we're not using locking here so you're just subject > > to normal open-to-close cache coherency behavior, but that's rather "not > > nice". > > Yes I would argue that locking needs to be used. In case your > describing it is impossible to get an accurate file size. Even if the > client issues a GETATTR there is nothing prevents another client from > changing it right after that GETATTR was already replied to. > > What nfscopy application does is it opens then file and then locks it > (as suggested by the spec), then calls the copy_file_range() system > call. You can argue (if we didn't get a delegation) that a file might > have been changed between the reply to the OPEN and the LOCK operation > and therefore, we should send another GETATTR just in case. To guard > against that, I can add a getattr call though I think it's an overkill > specially since linux server always grants us a read delegation. > The spec does say you might need to lock the files but they don't say you SHOULD, only that servers need to be able to deal with lock stateids. hat said, you have a good point. We're not violating anything by not revalidating the cache beforehand. Maybe we don't need to do this after all. Personally, I think this would be best enforced by the NFS server. Just fire off the COPY request as-is and let the server vet the lengths. Side note: a delegation is never guaranteed. knfsd won't grant one if the inode falls afoul of the bloom filter, for instance, and that can easily happen if (for example) there is a hash collision between different inodes. > > I think we probably ought to also push this check down into the > > filesystem operations as well, and have copy_file_range ensure that the > > attribute cache is updated. We're dealing with copy offload here so > > doing an extra GETATTR beforehand shouldn't be terribly costly. > > -- > > Jeff Layton -- Jeff Layton