Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 06037C004D3 for ; Wed, 24 Oct 2018 11:17:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id B8A5E20824 for ; Wed, 24 Oct 2018 11:17:38 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B8A5E20824 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727000AbeJXTpU (ORCPT ); Wed, 24 Oct 2018 15:45:20 -0400 Received: from mail-qt1-f194.google.com ([209.85.160.194]:40030 "EHLO mail-qt1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727546AbeJXTpT (ORCPT ); Wed, 24 Oct 2018 15:45:19 -0400 Received: by mail-qt1-f194.google.com with SMTP id z9-v6so5183516qto.7 for ; Wed, 24 Oct 2018 04:17:36 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:mime-version:content-transfer-encoding; bh=DLWmG8o5323mMj5QJyJFk1vw7XXX/AK1Q0u256B8cGs=; b=UNzn3JNe8gssHesln566ehRM+0Ak6Ysfk+gAUILI7dDTPTri7WpSieJ6pWtMrrPNZt plDCKJN3HTMCyIdCxC1UsKRVFtjdmDQd8Mmqj6mzzgjH5LXm/HcX80B/En7et/kI+Sgm 5VsZufNwJSipc7BlYPveKF4VUHMI862zIns2i9LoLlM58L+FHu+6Xc8GxwdF2PMYwZuC DVANBcUztlw2bP9LzsDN5EygdVuWS4dhqutzsYaEB2WHdhAZdWbcahGB6Oa9FukrYHDu pmbZlp6XG07gvCD4ZfTZc3cTMgRKm8+H3qSi22+RE5kmQl91ztpz2cQOdxYctrpxPPsB jRUw== X-Gm-Message-State: AGRZ1gInjYh89iOI0IxNx8oHFOhofILYIdJ/zc+RLgpRl/WUfXBYWhtA 1wxSnJczhiag3wPsImPUFbrk+g== X-Google-Smtp-Source: AJdET5frGYEl569DtyXH9yggK5TJQe6xZEkAxv1FEkMRxHUCcn9pL6qJsYOmOQQEZqHsWQ8egU2JPQ== X-Received: by 2002:aed:3445:: with SMTP id w63-v6mr1933187qtd.346.1540379855976; Wed, 24 Oct 2018 04:17:35 -0700 (PDT) Received: from tleilax.poochiereds.net (cpe-2606-A000-1100-DB-0-0-0-43E.dyn6.twc.com. [2606:a000:1100:db::43e]) by smtp.gmail.com with ESMTPSA id o3-v6sm2825092qki.31.2018.10.24.04.17.34 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 24 Oct 2018 04:17:35 -0700 (PDT) Message-ID: <4f35382683c96f03a88c90f0a1fcced36f290d72.camel@redhat.com> Subject: Re: [PATCH v1 02/11] VFS permit cross device vfs_copy_file_range From: Jeff Layton To: Olga Kornievskaia , Amir Goldstein Cc: willy@infradead.org, viro@zeniv.linux.org.uk, linux-fsdevel@vger.kernel.org, linux-nfs , fweimer@redhat.com, Steve French , "Darrick J. Wong" , Christoph Hellwig , Linux API Date: Wed, 24 Oct 2018 07:17:33 -0400 In-Reply-To: References: <20181019153018.32507-1-olga.kornievskaia@gmail.com> <20181019153018.32507-2-olga.kornievskaia@gmail.com> <20181020040530.GG32577@ZenIV.linux.org.uk> <20181022190620.GA8863@bombadil.infradead.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 (3.28.5-1.fc28) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Tue, 2018-10-23 at 13:16 -0400, Olga Kornievskaia wrote: > On Tue, Oct 23, 2018 at 11:30 AM Olga Kornievskaia > wrote: > > > > On Tue, Oct 23, 2018 at 11:03 AM Olga Kornievskaia > > wrote: > > > > > > On Tue, Oct 23, 2018 at 2:05 AM Amir Goldstein wrote: > > > > > > > > On Tue, Oct 23, 2018 at 2:39 AM Jeff Layton wrote: > > > > > > > > > > On Mon, 2018-10-22 at 15:34 -0400, Olga Kornievskaia wrote: > > > > > > On Mon, Oct 22, 2018 at 3:06 PM Matthew Wilcox wrote: > > > > > > > > > > > > > > On Mon, Oct 22, 2018 at 02:45:04PM -0400, Olga Kornievskaia wrote: > > > > > > > > On Sat, Oct 20, 2018 at 4:54 AM Amir Goldstein wrote: > > > > > > > > > Another thing is the commit message claims to: > > > > > > > > > "Allow copy_file_range to copy between different superblocks but only > > > > > > > > > of the same file system types" > > > > > > > > > > > > > > > > > > But what the patch actually does is: > > > > > > > > > "Allow copy_file_range() syscall to copy between different filesystems > > > > > > > > > AND allow calling the filesystems' copy_file_range() method > > > > > > > > > between different superblocks but only of the same file system types" > > > > > > > > > > > > > > > > > > It's probably OK and quite useful to do the former, but maybe man page > > > > > > > > > should be fixed to explicitly mention that the copy is expected to work > > > > > > > > > across filesystems since kernel version XXX (?) > > > > > > > > > > > > > > > > > > If you don't wish to change cross filesystem type behavior and only > > > > > > > > > relax cross super block limitation, then you should replace the > > > > > > > > > same inode->i_sb check above with same inode->i_sb->s_type > > > > > > > > > check instead of doing the check only for calling the filesystem > > > > > > > > > copy_file_range() method. > > > > > > > > > > > > > > > > Thank you for the feedback. In the next version, I will remove the > > > > > > > > check for the functions and instead check for the same file system > > > > > > > > types. > > > > > > > > > > > > > > Jeff and I agree that this is the wrong way to go. Instead, the > > > > > > > cross-device check should be in the individual instances, not the top > > > > > > > level code. > > > > > > > > > > > > So remove the check all together for the VFS (that was my original > > > > > > patch to begin with (like #1 not this one). So am I missing the point > > > > > > again, I keep getting different corrections every time. > > > > > > > > > > Sorry if I wasn't clear before: > > > > > > > > > > Basically, I think Willy and I are both envisioning that some > > > > > copy_file_range implementations may eventually not be subject to the > > > > > limitations of the checks you're adding. > > > > > > > > > > > > > Yes. Eventually. And even Matthew is (quote) "dubious" about that ever > > > > happening. Changing the interface as Matthew proposed has a price > > > > and we need to compare this price to the alleged backporting price > > > > that nobody may ever need to pay. > > > > > > > > As far as I can tell, passing a struct file * on a file_operations method > > > > that does not belong to that filesystem in unprecedented (*) and is a far > > > > more lethal landmine than the alleged backporting landmine. > > > > > > > > (*) prior to v4.19-rc1, filesystems could get an overlayfs file, but > > > > file_inode(file) has always belonged to the filesystem. > > > > > > > > Olga, > > > > > > > > I do not strongly object to Matthew's proposal, so don't feel > > > > obligated to choose my side of the argument. I am just trying > > > > to offer a different perspective. > > > > > > > > In any case, my outstanding concerns with the patch are: > > > > > > > > 1. If you change syscall to support cross fs type copy (which is > > > > good IMO) need to document that in commit message > > > > and possibly follow up later with a note in man page > > > > > > > > 2. Commit message says: > > > > "This feature was of interest of ... NFS" > > > > "This feature is needed by NFSv4.2..." > > > > "NFS will allow for copies between different NFS servers." > > > > It is not clear to me if we are talking about present of future > > > > NFSv4.2 code. If NFSv4.2 currently does not support cross > > > > sb copy (??) than your patch need to enforce same sb > > > > in nfs4_copy_file_range(). If it does support cross sb copy > > > > than please edit the commit message to make that clear. > > > > > > I personally agree with Amir. I think it's far fetched that a file > > > system would know how to handle something that's not of its type. When > > > the copy_file_range() was checked in, there was a comment above the > > > superblock check saying "we might want to relax this in the future". > > > It deemed appropriate then to enforce the check since none of the file > > > systems used it. Now, the future is here, and we are removing the > > > check but proposing a different once because again the future isn't > > > here and having a single check simplifies the code. > > > > Sorry Ok I wrote this too fast. I think I'm changing my mind and > > siding with the check by the file system. > > The reason I think we should remove the check all together is we'd > allow the callers of copy_file_range() to utilize the > do_splice_direct() between file system types even when > copy_file_range() doesn't support cross fs copy. Isn't that > beneficial? Others might argue no, but I think it's good to have that option open. If the consensus is that we do need a check at the vfs layer to validate that the struct files come from the same fstype (as Amir suggests), then I can live with that. We've dealt with internal API changes before so we can do it again. Al is quite correct though that we really do want to compare fstypes rather than op pointers in that case however. > > > But I don't feel strongly about the check (or rather the location of > > > it VFS vs each FS) and what I ultimately need is to removed same sb > > > check. It sounds like if Amir isn't objecting, then the check for same > > > file system type should be removed from VFS. And, for each of the file > > > systems that currently support copy_file_range() -- CIFS, NFS, and > > > overlayfs -- I need to modify them and add a check for the same > > > fs_type. > > > > > > Amir to answer your question, only NFSv4.2 has copy_offload > > > functionality (not earlier NFS versions). Furthermore, existing > > > upstream only supports same sb copy offload. What this patch series > > > adds is support for copy offload across different superblocks but NFS > > > will not support (and would need a check) for copy offload across > > > different file system types. Also I kinda stand behind the ideas > > > stated: 1) this is of interest to NFS (where NFS here is to represent > > > a community, and CIFS is used to represent the other community). 2) > > > NFSv4.2 copy offload a specific feature that needs this functionality. > > > 3rd statement is bad. Only NFSv4.2 will allow copies between different > > > NFS servers (ie., after this patch +series), the emphasis was on "will > > > allow" meaning what this patch will allow to be done (ie, patch's > > > purpose). Or also, if the NFS server exports different exports, then a > > > copy between them (assuming exports of the same file system type). > > > > > > In the next version of the patch, I'll do my best to specified what > > > changed as the consequence of removing the cross sb check (ie, file > > > system types of the passed in file can be from different file > > > systems). I will add wording to the man page and add the suggested > > > wording to the "porting" file. -- Jeff Layton