lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAOQ4uxi7X_Ge14Ek_BR=es8mLYbkM3vMOJE5+_Doon1OD5p0yA@mail.gmail.com>
Date:   Tue, 9 Apr 2019 21:01:54 +0300
From:   Amir Goldstein <amir73il@...il.com>
To:     Jan Kara <jack@...e.cz>
Cc:     Dave Chinner <david@...morbit.com>,
        Al Viro <viro@...iv.linux.org.uk>,
        linux-fsdevel <linux-fsdevel@...r.kernel.org>,
        linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] fs/sync.c: sync_file_range(2) may use WB_SYNC_ALL writeback

On Tue, Apr 9, 2019 at 6:43 PM Jan Kara <jack@...e.cz> wrote:
>
> On Tue 09-04-19 14:49:22, Amir Goldstein wrote:
> > Commit 23d0127096cb ("fs/sync.c: make sync_file_range(2) use WB_SYNC_NONE
> > writeback") claims that sync_file_range(2) syscall was "created for
> > userspace to be able to issue background writeout and so waiting for
> > in-flight IO is undesirable there" and changes the writeback (back) to
> > WB_SYNC_NONE.
> >
> > This claim is only partially true. Is is true for users that use the flag
> > SYNC_FILE_RANGE_WRITE by itself, as does PostgreSQL, the user that was
> > the reason for changing to WB_SYNC_NONE writeback.
> >
> > However, that claim is not true for users that use that flag combination
> > SYNC_FILE_RANGE_{WAIT_BEFORE|WRITE|_WAIT_AFTER}.  Those users explicitly
> > requested to wait for in-flight IO as well as to writeback of dirty
> > pages.  sync_file_range(2) man page describes this flag combintaion as
> > "write-for-data-integrity operation", although some may argue against
> > this definition.
> >
> > Re-brand that flag combination as SYNC_FILE_RANGE_WRITE_AND_WAIT and use
> > the helper filemap_write_and_wait_range(), that uses WB_SYNC_ALL
> > writeback, to perform the range sync request.
> >
> > One intended use case for this API is creating a dependency between
> > a new file's content and its link into the namepsace without requiring
> > journal commit and flushing of disk volatile caches:
> >
> >   fd = open(".", O_TMPFILE | O_RDWR);
> >   write(fd, newdata, count);
> >   sync_file_range(fd, SYNC_FILE_RANGE_WRITE_AND_WAIT, 0, 0);
> >   linkat(AT_EMPTY_PATH, fd, AT_FDCWD, newfile);
> >
> > For many local filesystems, ext4 and xfs included, the sequence above
> > will guaranty that after crash, either 'newfile' exists with 'newdata'
> > content or 'newfile' does not exists.  For some applications, this
> > guaranty is strong enough and the effects of sync_file_range(2), even
> > with WB_SYNC_ALL, are far less intrusive to other writers in the system
> > than the effects of fdatasync(2).
>
> I agree that this paragraph is true but I don't want any userspace program
> rely on this. We've been through this when ext3 got converted to ext4 and
> it has caused a lot of complaints. Ext3 had provided rather strong data vs
> metadata ordering due to the way journalling was implemented. Then ext4
> came, implemented delayed allocation and somewhat changed how journalling
> works and suddently userspace programmers were caught by surprise their code
> working by luck stopped working. And they were complaining that when their
> code worked without fsync(2) before, it should work after it as well. So it
> took a lot of explaining that their applications are broken and Ted has
> also implemented some workarounds to make at least the most common mistakes
> silently fixed by the kernel most of the time.
>
> So I'm against providing 90% data integrity guarantees because there'll be
> many people who'll think they can get away with it and then complain when
> they won't once our implementation changes.
>
> Rather I'd modify the manpage to not say that SYNC_FILE_RANGE_WAIT_BEFORE
> | SYNC_FILE_RANGE_WRITE | SYNC_FILE_RANGE_WAIT_AFTER is a
> write-for-data-integrity.

OK. I do agree that manpage is misleading and that the language describing
this flag combination should be toned down. I do not object to adding more
and more disclaimers about this API not being a data integrity API.

But the requirement I have is a real life workload and fdatasync(2) is not at
all a viable option when application is creating many files per second.

I need to export the functionality of data writeback to userspace.
Objecting to expose this functionality via the interface that has been
documented to expose it for years and used to expose it in the
past (until the Fixes commit) is a bit weird IMO, even though I do
completely relate to your concern.

I don't mind removing the "intended use case" part of commit message
if that helps reducing the chance that people misunderstand
the guaranties of the API.

Another thing I could do is introduce a new flag for sync_file_range()
that will really mean what I want it to mean (all data will be written back
and all related inode metadata changes will be committed to journal
before the next inode metadata change is committed). For the sake of
argument let's call it SYNC_FILE_RANGE_DATA_DEPENDENCY.

I could then extend the ->fsync() f_op 'datasync' argument to 'sync_flags'
and let sync_file_range() call the filesystem to request the data dependency.
By default, no filesystem will support the new flag, but xfs and ext4 could
implement flag support simply by calling filemap_write_and_wait_range().

This way, the contract between the application and filesystem is drawn in
a way that filesystem is still able to make writeback optimizations without
breaking the contract. For example, if ext4 changes in a way that
filemap_write_and_wait_range() no longer gives the data dependency
guaranty, or if ext4 is mounted with no journal, then ext4 could refuse
the data dependency request or it could implement it differently.

Does that sound any better? If so, any suggestion for a less horid name
for this new flag?

Thanks,
Amir.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ