Message ID | 20220111191608.88762-44-jlayton@kernel.org (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | ceph+fscrypt: full support | expand |
On 1/12/22 3:16 AM, Jeff Layton wrote: > When doing a synchronous write on an encrypted inode, we have no > guarantee that the caller is writing crypto block-aligned data. When > that happens, we must do a read/modify/write cycle. > > First, expand the range to cover complete blocks. If we had to change > the original pos or length, issue a read to fill the first and/or last > pages, and fetch the version of the object from the result. > > We then copy data into the pages as usual, encrypt the result and issue > a write prefixed by an assertion that the version hasn't changed. If it has > changed then we restart the whole thing again. > > If there is no object at that position in the file (-ENOENT), we prefix > the write on an exclusive create of the object instead. > > Signed-off-by: Jeff Layton <jlayton@kernel.org> > --- > fs/ceph/file.c | 260 +++++++++++++++++++++++++++++++++++++++++++------ > 1 file changed, 228 insertions(+), 32 deletions(-) > > diff --git a/fs/ceph/file.c b/fs/ceph/file.c > index a6305ad5519b..41766b2012e9 100644 > --- a/fs/ceph/file.c > +++ b/fs/ceph/file.c > @@ -1468,18 +1468,16 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, > struct inode *inode = file_inode(file); > struct ceph_inode_info *ci = ceph_inode(inode); > struct ceph_fs_client *fsc = ceph_inode_to_client(inode); > - struct ceph_vino vino; > + struct ceph_osd_client *osdc = &fsc->client->osdc; > struct ceph_osd_request *req; > struct page **pages; > u64 len; > int num_pages; > int written = 0; > - int flags; > int ret; > bool check_caps = false; > struct timespec64 mtime = current_time(inode); > size_t count = iov_iter_count(from); > - size_t off; > > if (ceph_snap(file_inode(file)) != CEPH_NOSNAP) > return -EROFS; > @@ -1499,70 +1497,267 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, > if (ret < 0) > dout("invalidate_inode_pages2_range returned %d\n", ret); > > - flags = /* CEPH_OSD_FLAG_ORDERSNAP | */ CEPH_OSD_FLAG_WRITE; > - > while ((len = iov_iter_count(from)) > 0) { > size_t left; > int n; > + u64 write_pos = pos; > + u64 write_len = len; > + u64 objnum, objoff; > + u32 xlen; > + u64 assert_ver; > + bool rmw; > + bool first, last; > + struct iov_iter saved_iter = *from; > + size_t off; > + > + fscrypt_adjust_off_and_len(inode, &write_pos, &write_len); > + > + /* clamp the length to the end of first object */ > + ceph_calc_file_object_mapping(&ci->i_layout, write_pos, > + write_len, &objnum, &objoff, > + &xlen); > + write_len = xlen; > + > + /* adjust len downward if it goes beyond current object */ > + if (pos + len > write_pos + write_len) > + len = write_pos + write_len - pos; > > - vino = ceph_vino(inode); > - req = ceph_osdc_new_request(&fsc->client->osdc, &ci->i_layout, > - vino, pos, &len, 0, 1, > - CEPH_OSD_OP_WRITE, flags, snapc, > - ci->i_truncate_seq, > - ci->i_truncate_size, > - false); > - if (IS_ERR(req)) { > - ret = PTR_ERR(req); > - break; > - } > + /* > + * If we had to adjust the length or position to align with a > + * crypto block, then we must do a read/modify/write cycle. We > + * use a version assertion to redrive the thing if something > + * changes in between. > + */ > + first = pos != write_pos; > + last = (pos + len) != (write_pos + write_len); > + rmw = first || last; > > - /* FIXME: express in FSCRYPT_BLOCK_SIZE units */ > - num_pages = calc_pages_for(pos, len); > + /* > + * The data is emplaced into the page as it would be if it were in > + * an array of pagecache pages. > + */ > + num_pages = calc_pages_for(write_pos, write_len); > pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL); > if (IS_ERR(pages)) { > ret = PTR_ERR(pages); > - goto out; > + break; > + } > + > + /* Do we need to preload the pages? */ > + if (rmw) { > + u64 first_pos = write_pos; > + u64 last_pos = (write_pos + write_len) - CEPH_FSCRYPT_BLOCK_SIZE; > + u64 read_len = CEPH_FSCRYPT_BLOCK_SIZE; > + > + /* We should only need to do this for encrypted inodes */ > + WARN_ON_ONCE(!IS_ENCRYPTED(inode)); > + > + /* No need to do two reads if first and last blocks are same */ > + if (first && last_pos == first_pos) > + last = false; > + > + /* > + * Allocate a read request for one or two extents, depending > + * on how the request was aligned. > + */ > + req = ceph_osdc_new_request(osdc, &ci->i_layout, > + ci->i_vino, first ? first_pos : last_pos, > + &read_len, 0, (first && last) ? 2 : 1, > + CEPH_OSD_OP_READ, CEPH_OSD_FLAG_READ, > + NULL, ci->i_truncate_seq, > + ci->i_truncate_size, false); > + if (IS_ERR(req)) { > + ceph_release_page_vector(pages, num_pages); > + ret = PTR_ERR(req); > + break; > + } > + > + /* Something is misaligned! */ > + if (read_len != CEPH_FSCRYPT_BLOCK_SIZE) { > + ret = -EIO; > + break; > + } Do we need to call "ceph_release_page_vector()" here ? > + > + /* Add extent for first block? */ > + if (first) > + osd_req_op_extent_osd_data_pages(req, 0, pages, > + CEPH_FSCRYPT_BLOCK_SIZE, > + offset_in_page(first_pos), > + false, false); > + > + /* Add extent for last block */ > + if (last) { > + /* Init the other extent if first extent has been used */ > + if (first) { > + osd_req_op_extent_init(req, 1, CEPH_OSD_OP_READ, > + last_pos, CEPH_FSCRYPT_BLOCK_SIZE, > + ci->i_truncate_size, > + ci->i_truncate_seq); > + } > + > + osd_req_op_extent_osd_data_pages(req, first ? 1 : 0, > + &pages[num_pages - 1], > + CEPH_FSCRYPT_BLOCK_SIZE, > + offset_in_page(last_pos), > + false, false); > + } > + > + ret = ceph_osdc_start_request(osdc, req, false); > + if (!ret) > + ret = ceph_osdc_wait_request(osdc, req); > + > + /* FIXME: length field is wrong if there are 2 extents */ > + ceph_update_read_metrics(&fsc->mdsc->metric, > + req->r_start_latency, > + req->r_end_latency, > + read_len, ret); > + > + /* Ok if object is not already present */ > + if (ret == -ENOENT) { > + /* > + * If there is no object, then we can't assert > + * on its version. Set it to 0, and we'll use an > + * exclusive create instead. > + */ > + ceph_osdc_put_request(req); > + assert_ver = 0; > + ret = 0; > + > + /* > + * zero out the soon-to-be uncopied parts of the > + * first and last pages. > + */ > + if (first) > + zero_user_segment(pages[0], 0, The pages should already be released in "ceph_osdc_put_request()" ? > + offset_in_page(first_pos)); > + if (last) > + zero_user_segment(pages[num_pages - 1], > + offset_in_page(last_pos), > + PAGE_SIZE); > + } else { > + /* Grab assert version. It must be non-zero. */ > + assert_ver = req->r_version; > + WARN_ON_ONCE(ret > 0 && assert_ver == 0); > + > + ceph_osdc_put_request(req); > + if (ret < 0) { > + ceph_release_page_vector(pages, num_pages); Shouldn't the pages are already released in "ceph_osdc_put_request()" ? IMO you should put the request when you are breaking the while loop and just before the next "ceph_osdc_new_request()" below. > + break; > + } > + > + if (first) { > + ret = ceph_fscrypt_decrypt_block_inplace(inode, > + pages[0], > + CEPH_FSCRYPT_BLOCK_SIZE, > + offset_in_page(first_pos), > + first_pos >> CEPH_FSCRYPT_BLOCK_SHIFT); > + if (ret < 0) > + break; > + } > + if (last) { > + ret = ceph_fscrypt_decrypt_block_inplace(inode, > + pages[num_pages - 1], > + CEPH_FSCRYPT_BLOCK_SIZE, > + offset_in_page(last_pos), > + last_pos >> CEPH_FSCRYPT_BLOCK_SHIFT); > + if (ret < 0) > + break; > + } > + } > } > > left = len; > - off = pos & ~CEPH_FSCRYPT_BLOCK_MASK; > + off = offset_in_page(pos); > for (n = 0; n < num_pages; n++) { > - size_t plen = min_t(size_t, left, CEPH_FSCRYPT_BLOCK_SIZE - off); > + size_t plen = min_t(size_t, left, PAGE_SIZE - off); > + > + /* copy the data */ > ret = copy_page_from_iter(pages[n], off, plen, from); > - off = 0; > if (ret != plen) { > ret = -EFAULT; > break; > } > + off = 0; > left -= ret; > } > - > if (ret < 0) { > + dout("sync_write write failed with %d\n", ret); > ceph_release_page_vector(pages, num_pages); > - goto out; > + break; > } > > - req->r_inode = inode; > + if (IS_ENCRYPTED(inode)) { > + ret = ceph_fscrypt_encrypt_pages(inode, pages, > + write_pos, write_len, > + GFP_KERNEL); > + if (ret < 0) { > + dout("encryption failed with %d\n", ret); > + break; > + } > + } > > - osd_req_op_extent_osd_data_pages(req, 0, pages, len, > - pos & ~CEPH_FSCRYPT_BLOCK_MASK, > - false, true); The pages have already been released, you need to allocate new pages again here. > + req = ceph_osdc_new_request(osdc, &ci->i_layout, > + ci->i_vino, write_pos, &write_len, > + rmw ? 1 : 0, rmw ? 2 : 1, > + CEPH_OSD_OP_WRITE, > + CEPH_OSD_FLAG_WRITE, > + snapc, ci->i_truncate_seq, > + ci->i_truncate_size, false); > + if (IS_ERR(req)) { > + ret = PTR_ERR(req); > + ceph_release_page_vector(pages, num_pages); > + break; > + } > > + dout("sync_write write op %lld~%llu\n", write_pos, write_len); > + osd_req_op_extent_osd_data_pages(req, rmw ? 1 : 0, pages, write_len, > + offset_in_page(write_pos), false, > + true); > + req->r_inode = inode; > req->r_mtime = mtime; > - ret = ceph_osdc_start_request(&fsc->client->osdc, req, false); > + > + /* Set up the assertion */ > + if (rmw) { > + /* > + * Set up the assertion. If we don't have a version number, > + * then the object doesn't exist yet. Use an exclusive create > + * instead of a version assertion in that case. > + */ > + if (assert_ver) { > + osd_req_op_init(req, 0, CEPH_OSD_OP_ASSERT_VER, 0); > + req->r_ops[0].assert_ver.ver = assert_ver; > + } else { > + osd_req_op_init(req, 0, CEPH_OSD_OP_CREATE, > + CEPH_OSD_OP_FLAG_EXCL); > + } > + } > + > + ret = ceph_osdc_start_request(osdc, req, false); > if (!ret) > - ret = ceph_osdc_wait_request(&fsc->client->osdc, req); > + ret = ceph_osdc_wait_request(osdc, req); > > ceph_update_write_metrics(&fsc->mdsc->metric, req->r_start_latency, > req->r_end_latency, len, ret); > -out: > ceph_osdc_put_request(req); > if (ret != 0) { > + dout("sync_write osd write returned %d\n", ret); > + /* Version changed! Must re-do the rmw cycle */ > + if ((assert_ver && (ret == -ERANGE || ret == -EOVERFLOW)) || > + (!assert_ver && ret == -EEXIST)) { > + /* We should only ever see this on a rmw */ > + WARN_ON_ONCE(!rmw); > + > + /* The version should never go backward */ > + WARN_ON_ONCE(ret == -EOVERFLOW); > + > + *from = saved_iter; > + > + /* FIXME: limit number of times we loop? */ > + continue; > + } > ceph_set_error_write(ci); > break; > } > - > ceph_clear_error_write(ci); > pos += len; > written += len; > @@ -1580,6 +1775,7 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, > ret = written; > iocb->ki_pos = pos; > } > + dout("sync_write returning %d\n", ret); > return ret; > } >
On 1/19/22 11:21 AM, Xiubo Li wrote: > > On 1/12/22 3:16 AM, Jeff Layton wrote: >> When doing a synchronous write on an encrypted inode, we have no >> guarantee that the caller is writing crypto block-aligned data. When >> that happens, we must do a read/modify/write cycle. >> >> First, expand the range to cover complete blocks. If we had to change >> the original pos or length, issue a read to fill the first and/or last >> pages, and fetch the version of the object from the result. >> >> We then copy data into the pages as usual, encrypt the result and issue >> a write prefixed by an assertion that the version hasn't changed. If >> it has >> changed then we restart the whole thing again. >> >> If there is no object at that position in the file (-ENOENT), we prefix >> the write on an exclusive create of the object instead. >> >> Signed-off-by: Jeff Layton <jlayton@kernel.org> >> --- >> fs/ceph/file.c | 260 +++++++++++++++++++++++++++++++++++++++++++------ >> 1 file changed, 228 insertions(+), 32 deletions(-) >> >> diff --git a/fs/ceph/file.c b/fs/ceph/file.c >> index a6305ad5519b..41766b2012e9 100644 >> --- a/fs/ceph/file.c >> +++ b/fs/ceph/file.c >> @@ -1468,18 +1468,16 @@ ceph_sync_write(struct kiocb *iocb, struct >> iov_iter *from, loff_t pos, >> struct inode *inode = file_inode(file); >> struct ceph_inode_info *ci = ceph_inode(inode); >> struct ceph_fs_client *fsc = ceph_inode_to_client(inode); >> - struct ceph_vino vino; >> + struct ceph_osd_client *osdc = &fsc->client->osdc; >> struct ceph_osd_request *req; >> struct page **pages; >> u64 len; >> int num_pages; >> int written = 0; >> - int flags; >> int ret; >> bool check_caps = false; >> struct timespec64 mtime = current_time(inode); >> size_t count = iov_iter_count(from); >> - size_t off; >> if (ceph_snap(file_inode(file)) != CEPH_NOSNAP) >> return -EROFS; >> @@ -1499,70 +1497,267 @@ ceph_sync_write(struct kiocb *iocb, struct >> iov_iter *from, loff_t pos, >> if (ret < 0) >> dout("invalidate_inode_pages2_range returned %d\n", ret); >> - flags = /* CEPH_OSD_FLAG_ORDERSNAP | */ CEPH_OSD_FLAG_WRITE; >> - >> while ((len = iov_iter_count(from)) > 0) { >> size_t left; >> int n; >> + u64 write_pos = pos; >> + u64 write_len = len; >> + u64 objnum, objoff; >> + u32 xlen; >> + u64 assert_ver; >> + bool rmw; >> + bool first, last; >> + struct iov_iter saved_iter = *from; >> + size_t off; >> + >> + fscrypt_adjust_off_and_len(inode, &write_pos, &write_len); >> + >> + /* clamp the length to the end of first object */ >> + ceph_calc_file_object_mapping(&ci->i_layout, write_pos, >> + write_len, &objnum, &objoff, >> + &xlen); >> + write_len = xlen; >> + >> + /* adjust len downward if it goes beyond current object */ >> + if (pos + len > write_pos + write_len) >> + len = write_pos + write_len - pos; >> - vino = ceph_vino(inode); >> - req = ceph_osdc_new_request(&fsc->client->osdc, &ci->i_layout, >> - vino, pos, &len, 0, 1, >> - CEPH_OSD_OP_WRITE, flags, snapc, >> - ci->i_truncate_seq, >> - ci->i_truncate_size, >> - false); >> - if (IS_ERR(req)) { >> - ret = PTR_ERR(req); >> - break; >> - } >> + /* >> + * If we had to adjust the length or position to align with a >> + * crypto block, then we must do a read/modify/write cycle. We >> + * use a version assertion to redrive the thing if something >> + * changes in between. >> + */ >> + first = pos != write_pos; >> + last = (pos + len) != (write_pos + write_len); >> + rmw = first || last; >> - /* FIXME: express in FSCRYPT_BLOCK_SIZE units */ >> - num_pages = calc_pages_for(pos, len); >> + /* >> + * The data is emplaced into the page as it would be if it >> were in >> + * an array of pagecache pages. >> + */ >> + num_pages = calc_pages_for(write_pos, write_len); >> pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL); >> if (IS_ERR(pages)) { >> ret = PTR_ERR(pages); >> - goto out; >> + break; >> + } >> + >> + /* Do we need to preload the pages? */ >> + if (rmw) { >> + u64 first_pos = write_pos; >> + u64 last_pos = (write_pos + write_len) - >> CEPH_FSCRYPT_BLOCK_SIZE; >> + u64 read_len = CEPH_FSCRYPT_BLOCK_SIZE; >> + >> + /* We should only need to do this for encrypted inodes */ >> + WARN_ON_ONCE(!IS_ENCRYPTED(inode)); >> + >> + /* No need to do two reads if first and last blocks are >> same */ >> + if (first && last_pos == first_pos) >> + last = false; >> + >> + /* >> + * Allocate a read request for one or two extents, >> depending >> + * on how the request was aligned. >> + */ >> + req = ceph_osdc_new_request(osdc, &ci->i_layout, >> + ci->i_vino, first ? first_pos : last_pos, >> + &read_len, 0, (first && last) ? 2 : 1, >> + CEPH_OSD_OP_READ, CEPH_OSD_FLAG_READ, >> + NULL, ci->i_truncate_seq, >> + ci->i_truncate_size, false); >> + if (IS_ERR(req)) { >> + ceph_release_page_vector(pages, num_pages); >> + ret = PTR_ERR(req); >> + break; >> + } >> + >> + /* Something is misaligned! */ >> + if (read_len != CEPH_FSCRYPT_BLOCK_SIZE) { >> + ret = -EIO; >> + break; >> + } > > Do we need to call "ceph_release_page_vector()" here ? > > > >> + >> + /* Add extent for first block? */ >> + if (first) >> + osd_req_op_extent_osd_data_pages(req, 0, pages, >> + CEPH_FSCRYPT_BLOCK_SIZE, >> + offset_in_page(first_pos), >> + false, false); >> + >> + /* Add extent for last block */ >> + if (last) { >> + /* Init the other extent if first extent has been >> used */ >> + if (first) { >> + osd_req_op_extent_init(req, 1, CEPH_OSD_OP_READ, >> + last_pos, CEPH_FSCRYPT_BLOCK_SIZE, >> + ci->i_truncate_size, >> + ci->i_truncate_seq); >> + } >> + >> + osd_req_op_extent_osd_data_pages(req, first ? 1 : 0, >> + &pages[num_pages - 1], >> + CEPH_FSCRYPT_BLOCK_SIZE, >> + offset_in_page(last_pos), >> + false, false); >> + } >> + >> + ret = ceph_osdc_start_request(osdc, req, false); >> + if (!ret) >> + ret = ceph_osdc_wait_request(osdc, req); >> + >> + /* FIXME: length field is wrong if there are 2 extents */ >> + ceph_update_read_metrics(&fsc->mdsc->metric, >> + req->r_start_latency, >> + req->r_end_latency, >> + read_len, ret); >> + >> + /* Ok if object is not already present */ >> + if (ret == -ENOENT) { >> + /* >> + * If there is no object, then we can't assert >> + * on its version. Set it to 0, and we'll use an >> + * exclusive create instead. >> + */ >> + ceph_osdc_put_request(req); >> + assert_ver = 0; >> + ret = 0; >> + >> + /* >> + * zero out the soon-to-be uncopied parts of the >> + * first and last pages. >> + */ >> + if (first) >> + zero_user_segment(pages[0], 0, > > The pages should already be released in "ceph_osdc_put_request()" ? > > >> + offset_in_page(first_pos)); >> + if (last) >> + zero_user_segment(pages[num_pages - 1], >> + offset_in_page(last_pos), >> + PAGE_SIZE); >> + } else { >> + /* Grab assert version. It must be non-zero. */ >> + assert_ver = req->r_version; >> + WARN_ON_ONCE(ret > 0 && assert_ver == 0); >> + >> + ceph_osdc_put_request(req); >> + if (ret < 0) { >> + ceph_release_page_vector(pages, num_pages); > > Shouldn't the pages are already released in "ceph_osdc_put_request()" ? > > IMO you should put the request when you are breaking the while loop > and just before the next "ceph_osdc_new_request()" below. > > Okay, I missed the "own_page" parameter, the caller is responsible to release it. But you need to call the "ceph_release_page_vector()" when "ceph_fscrypt_decrypt_block_inplace()" fails below. > >> + break; >> + } >> + >> + if (first) { >> + ret = ceph_fscrypt_decrypt_block_inplace(inode, >> + pages[0], >> + CEPH_FSCRYPT_BLOCK_SIZE, >> + offset_in_page(first_pos), >> + first_pos >> CEPH_FSCRYPT_BLOCK_SHIFT); >> + if (ret < 0) >> + break; >> + } >> + if (last) { >> + ret = ceph_fscrypt_decrypt_block_inplace(inode, >> + pages[num_pages - 1], >> + CEPH_FSCRYPT_BLOCK_SIZE, >> + offset_in_page(last_pos), >> + last_pos >> CEPH_FSCRYPT_BLOCK_SHIFT); >> + if (ret < 0) >> + break; >> + } >> + } >> } >> left = len; >> - off = pos & ~CEPH_FSCRYPT_BLOCK_MASK; >> + off = offset_in_page(pos); >> for (n = 0; n < num_pages; n++) { >> - size_t plen = min_t(size_t, left, >> CEPH_FSCRYPT_BLOCK_SIZE - off); >> + size_t plen = min_t(size_t, left, PAGE_SIZE - off); >> + >> + /* copy the data */ >> ret = copy_page_from_iter(pages[n], off, plen, from); >> - off = 0; >> if (ret != plen) { >> ret = -EFAULT; >> break; >> } >> + off = 0; >> left -= ret; >> } >> - >> if (ret < 0) { >> + dout("sync_write write failed with %d\n", ret); >> ceph_release_page_vector(pages, num_pages); >> - goto out; >> + break; >> } >> - req->r_inode = inode; >> + if (IS_ENCRYPTED(inode)) { >> + ret = ceph_fscrypt_encrypt_pages(inode, pages, >> + write_pos, write_len, >> + GFP_KERNEL); >> + if (ret < 0) { >> + dout("encryption failed with %d\n", ret); And here ? >> + break; >> + } >> + } >> - osd_req_op_extent_osd_data_pages(req, 0, pages, len, >> - pos & ~CEPH_FSCRYPT_BLOCK_MASK, >> - false, true); > > The pages have already been released, you need to allocate new pages > again here. > >> + req = ceph_osdc_new_request(osdc, &ci->i_layout, >> + ci->i_vino, write_pos, &write_len, >> + rmw ? 1 : 0, rmw ? 2 : 1, >> + CEPH_OSD_OP_WRITE, >> + CEPH_OSD_FLAG_WRITE, >> + snapc, ci->i_truncate_seq, >> + ci->i_truncate_size, false); >> + if (IS_ERR(req)) { >> + ret = PTR_ERR(req); >> + ceph_release_page_vector(pages, num_pages); >> + break; >> + } >> + dout("sync_write write op %lld~%llu\n", write_pos, >> write_len); >> + osd_req_op_extent_osd_data_pages(req, rmw ? 1 : 0, pages, >> write_len, >> + offset_in_page(write_pos), false, >> + true); >> + req->r_inode = inode; >> req->r_mtime = mtime; >> - ret = ceph_osdc_start_request(&fsc->client->osdc, req, false); >> + >> + /* Set up the assertion */ >> + if (rmw) { >> + /* >> + * Set up the assertion. If we don't have a version number, >> + * then the object doesn't exist yet. Use an exclusive >> create >> + * instead of a version assertion in that case. >> + */ >> + if (assert_ver) { >> + osd_req_op_init(req, 0, CEPH_OSD_OP_ASSERT_VER, 0); >> + req->r_ops[0].assert_ver.ver = assert_ver; >> + } else { >> + osd_req_op_init(req, 0, CEPH_OSD_OP_CREATE, >> + CEPH_OSD_OP_FLAG_EXCL); >> + } >> + } >> + >> + ret = ceph_osdc_start_request(osdc, req, false); >> if (!ret) >> - ret = ceph_osdc_wait_request(&fsc->client->osdc, req); >> + ret = ceph_osdc_wait_request(osdc, req); >> ceph_update_write_metrics(&fsc->mdsc->metric, req->r_start_latency, >> req->r_end_latency, len, ret); >> -out: >> ceph_osdc_put_request(req); >> if (ret != 0) { >> + dout("sync_write osd write returned %d\n", ret); >> + /* Version changed! Must re-do the rmw cycle */ >> + if ((assert_ver && (ret == -ERANGE || ret == >> -EOVERFLOW)) || >> + (!assert_ver && ret == -EEXIST)) { >> + /* We should only ever see this on a rmw */ >> + WARN_ON_ONCE(!rmw); >> + >> + /* The version should never go backward */ >> + WARN_ON_ONCE(ret == -EOVERFLOW); >> + >> + *from = saved_iter; >> + >> + /* FIXME: limit number of times we loop? */ >> + continue; >> + } >> ceph_set_error_write(ci); >> break; >> } >> - >> ceph_clear_error_write(ci); >> pos += len; >> written += len; >> @@ -1580,6 +1775,7 @@ ceph_sync_write(struct kiocb *iocb, struct >> iov_iter *from, loff_t pos, >> ret = written; >> iocb->ki_pos = pos; >> } >> + dout("sync_write returning %d\n", ret); >> return ret; >> }
On Wed, 2022-01-19 at 13:08 +0800, Xiubo Li wrote: > On 1/19/22 11:21 AM, Xiubo Li wrote: > > > > On 1/12/22 3:16 AM, Jeff Layton wrote: > > > When doing a synchronous write on an encrypted inode, we have no > > > guarantee that the caller is writing crypto block-aligned data. When > > > that happens, we must do a read/modify/write cycle. > > > > > > First, expand the range to cover complete blocks. If we had to change > > > the original pos or length, issue a read to fill the first and/or last > > > pages, and fetch the version of the object from the result. > > > > > > We then copy data into the pages as usual, encrypt the result and issue > > > a write prefixed by an assertion that the version hasn't changed. If > > > it has > > > changed then we restart the whole thing again. > > > > > > If there is no object at that position in the file (-ENOENT), we prefix > > > the write on an exclusive create of the object instead. > > > > > > Signed-off-by: Jeff Layton <jlayton@kernel.org> > > > --- > > > fs/ceph/file.c | 260 +++++++++++++++++++++++++++++++++++++++++++------ > > > 1 file changed, 228 insertions(+), 32 deletions(-) > > > > > > diff --git a/fs/ceph/file.c b/fs/ceph/file.c > > > index a6305ad5519b..41766b2012e9 100644 > > > --- a/fs/ceph/file.c > > > +++ b/fs/ceph/file.c > > > @@ -1468,18 +1468,16 @@ ceph_sync_write(struct kiocb *iocb, struct > > > iov_iter *from, loff_t pos, > > > struct inode *inode = file_inode(file); > > > struct ceph_inode_info *ci = ceph_inode(inode); > > > struct ceph_fs_client *fsc = ceph_inode_to_client(inode); > > > - struct ceph_vino vino; > > > + struct ceph_osd_client *osdc = &fsc->client->osdc; > > > struct ceph_osd_request *req; > > > struct page **pages; > > > u64 len; > > > int num_pages; > > > int written = 0; > > > - int flags; > > > int ret; > > > bool check_caps = false; > > > struct timespec64 mtime = current_time(inode); > > > size_t count = iov_iter_count(from); > > > - size_t off; > > > if (ceph_snap(file_inode(file)) != CEPH_NOSNAP) > > > return -EROFS; > > > @@ -1499,70 +1497,267 @@ ceph_sync_write(struct kiocb *iocb, struct > > > iov_iter *from, loff_t pos, > > > if (ret < 0) > > > dout("invalidate_inode_pages2_range returned %d\n", ret); > > > - flags = /* CEPH_OSD_FLAG_ORDERSNAP | */ CEPH_OSD_FLAG_WRITE; > > > - > > > while ((len = iov_iter_count(from)) > 0) { > > > size_t left; > > > int n; > > > + u64 write_pos = pos; > > > + u64 write_len = len; > > > + u64 objnum, objoff; > > > + u32 xlen; > > > + u64 assert_ver; > > > + bool rmw; > > > + bool first, last; > > > + struct iov_iter saved_iter = *from; > > > + size_t off; > > > + > > > + fscrypt_adjust_off_and_len(inode, &write_pos, &write_len); > > > + > > > + /* clamp the length to the end of first object */ > > > + ceph_calc_file_object_mapping(&ci->i_layout, write_pos, > > > + write_len, &objnum, &objoff, > > > + &xlen); > > > + write_len = xlen; > > > + > > > + /* adjust len downward if it goes beyond current object */ > > > + if (pos + len > write_pos + write_len) > > > + len = write_pos + write_len - pos; > > > - vino = ceph_vino(inode); > > > - req = ceph_osdc_new_request(&fsc->client->osdc, &ci->i_layout, > > > - vino, pos, &len, 0, 1, > > > - CEPH_OSD_OP_WRITE, flags, snapc, > > > - ci->i_truncate_seq, > > > - ci->i_truncate_size, > > > - false); > > > - if (IS_ERR(req)) { > > > - ret = PTR_ERR(req); > > > - break; > > > - } > > > + /* > > > + * If we had to adjust the length or position to align with a > > > + * crypto block, then we must do a read/modify/write cycle. We > > > + * use a version assertion to redrive the thing if something > > > + * changes in between. > > > + */ > > > + first = pos != write_pos; > > > + last = (pos + len) != (write_pos + write_len); > > > + rmw = first || last; > > > - /* FIXME: express in FSCRYPT_BLOCK_SIZE units */ > > > - num_pages = calc_pages_for(pos, len); > > > + /* > > > + * The data is emplaced into the page as it would be if it > > > were in > > > + * an array of pagecache pages. > > > + */ > > > + num_pages = calc_pages_for(write_pos, write_len); > > > pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL); > > > if (IS_ERR(pages)) { > > > ret = PTR_ERR(pages); > > > - goto out; > > > + break; > > > + } > > > + > > > + /* Do we need to preload the pages? */ > > > + if (rmw) { > > > + u64 first_pos = write_pos; > > > + u64 last_pos = (write_pos + write_len) - > > > CEPH_FSCRYPT_BLOCK_SIZE; > > > + u64 read_len = CEPH_FSCRYPT_BLOCK_SIZE; > > > + > > > + /* We should only need to do this for encrypted inodes */ > > > + WARN_ON_ONCE(!IS_ENCRYPTED(inode)); > > > + > > > + /* No need to do two reads if first and last blocks are > > > same */ > > > + if (first && last_pos == first_pos) > > > + last = false; > > > + > > > + /* > > > + * Allocate a read request for one or two extents, > > > depending > > > + * on how the request was aligned. > > > + */ > > > + req = ceph_osdc_new_request(osdc, &ci->i_layout, > > > + ci->i_vino, first ? first_pos : last_pos, > > > + &read_len, 0, (first && last) ? 2 : 1, > > > + CEPH_OSD_OP_READ, CEPH_OSD_FLAG_READ, > > > + NULL, ci->i_truncate_seq, > > > + ci->i_truncate_size, false); > > > + if (IS_ERR(req)) { > > > + ceph_release_page_vector(pages, num_pages); > > > + ret = PTR_ERR(req); > > > + break; > > > + } > > > + > > > + /* Something is misaligned! */ > > > + if (read_len != CEPH_FSCRYPT_BLOCK_SIZE) { > > > + ret = -EIO; > > > + break; > > > + } > > > > Do we need to call "ceph_release_page_vector()" here ? > > > > > > > > > + > > > + /* Add extent for first block? */ > > > + if (first) > > > + osd_req_op_extent_osd_data_pages(req, 0, pages, > > > + CEPH_FSCRYPT_BLOCK_SIZE, > > > + offset_in_page(first_pos), > > > + false, false); > > > + > > > + /* Add extent for last block */ > > > + if (last) { > > > + /* Init the other extent if first extent has been > > > used */ > > > + if (first) { > > > + osd_req_op_extent_init(req, 1, CEPH_OSD_OP_READ, > > > + last_pos, CEPH_FSCRYPT_BLOCK_SIZE, > > > + ci->i_truncate_size, > > > + ci->i_truncate_seq); > > > + } > > > + > > > + osd_req_op_extent_osd_data_pages(req, first ? 1 : 0, > > > + &pages[num_pages - 1], > > > + CEPH_FSCRYPT_BLOCK_SIZE, > > > + offset_in_page(last_pos), > > > + false, false); > > > + } > > > + > > > + ret = ceph_osdc_start_request(osdc, req, false); > > > + if (!ret) > > > + ret = ceph_osdc_wait_request(osdc, req); > > > + > > > + /* FIXME: length field is wrong if there are 2 extents */ > > > + ceph_update_read_metrics(&fsc->mdsc->metric, > > > + req->r_start_latency, > > > + req->r_end_latency, > > > + read_len, ret); > > > + > > > + /* Ok if object is not already present */ > > > + if (ret == -ENOENT) { > > > + /* > > > + * If there is no object, then we can't assert > > > + * on its version. Set it to 0, and we'll use an > > > + * exclusive create instead. > > > + */ > > > + ceph_osdc_put_request(req); > > > + assert_ver = 0; > > > + ret = 0; > > > + > > > + /* > > > + * zero out the soon-to-be uncopied parts of the > > > + * first and last pages. > > > + */ > > > + if (first) > > > + zero_user_segment(pages[0], 0, > > > > The pages should already be released in "ceph_osdc_put_request()" ? > > > > > > > + offset_in_page(first_pos)); > > > + if (last) > > > + zero_user_segment(pages[num_pages - 1], > > > + offset_in_page(last_pos), > > > + PAGE_SIZE); > > > + } else { > > > + /* Grab assert version. It must be non-zero. */ > > > + assert_ver = req->r_version; > > > + WARN_ON_ONCE(ret > 0 && assert_ver == 0); > > > + > > > + ceph_osdc_put_request(req); > > > + if (ret < 0) { > > > + ceph_release_page_vector(pages, num_pages); > > > > Shouldn't the pages are already released in "ceph_osdc_put_request()" ? > > > > IMO you should put the request when you are breaking the while loop > > and just before the next "ceph_osdc_new_request()" below. > > > > > Okay, I missed the "own_page" parameter, the caller is responsible to > release it. > > But you need to call the "ceph_release_page_vector()" when > "ceph_fscrypt_decrypt_block_inplace()" fails below. > > Well spotted! Yeah, own_pages is not set here because we need to continue working with the pages after the read completes. We do set it for the write, however, so we don't need to set it after that. I've fixed up the places you noted (and a couple of others) in my tree. I'll plan to re-push wip-fscrypt after I do some testing. Thanks! > > > > > + break; > > > + } > > > + > > > + if (first) { > > > + ret = ceph_fscrypt_decrypt_block_inplace(inode, > > > + pages[0], > > > + CEPH_FSCRYPT_BLOCK_SIZE, > > > + offset_in_page(first_pos), > > > + first_pos >> CEPH_FSCRYPT_BLOCK_SHIFT); > > > + if (ret < 0) > > > + break; > > > + } > > > + if (last) { > > > + ret = ceph_fscrypt_decrypt_block_inplace(inode, > > > + pages[num_pages - 1], > > > + CEPH_FSCRYPT_BLOCK_SIZE, > > > + offset_in_page(last_pos), > > > + last_pos >> CEPH_FSCRYPT_BLOCK_SHIFT); > > > + if (ret < 0) > > > + break; > > > + } > > > + } > > > } > > > left = len; > > > - off = pos & ~CEPH_FSCRYPT_BLOCK_MASK; > > > + off = offset_in_page(pos); > > > for (n = 0; n < num_pages; n++) { > > > - size_t plen = min_t(size_t, left, > > > CEPH_FSCRYPT_BLOCK_SIZE - off); > > > + size_t plen = min_t(size_t, left, PAGE_SIZE - off); > > > + > > > + /* copy the data */ > > > ret = copy_page_from_iter(pages[n], off, plen, from); > > > - off = 0; > > > if (ret != plen) { > > > ret = -EFAULT; > > > break; > > > } > > > + off = 0; > > > left -= ret; > > > } > > > - > > > if (ret < 0) { > > > + dout("sync_write write failed with %d\n", ret); > > > ceph_release_page_vector(pages, num_pages); > > > - goto out; > > > + break; > > > } > > > - req->r_inode = inode; > > > + if (IS_ENCRYPTED(inode)) { > > > + ret = ceph_fscrypt_encrypt_pages(inode, pages, > > > + write_pos, write_len, > > > + GFP_KERNEL); > > > + if (ret < 0) { > > > + dout("encryption failed with %d\n", ret); > > And here ? > > > > > + break; > > > + } > > > + } > > > - osd_req_op_extent_osd_data_pages(req, 0, pages, len, > > > - pos & ~CEPH_FSCRYPT_BLOCK_MASK, > > > - false, true); > > > > The pages have already been released, you need to allocate new pages > > again here. > > > > > + req = ceph_osdc_new_request(osdc, &ci->i_layout, > > > + ci->i_vino, write_pos, &write_len, > > > + rmw ? 1 : 0, rmw ? 2 : 1, > > > + CEPH_OSD_OP_WRITE, > > > + CEPH_OSD_FLAG_WRITE, > > > + snapc, ci->i_truncate_seq, > > > + ci->i_truncate_size, false); > > > + if (IS_ERR(req)) { > > > + ret = PTR_ERR(req); > > > + ceph_release_page_vector(pages, num_pages); > > > + break; > > > + } > > > + dout("sync_write write op %lld~%llu\n", write_pos, > > > write_len); > > > + osd_req_op_extent_osd_data_pages(req, rmw ? 1 : 0, pages, > > > write_len, > > > + offset_in_page(write_pos), false, > > > + true); > > > + req->r_inode = inode; > > > req->r_mtime = mtime; > > > - ret = ceph_osdc_start_request(&fsc->client->osdc, req, false); > > > + > > > + /* Set up the assertion */ > > > + if (rmw) { > > > + /* > > > + * Set up the assertion. If we don't have a version number, > > > + * then the object doesn't exist yet. Use an exclusive > > > create > > > + * instead of a version assertion in that case. > > > + */ > > > + if (assert_ver) { > > > + osd_req_op_init(req, 0, CEPH_OSD_OP_ASSERT_VER, 0); > > > + req->r_ops[0].assert_ver.ver = assert_ver; > > > + } else { > > > + osd_req_op_init(req, 0, CEPH_OSD_OP_CREATE, > > > + CEPH_OSD_OP_FLAG_EXCL); > > > + } > > > + } > > > + > > > + ret = ceph_osdc_start_request(osdc, req, false); > > > if (!ret) > > > - ret = ceph_osdc_wait_request(&fsc->client->osdc, req); > > > + ret = ceph_osdc_wait_request(osdc, req); > > > ceph_update_write_metrics(&fsc->mdsc->metric, req->r_start_latency, > > > req->r_end_latency, len, ret); > > > -out: > > > ceph_osdc_put_request(req); > > > if (ret != 0) { > > > + dout("sync_write osd write returned %d\n", ret); > > > + /* Version changed! Must re-do the rmw cycle */ > > > + if ((assert_ver && (ret == -ERANGE || ret == > > > -EOVERFLOW)) || > > > + (!assert_ver && ret == -EEXIST)) { > > > + /* We should only ever see this on a rmw */ > > > + WARN_ON_ONCE(!rmw); > > > + > > > + /* The version should never go backward */ > > > + WARN_ON_ONCE(ret == -EOVERFLOW); > > > + > > > + *from = saved_iter; > > > + > > > + /* FIXME: limit number of times we loop? */ > > > + continue; > > > + } > > > ceph_set_error_write(ci); > > > break; > > > } > > > - > > > ceph_clear_error_write(ci); > > > pos += len; > > > written += len; > > > @@ -1580,6 +1775,7 @@ ceph_sync_write(struct kiocb *iocb, struct > > > iov_iter *from, loff_t pos, > > > ret = written; > > > iocb->ki_pos = pos; > > > } > > > + dout("sync_write returning %d\n", ret); > > > return ret; > > > } >
diff --git a/fs/ceph/file.c b/fs/ceph/file.c index a6305ad5519b..41766b2012e9 100644 --- a/fs/ceph/file.c +++ b/fs/ceph/file.c @@ -1468,18 +1468,16 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, struct inode *inode = file_inode(file); struct ceph_inode_info *ci = ceph_inode(inode); struct ceph_fs_client *fsc = ceph_inode_to_client(inode); - struct ceph_vino vino; + struct ceph_osd_client *osdc = &fsc->client->osdc; struct ceph_osd_request *req; struct page **pages; u64 len; int num_pages; int written = 0; - int flags; int ret; bool check_caps = false; struct timespec64 mtime = current_time(inode); size_t count = iov_iter_count(from); - size_t off; if (ceph_snap(file_inode(file)) != CEPH_NOSNAP) return -EROFS; @@ -1499,70 +1497,267 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, if (ret < 0) dout("invalidate_inode_pages2_range returned %d\n", ret); - flags = /* CEPH_OSD_FLAG_ORDERSNAP | */ CEPH_OSD_FLAG_WRITE; - while ((len = iov_iter_count(from)) > 0) { size_t left; int n; + u64 write_pos = pos; + u64 write_len = len; + u64 objnum, objoff; + u32 xlen; + u64 assert_ver; + bool rmw; + bool first, last; + struct iov_iter saved_iter = *from; + size_t off; + + fscrypt_adjust_off_and_len(inode, &write_pos, &write_len); + + /* clamp the length to the end of first object */ + ceph_calc_file_object_mapping(&ci->i_layout, write_pos, + write_len, &objnum, &objoff, + &xlen); + write_len = xlen; + + /* adjust len downward if it goes beyond current object */ + if (pos + len > write_pos + write_len) + len = write_pos + write_len - pos; - vino = ceph_vino(inode); - req = ceph_osdc_new_request(&fsc->client->osdc, &ci->i_layout, - vino, pos, &len, 0, 1, - CEPH_OSD_OP_WRITE, flags, snapc, - ci->i_truncate_seq, - ci->i_truncate_size, - false); - if (IS_ERR(req)) { - ret = PTR_ERR(req); - break; - } + /* + * If we had to adjust the length or position to align with a + * crypto block, then we must do a read/modify/write cycle. We + * use a version assertion to redrive the thing if something + * changes in between. + */ + first = pos != write_pos; + last = (pos + len) != (write_pos + write_len); + rmw = first || last; - /* FIXME: express in FSCRYPT_BLOCK_SIZE units */ - num_pages = calc_pages_for(pos, len); + /* + * The data is emplaced into the page as it would be if it were in + * an array of pagecache pages. + */ + num_pages = calc_pages_for(write_pos, write_len); pages = ceph_alloc_page_vector(num_pages, GFP_KERNEL); if (IS_ERR(pages)) { ret = PTR_ERR(pages); - goto out; + break; + } + + /* Do we need to preload the pages? */ + if (rmw) { + u64 first_pos = write_pos; + u64 last_pos = (write_pos + write_len) - CEPH_FSCRYPT_BLOCK_SIZE; + u64 read_len = CEPH_FSCRYPT_BLOCK_SIZE; + + /* We should only need to do this for encrypted inodes */ + WARN_ON_ONCE(!IS_ENCRYPTED(inode)); + + /* No need to do two reads if first and last blocks are same */ + if (first && last_pos == first_pos) + last = false; + + /* + * Allocate a read request for one or two extents, depending + * on how the request was aligned. + */ + req = ceph_osdc_new_request(osdc, &ci->i_layout, + ci->i_vino, first ? first_pos : last_pos, + &read_len, 0, (first && last) ? 2 : 1, + CEPH_OSD_OP_READ, CEPH_OSD_FLAG_READ, + NULL, ci->i_truncate_seq, + ci->i_truncate_size, false); + if (IS_ERR(req)) { + ceph_release_page_vector(pages, num_pages); + ret = PTR_ERR(req); + break; + } + + /* Something is misaligned! */ + if (read_len != CEPH_FSCRYPT_BLOCK_SIZE) { + ret = -EIO; + break; + } + + /* Add extent for first block? */ + if (first) + osd_req_op_extent_osd_data_pages(req, 0, pages, + CEPH_FSCRYPT_BLOCK_SIZE, + offset_in_page(first_pos), + false, false); + + /* Add extent for last block */ + if (last) { + /* Init the other extent if first extent has been used */ + if (first) { + osd_req_op_extent_init(req, 1, CEPH_OSD_OP_READ, + last_pos, CEPH_FSCRYPT_BLOCK_SIZE, + ci->i_truncate_size, + ci->i_truncate_seq); + } + + osd_req_op_extent_osd_data_pages(req, first ? 1 : 0, + &pages[num_pages - 1], + CEPH_FSCRYPT_BLOCK_SIZE, + offset_in_page(last_pos), + false, false); + } + + ret = ceph_osdc_start_request(osdc, req, false); + if (!ret) + ret = ceph_osdc_wait_request(osdc, req); + + /* FIXME: length field is wrong if there are 2 extents */ + ceph_update_read_metrics(&fsc->mdsc->metric, + req->r_start_latency, + req->r_end_latency, + read_len, ret); + + /* Ok if object is not already present */ + if (ret == -ENOENT) { + /* + * If there is no object, then we can't assert + * on its version. Set it to 0, and we'll use an + * exclusive create instead. + */ + ceph_osdc_put_request(req); + assert_ver = 0; + ret = 0; + + /* + * zero out the soon-to-be uncopied parts of the + * first and last pages. + */ + if (first) + zero_user_segment(pages[0], 0, + offset_in_page(first_pos)); + if (last) + zero_user_segment(pages[num_pages - 1], + offset_in_page(last_pos), + PAGE_SIZE); + } else { + /* Grab assert version. It must be non-zero. */ + assert_ver = req->r_version; + WARN_ON_ONCE(ret > 0 && assert_ver == 0); + + ceph_osdc_put_request(req); + if (ret < 0) { + ceph_release_page_vector(pages, num_pages); + break; + } + + if (first) { + ret = ceph_fscrypt_decrypt_block_inplace(inode, + pages[0], + CEPH_FSCRYPT_BLOCK_SIZE, + offset_in_page(first_pos), + first_pos >> CEPH_FSCRYPT_BLOCK_SHIFT); + if (ret < 0) + break; + } + if (last) { + ret = ceph_fscrypt_decrypt_block_inplace(inode, + pages[num_pages - 1], + CEPH_FSCRYPT_BLOCK_SIZE, + offset_in_page(last_pos), + last_pos >> CEPH_FSCRYPT_BLOCK_SHIFT); + if (ret < 0) + break; + } + } } left = len; - off = pos & ~CEPH_FSCRYPT_BLOCK_MASK; + off = offset_in_page(pos); for (n = 0; n < num_pages; n++) { - size_t plen = min_t(size_t, left, CEPH_FSCRYPT_BLOCK_SIZE - off); + size_t plen = min_t(size_t, left, PAGE_SIZE - off); + + /* copy the data */ ret = copy_page_from_iter(pages[n], off, plen, from); - off = 0; if (ret != plen) { ret = -EFAULT; break; } + off = 0; left -= ret; } - if (ret < 0) { + dout("sync_write write failed with %d\n", ret); ceph_release_page_vector(pages, num_pages); - goto out; + break; } - req->r_inode = inode; + if (IS_ENCRYPTED(inode)) { + ret = ceph_fscrypt_encrypt_pages(inode, pages, + write_pos, write_len, + GFP_KERNEL); + if (ret < 0) { + dout("encryption failed with %d\n", ret); + break; + } + } - osd_req_op_extent_osd_data_pages(req, 0, pages, len, - pos & ~CEPH_FSCRYPT_BLOCK_MASK, - false, true); + req = ceph_osdc_new_request(osdc, &ci->i_layout, + ci->i_vino, write_pos, &write_len, + rmw ? 1 : 0, rmw ? 2 : 1, + CEPH_OSD_OP_WRITE, + CEPH_OSD_FLAG_WRITE, + snapc, ci->i_truncate_seq, + ci->i_truncate_size, false); + if (IS_ERR(req)) { + ret = PTR_ERR(req); + ceph_release_page_vector(pages, num_pages); + break; + } + dout("sync_write write op %lld~%llu\n", write_pos, write_len); + osd_req_op_extent_osd_data_pages(req, rmw ? 1 : 0, pages, write_len, + offset_in_page(write_pos), false, + true); + req->r_inode = inode; req->r_mtime = mtime; - ret = ceph_osdc_start_request(&fsc->client->osdc, req, false); + + /* Set up the assertion */ + if (rmw) { + /* + * Set up the assertion. If we don't have a version number, + * then the object doesn't exist yet. Use an exclusive create + * instead of a version assertion in that case. + */ + if (assert_ver) { + osd_req_op_init(req, 0, CEPH_OSD_OP_ASSERT_VER, 0); + req->r_ops[0].assert_ver.ver = assert_ver; + } else { + osd_req_op_init(req, 0, CEPH_OSD_OP_CREATE, + CEPH_OSD_OP_FLAG_EXCL); + } + } + + ret = ceph_osdc_start_request(osdc, req, false); if (!ret) - ret = ceph_osdc_wait_request(&fsc->client->osdc, req); + ret = ceph_osdc_wait_request(osdc, req); ceph_update_write_metrics(&fsc->mdsc->metric, req->r_start_latency, req->r_end_latency, len, ret); -out: ceph_osdc_put_request(req); if (ret != 0) { + dout("sync_write osd write returned %d\n", ret); + /* Version changed! Must re-do the rmw cycle */ + if ((assert_ver && (ret == -ERANGE || ret == -EOVERFLOW)) || + (!assert_ver && ret == -EEXIST)) { + /* We should only ever see this on a rmw */ + WARN_ON_ONCE(!rmw); + + /* The version should never go backward */ + WARN_ON_ONCE(ret == -EOVERFLOW); + + *from = saved_iter; + + /* FIXME: limit number of times we loop? */ + continue; + } ceph_set_error_write(ci); break; } - ceph_clear_error_write(ci); pos += len; written += len; @@ -1580,6 +1775,7 @@ ceph_sync_write(struct kiocb *iocb, struct iov_iter *from, loff_t pos, ret = written; iocb->ki_pos = pos; } + dout("sync_write returning %d\n", ret); return ret; }
When doing a synchronous write on an encrypted inode, we have no guarantee that the caller is writing crypto block-aligned data. When that happens, we must do a read/modify/write cycle. First, expand the range to cover complete blocks. If we had to change the original pos or length, issue a read to fill the first and/or last pages, and fetch the version of the object from the result. We then copy data into the pages as usual, encrypt the result and issue a write prefixed by an assertion that the version hasn't changed. If it has changed then we restart the whole thing again. If there is no object at that position in the file (-ENOENT), we prefix the write on an exclusive create of the object instead. Signed-off-by: Jeff Layton <jlayton@kernel.org> --- fs/ceph/file.c | 260 +++++++++++++++++++++++++++++++++++++++++++------ 1 file changed, 228 insertions(+), 32 deletions(-)