mbox series

[0/1] Fuse Passthrough cache issues

Message ID 20240703010215.2013266-1-drosen@google.com (mailing list archive)
Headers show
Series Fuse Passthrough cache issues | expand

Message

Daniel Rosenberg July 3, 2024, 1:02 a.m. UTC
I've been attempting to recreate Android's usage of Fuse Passthrough with the
version now merged in the kernel, and I've run into a couple issues. The first
one was pretty straightforward, and I've included a patch, although I'm not
convinced that it should be conditional, and it may need to do more to ensure
that the cache is up to date.

If your fuse daemon is running with writeback cache enabled, writes with
passthrough files will cause problems. Fuse will invalidate attributes on
write, but because it's in writeback cache mode, it will ignore the requested
attributes when the daemon provides them. The kernel is the source of truth in
this case, and should update the cached values during the passthrough write.

The other issue I ran into is the restriction on opening a file in passthrough
and non passthrough modes. In Android, one of our main usecases for passthrough
is location metadata redaction. Apps without the location permission get back
nulled out data when they read image metadata location. If an app has that
permission, it can open the file in passthrough mode, but otherwise the daemon
opens the file in normal fuse mode where it can do the redaction.

Currently in passthrough, this behavior is explicitly blocked. What's needed to
allow this? The page caches can contain different data, but in this case that's
a feature, not a bug. They could theoretically be backed by entirely different
things, although that would be fairly confusing. I would think the main thing
we'd need would be to invalidate areas of the cache when writing in passthrough
mode to give the daemon the opportunity to react to what's there now, and also
something in the other direction. Might make more sense as something the daemon
can opt into.

Any thoughts on these issues? And does the proposed fix make sense to you?



Daniel Rosenberg (1):
  fuse: Keep attributes consistent with Passthrough

 fs/fuse/passthrough.c | 15 +++++++++++++--
 1 file changed, 13 insertions(+), 2 deletions(-)


base-commit: 73e931504f8e0d42978bfcda37b323dbbd1afc08

Comments

Bernd Schubert July 3, 2024, 1:27 p.m. UTC | #1
On 7/3/24 03:02, Daniel Rosenberg wrote:
> I've been attempting to recreate Android's usage of Fuse Passthrough with the
> version now merged in the kernel, and I've run into a couple issues. The first
> one was pretty straightforward, and I've included a patch, although I'm not
> convinced that it should be conditional, and it may need to do more to ensure
> that the cache is up to date.
> 
> If your fuse daemon is running with writeback cache enabled, writes with
> passthrough files will cause problems. Fuse will invalidate attributes on
> write, but because it's in writeback cache mode, it will ignore the requested
> attributes when the daemon provides them. The kernel is the source of truth in
> this case, and should update the cached values during the passthrough write.

Could you explain why you want to have the combination passthrough and
writeback cache?

I think Amirs intention was to have passthrough and cache writes
conflicting, see fuse_file_passthrough_open() and
fuse_file_cached_io_open().

Also in <libfuse>/example/passthrough_hp.cc in sfs_init():

    /* Passthrough and writeback cache are conflicting modes */



With that I wonder if either fc->writeback_cache should be ignored when
a file is opened in passthrough mode, or if fuse_file_io_open() should
ignore FOPEN_PASSTHROUGH when fc->writeback_cache is set. Either of both
would result in the opposite of what you are trying to achieve - which
is why I think it is important to understand what is your actual goal.

I think idea for conflicting file cached and passthrough modes is that
the backing inode can already provide a cache - why another one for fuse?


> 
> The other issue I ran into is the restriction on opening a file in passthrough
> and non passthrough modes. In Android, one of our main usecases for passthrough
> is location metadata redaction. Apps without the location permission get back
> nulled out data when they read image metadata location. If an app has that
> permission, it can open the file in passthrough mode, but otherwise the daemon
> opens the file in normal fuse mode where it can do the redaction.
> 
> Currently in passthrough, this behavior is explicitly blocked. What's needed to
> allow this? The page caches can contain different data, but in this case that's
> a feature, not a bug. They could theoretically be backed by entirely different
> things, although that would be fairly confusing. I would think the main thing
> we'd need would be to invalidate areas of the cache when writing in passthrough
> mode to give the daemon the opportunity to react to what's there now, and also
> something in the other direction. Might make more sense as something the daemon
> can opt into.
> 
> Any thoughts on these issues? And does the proposed fix make sense to you?
> 
> 
> 
> Daniel Rosenberg (1):
>   fuse: Keep attributes consistent with Passthrough
> 
>  fs/fuse/passthrough.c | 15 +++++++++++++--
>  1 file changed, 13 insertions(+), 2 deletions(-)
> 
> 
> base-commit: 73e931504f8e0d42978bfcda37b323dbbd1afc08


Thanks,
Bernd
Amir Goldstein July 3, 2024, 2:41 p.m. UTC | #2
On Wed, Jul 3, 2024 at 4:27 PM Bernd Schubert
<bernd.schubert@fastmail.fm> wrote:
>
>
>
> On 7/3/24 03:02, Daniel Rosenberg wrote:
> > I've been attempting to recreate Android's usage of Fuse Passthrough with the
> > version now merged in the kernel, and I've run into a couple issues. The first
> > one was pretty straightforward, and I've included a patch, although I'm not
> > convinced that it should be conditional, and it may need to do more to ensure
> > that the cache is up to date.
> >
> > If your fuse daemon is running with writeback cache enabled, writes with
> > passthrough files will cause problems. Fuse will invalidate attributes on
> > write, but because it's in writeback cache mode, it will ignore the requested
> > attributes when the daemon provides them. The kernel is the source of truth in
> > this case, and should update the cached values during the passthrough write.
>
> Could you explain why you want to have the combination passthrough and
> writeback cache?
>
> I think Amirs intention was to have passthrough and cache writes
> conflicting, see fuse_file_passthrough_open() and
> fuse_file_cached_io_open().

Yes, this was an explicit design requirement from Miklos [1].
I also have use cases to handle some read/writes from server
and the compromise was that for the first version these cases should
use FOPEN_DIRECT_IO, which does not conflict with FOPEN_PASSTHROUGH.

I guess this is not good enough for Android applications opening photos
that need the FUSE readahead cache for performance?

In that case, a future BPF filter can decide whether to send the IO direct
to server or to backing inode.

Or a future backing inode mapping API could map part of the file to
backing inode
and the metadata portion will not be mapped to backing inode will fall back to
direct IO to server.

[1] https://lore.kernel.org/linux-fsdevel/CAJfpegtWdGVm9iHgVyXfY2mnR98XJ=6HtpaA+W83vvQea5PycQ@mail.gmail.com/

>
> Also in <libfuse>/example/passthrough_hp.cc in sfs_init():
>
>     /* Passthrough and writeback cache are conflicting modes */
>
>
>
> With that I wonder if either fc->writeback_cache should be ignored when
> a file is opened in passthrough mode, or if fuse_file_io_open() should
> ignore FOPEN_PASSTHROUGH when fc->writeback_cache is set. Either of both
> would result in the opposite of what you are trying to achieve - which
> is why I think it is important to understand what is your actual goal.
>

Is there no standard way for FUSE client to tell the server that the
INIT response is invalid?

Anyway, we already ignore  FUSE_PASSTHROUGH in INIT response
for several cases, so this could be another case.
Then FOPEN_PASSTHROUGH will fail with EIO (not be ignored).

> I think idea for conflicting file cached and passthrough modes is that
> the backing inode can already provide a cache - why another one for fuse?
>
>
> >
> > The other issue I ran into is the restriction on opening a file in passthrough
> > and non passthrough modes. In Android, one of our main usecases for passthrough
> > is location metadata redaction. Apps without the location permission get back
> > nulled out data when they read image metadata location. If an app has that
> > permission, it can open the file in passthrough mode, but otherwise the daemon
> > opens the file in normal fuse mode where it can do the redaction.
> >
> > Currently in passthrough, this behavior is explicitly blocked. What's needed to
> > allow this? The page caches can contain different data, but in this case that's
> > a feature, not a bug. They could theoretically be backed by entirely different
> > things, although that would be fairly confusing. I would think the main thing
> > we'd need would be to invalidate areas of the cache when writing in passthrough
> > mode to give the daemon the opportunity to react to what's there now, and also
> > something in the other direction. Might make more sense as something the daemon
> > can opt into.
> >
> > Any thoughts on these issues? And does the proposed fix make sense to you?

FYI, Miklos suggested that attributes will be passthrough to the "backing inode"
when inode is in passthrough mode, which requires lookup-to-forget semantics
just like in the BPF patches.

I have started a POC of this [2], but got sidetracked to other things.
I am not sure when I will be able to get back to them.
If this is interesting to you either for solving the specific attribute mismatch
issue or as a stepping stone towards FUSE BPF, do feel free to pick up
my patches.

[2] https://github.com/amir73il/linux/commits/fuse-backing-inode-wip/

Let me know if you have any questions about them.

Thanks,
Amir.
Bernd Schubert July 3, 2024, 4:09 p.m. UTC | #3
On 7/3/24 16:41, Amir Goldstein wrote:
> On Wed, Jul 3, 2024 at 4:27 PM Bernd Schubert
> <bernd.schubert@fastmail.fm> wrote:
>>
>>
>>
>> On 7/3/24 03:02, Daniel Rosenberg wrote:
>>> I've been attempting to recreate Android's usage of Fuse Passthrough with the
>>> version now merged in the kernel, and I've run into a couple issues. The first
>>> one was pretty straightforward, and I've included a patch, although I'm not
>>> convinced that it should be conditional, and it may need to do more to ensure
>>> that the cache is up to date.
>>>
>>> If your fuse daemon is running with writeback cache enabled, writes with
>>> passthrough files will cause problems. Fuse will invalidate attributes on
>>> write, but because it's in writeback cache mode, it will ignore the requested
>>> attributes when the daemon provides them. The kernel is the source of truth in
>>> this case, and should update the cached values during the passthrough write.
>>
>> Could you explain why you want to have the combination passthrough and
>> writeback cache?
>>
>> I think Amirs intention was to have passthrough and cache writes
>> conflicting, see fuse_file_passthrough_open() and
>> fuse_file_cached_io_open().
> 
> Yes, this was an explicit design requirement from Miklos [1].
> I also have use cases to handle some read/writes from server
> and the compromise was that for the first version these cases should
> use FOPEN_DIRECT_IO, which does not conflict with FOPEN_PASSTHROUGH.
> 
> I guess this is not good enough for Android applications opening photos
> that need the FUSE readahead cache for performance?
> 
> In that case, a future BPF filter can decide whether to send the IO direct
> to server or to backing inode.
> 
> Or a future backing inode mapping API could map part of the file to
> backing inode
> and the metadata portion will not be mapped to backing inode will fall back to
> direct IO to server.
> 
> [1] https://lore.kernel.org/linux-fsdevel/CAJfpegtWdGVm9iHgVyXfY2mnR98XJ=6HtpaA+W83vvQea5PycQ@mail.gmail.com/
> 
>>
>> Also in <libfuse>/example/passthrough_hp.cc in sfs_init():
>>
>>     /* Passthrough and writeback cache are conflicting modes */
>>
>>
>>
>> With that I wonder if either fc->writeback_cache should be ignored when
>> a file is opened in passthrough mode, or if fuse_file_io_open() should
>> ignore FOPEN_PASSTHROUGH when fc->writeback_cache is set. Either of both
>> would result in the opposite of what you are trying to achieve - which
>> is why I think it is important to understand what is your actual goal.
>>
> 
> Is there no standard way for FUSE client to tell the server that the
> INIT response is invalid?

Problem is that at FUSE_INIT time it is already mounted. process_init_reply()
can set an error state, but fuse_get_req*() will just result in ECONNREFUSED.*

> 
> Anyway, we already ignore  FUSE_PASSTHROUGH in INIT response
> for several cases, so this could be another case.
> Then FOPEN_PASSTHROUGH will fail with EIO (not be ignored).

So basically this?

diff --git a/fs/fuse/inode.c b/fs/fuse/inode.c
index 573550e7bbe1..36c6dcd47a53 100644
--- a/fs/fuse/inode.c
+++ b/fs/fuse/inode.c
@@ -1327,7 +1327,8 @@ static void process_init_reply(struct fuse_mount *fm, struct fuse_args *args,
                        if (IS_ENABLED(CONFIG_FUSE_PASSTHROUGH) &&
                            (flags & FUSE_PASSTHROUGH) &&
                            arg->max_stack_depth > 0 &&
-                           arg->max_stack_depth <= FILESYSTEM_MAX_STACK_DEPTH) {
+                           arg->max_stack_depth <= FILESYSTEM_MAX_STACK_DEPTH &&
+                           !(flags & FUSE_WRITEBACK_CACHE)) {
                                fc->passthrough = 1;
                                fc->max_stack_depth = arg->max_stack_depth;
                                fm->sb->s_stack_depth = arg->max_stack_depth;




Thanks,
Bernd
Amir Goldstein July 3, 2024, 4:24 p.m. UTC | #4
On Wed, Jul 3, 2024 at 7:09 PM Bernd Schubert
<bernd.schubert@fastmail.fm> wrote:
>
>
>
> On 7/3/24 16:41, Amir Goldstein wrote:
> > On Wed, Jul 3, 2024 at 4:27 PM Bernd Schubert
> > <bernd.schubert@fastmail.fm> wrote:
> >>
> >>
> >>
> >> On 7/3/24 03:02, Daniel Rosenberg wrote:
> >>> I've been attempting to recreate Android's usage of Fuse Passthrough with the
> >>> version now merged in the kernel, and I've run into a couple issues. The first
> >>> one was pretty straightforward, and I've included a patch, although I'm not
> >>> convinced that it should be conditional, and it may need to do more to ensure
> >>> that the cache is up to date.
> >>>
> >>> If your fuse daemon is running with writeback cache enabled, writes with
> >>> passthrough files will cause problems. Fuse will invalidate attributes on
> >>> write, but because it's in writeback cache mode, it will ignore the requested
> >>> attributes when the daemon provides them. The kernel is the source of truth in
> >>> this case, and should update the cached values during the passthrough write.
> >>
> >> Could you explain why you want to have the combination passthrough and
> >> writeback cache?
> >>
> >> I think Amirs intention was to have passthrough and cache writes
> >> conflicting, see fuse_file_passthrough_open() and
> >> fuse_file_cached_io_open().
> >
> > Yes, this was an explicit design requirement from Miklos [1].
> > I also have use cases to handle some read/writes from server
> > and the compromise was that for the first version these cases should
> > use FOPEN_DIRECT_IO, which does not conflict with FOPEN_PASSTHROUGH.
> >
> > I guess this is not good enough for Android applications opening photos
> > that need the FUSE readahead cache for performance?
> >
> > In that case, a future BPF filter can decide whether to send the IO direct
> > to server or to backing inode.
> >
> > Or a future backing inode mapping API could map part of the file to
> > backing inode
> > and the metadata portion will not be mapped to backing inode will fall back to
> > direct IO to server.
> >
> > [1] https://lore.kernel.org/linux-fsdevel/CAJfpegtWdGVm9iHgVyXfY2mnR98XJ=6HtpaA+W83vvQea5PycQ@mail.gmail.com/
> >
> >>
> >> Also in <libfuse>/example/passthrough_hp.cc in sfs_init():
> >>
> >>     /* Passthrough and writeback cache are conflicting modes */
> >>
> >>
> >>
> >> With that I wonder if either fc->writeback_cache should be ignored when
> >> a file is opened in passthrough mode, or if fuse_file_io_open() should
> >> ignore FOPEN_PASSTHROUGH when fc->writeback_cache is set. Either of both
> >> would result in the opposite of what you are trying to achieve - which
> >> is why I think it is important to understand what is your actual goal.
> >>
> >
> > Is there no standard way for FUSE client to tell the server that the
> > INIT response is invalid?
>
> Problem is that at FUSE_INIT time it is already mounted. process_init_reply()
> can set an error state, but fuse_get_req*() will just result in ECONNREFUSED.*
>
> >
> > Anyway, we already ignore  FUSE_PASSTHROUGH in INIT response
> > for several cases, so this could be another case.
> > Then FOPEN_PASSTHROUGH will fail with EIO (not be ignored).
>
> So basically this?
>
> diff --git a/fs/fuse/inode.c b/fs/fuse/inode.c
> index 573550e7bbe1..36c6dcd47a53 100644
> --- a/fs/fuse/inode.c
> +++ b/fs/fuse/inode.c
> @@ -1327,7 +1327,8 @@ static void process_init_reply(struct fuse_mount *fm, struct fuse_args *args,
>                         if (IS_ENABLED(CONFIG_FUSE_PASSTHROUGH) &&
>                             (flags & FUSE_PASSTHROUGH) &&
>                             arg->max_stack_depth > 0 &&
> -                           arg->max_stack_depth <= FILESYSTEM_MAX_STACK_DEPTH) {
> +                           arg->max_stack_depth <= FILESYSTEM_MAX_STACK_DEPTH &&
> +                           !(flags & FUSE_WRITEBACK_CACHE)) {
>                                 fc->passthrough = 1;
>                                 fc->max_stack_depth = arg->max_stack_depth;
>                                 fm->sb->s_stack_depth = arg->max_stack_depth;
>
>

Yap.
Maybe add something to the comment, because the comment is
about max_stack_depth and someone may assume that it also refers
to FUSE_WRITEBACK_CACHE somehow.

Thanks,
Amir.