From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: <pbs-devel-bounces@lists.proxmox.com> Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) by lore.proxmox.com (Postfix) with ESMTPS id 322301FF15C for <inbox@lore.proxmox.com>; Wed, 19 Feb 2025 17:49:08 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 307832FC80; Wed, 19 Feb 2025 17:49:03 +0100 (CET) From: Christian Ebner <c.ebner@proxmox.com> To: pbs-devel@lists.proxmox.com Date: Wed, 19 Feb 2025 17:48:42 +0100 Message-Id: <20250219164847.757184-5-c.ebner@proxmox.com> X-Mailer: git-send-email 2.39.5 In-Reply-To: <20250219164847.757184-1-c.ebner@proxmox.com> References: <20250219164847.757184-1-c.ebner@proxmox.com> MIME-Version: 1.0 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.031 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Subject: [pbs-devel] [PATCH proxmox-backup 4/9] fix #5982: garbage collection: check atime updates are honored X-BeenThere: pbs-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox Backup Server development discussion <pbs-devel.lists.proxmox.com> List-Unsubscribe: <https://lists.proxmox.com/cgi-bin/mailman/options/pbs-devel>, <mailto:pbs-devel-request@lists.proxmox.com?subject=unsubscribe> List-Archive: <http://lists.proxmox.com/pipermail/pbs-devel/> List-Post: <mailto:pbs-devel@lists.proxmox.com> List-Help: <mailto:pbs-devel-request@lists.proxmox.com?subject=help> List-Subscribe: <https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel>, <mailto:pbs-devel-request@lists.proxmox.com?subject=subscribe> Reply-To: Proxmox Backup Server development discussion <pbs-devel@lists.proxmox.com> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: pbs-devel-bounces@lists.proxmox.com Sender: "pbs-devel" <pbs-devel-bounces@lists.proxmox.com> Check if the filesystem backing the chunk store actually updates the atime to avoid potential data loss in phase 2 of garbage collection in case the atime update is not honored. Perform the check before phase 1 of garbage collection, as well as on datastore creation. The latter to early detect and disallow datastore creation on filesystem configurations which otherwise most likely would lead to data losses. Enable the atime update check by default, but allow to opt-out by setting a datastore tuning parameter flag for backwards compatibility. This is honored by both, garbage collection and datastore creation. The check uses a 4 MiB fixed sized, unencypted and compressed chunk as test marker, inserted if not present. This all zero-chunk is very likely anyways for unencrypted backup contents with large all-zero regions using fixed size chunking (e.g. VMs). The check sets the chunk's atime twice, once to set it to 1 second into the past, and once to set it to now. By this one can detect if the atime is set at all and if it also set if the filesystem is e.g. mounted via relatime, which is intended to deferr the atime update. Fixes: https://bugzilla.proxmox.com/show_bug.cgi?id=5982 Signed-off-by: Christian Ebner <c.ebner@proxmox.com> --- changes since version 1: - Use all-zero fixed size chunk for atime update test - Test on datastore creation and before garbage collection phase 1 - fail datastore creation and garbage collection jobs if check fails, but keep opt-out pbs-datastore/src/chunk_store.rs | 80 ++++++++++++++++++++++++++++++-- pbs-datastore/src/datastore.rs | 10 ++++ src/api2/config/datastore.rs | 1 + 3 files changed, 86 insertions(+), 5 deletions(-) diff --git a/pbs-datastore/src/chunk_store.rs b/pbs-datastore/src/chunk_store.rs index 7bdcb0297..be57e3c87 100644 --- a/pbs-datastore/src/chunk_store.rs +++ b/pbs-datastore/src/chunk_store.rs @@ -1,6 +1,7 @@ use std::os::unix::io::AsRawFd; use std::path::{Path, PathBuf}; use std::sync::{Arc, Mutex}; +use std::time::{Duration, SystemTime, UNIX_EPOCH}; use anyhow::{bail, format_err, Error}; use tracing::info; @@ -13,6 +14,7 @@ use proxmox_sys::process_locker::{ }; use proxmox_worker_task::WorkerTaskContext; +use crate::data_blob::DataChunkBuilder; use crate::file_formats::{ COMPRESSED_BLOB_MAGIC_1_0, ENCRYPTED_BLOB_MAGIC_1_0, UNCOMPRESSED_BLOB_MAGIC_1_0, }; @@ -96,6 +98,7 @@ impl ChunkStore { uid: nix::unistd::Uid, gid: nix::unistd::Gid, sync_level: DatastoreFSyncLevel, + atime_update_check: bool, ) -> Result<Self, Error> where P: Into<PathBuf>, @@ -150,7 +153,16 @@ impl ChunkStore { } } - Self::open(name, base, sync_level) + let chunk_store = Self::open(name, base, sync_level)?; + if atime_update_check { + chunk_store + .check_fs_atime_update() + .map(|()| info!("atime update check successful."))?; + } else { + info!("atime update check skipped."); + } + + Ok(chunk_store) } fn lockfile_path<P: Into<PathBuf>>(base: P) -> PathBuf { @@ -445,6 +457,51 @@ impl ChunkStore { Ok(()) } + /// Check if atime updates are honored by the filesystem backing the chunk store. + /// + /// Sets the atime twice, once into the past by one second, checking that this was honored and + /// then to now again, as otherwise it is not guaranteed to also cover time ranges by `relatime`. + /// Uses a 4 MiB fixed size, compressed but unencrypted chunk to test. The chunk is inserted in + /// the chunk store if not yet present. + pub fn check_fs_atime_update(&self) -> Result<(), Error> { + let (zero_chunk, digest) = DataChunkBuilder::build_zero_chunk(None, 4096 * 1024, true)?; + self.insert_chunk(&zero_chunk, &digest)?; + + let past = SystemTime::now().duration_since(UNIX_EPOCH)? - Duration::from_secs(1); + let times: [libc::timespec; 2] = [ + libc::timespec { + tv_sec: past.as_secs().try_into()?, + tv_nsec: past.subsec_nanos().into(), + }, + libc::timespec { + tv_sec: 0, + tv_nsec: UTIME_OMIT, + }, + ]; + + use nix::NixPath; + let (path, _digest) = self.chunk_path(&digest); + path.with_nix_path(|cstr| unsafe { + let tmp = libc::utimensat(-1, cstr.as_ptr(), ×[0], libc::AT_SYMLINK_NOFOLLOW); + nix::errno::Errno::result(tmp) + })??; + + let metadata_past = std::fs::metadata(&path).map_err(Error::from)?; + let atime_past = metadata_past.accessed()?; + if past != atime_past.duration_since(UNIX_EPOCH)? { + bail!("setting atime to the past failed, is atime support enabled on datastore backing filesystem?"); + } + + self.cond_touch_chunk(&digest, true)?; + + let metadata_now = std::fs::metadata(&path).map_err(Error::from)?; + let atime_now = metadata_now.accessed()?; + if atime_past >= atime_now { + bail!("atime update check failed, is atime support enabled on datastore backing filesystem?"); + } + Ok(()) + } + pub fn insert_chunk(&self, chunk: &DataBlob, digest: &[u8; 32]) -> Result<(bool, u64), Error> { // unwrap: only `None` in unit tests assert!(self.locker.is_some()); @@ -631,8 +688,15 @@ fn test_chunk_store1() { let user = nix::unistd::User::from_uid(nix::unistd::Uid::current()) .unwrap() .unwrap(); - let chunk_store = - ChunkStore::create("test", &path, user.uid, user.gid, DatastoreFSyncLevel::None).unwrap(); + let chunk_store = ChunkStore::create( + "test", + &path, + user.uid, + user.gid, + DatastoreFSyncLevel::None, + true, + ) + .unwrap(); let (chunk, digest) = crate::data_blob::DataChunkBuilder::new(&[0u8, 1u8]) .build() @@ -644,8 +708,14 @@ fn test_chunk_store1() { let (exists, _) = chunk_store.insert_chunk(&chunk, &digest).unwrap(); assert!(exists); - let chunk_store = - ChunkStore::create("test", &path, user.uid, user.gid, DatastoreFSyncLevel::None); + let chunk_store = ChunkStore::create( + "test", + &path, + user.uid, + user.gid, + DatastoreFSyncLevel::None, + true, + ); assert!(chunk_store.is_err()); if let Err(_e) = std::fs::remove_dir_all(".testdir") { /* ignore */ } diff --git a/pbs-datastore/src/datastore.rs b/pbs-datastore/src/datastore.rs index 75c0c16ab..9b01790cc 100644 --- a/pbs-datastore/src/datastore.rs +++ b/pbs-datastore/src/datastore.rs @@ -1170,6 +1170,16 @@ impl DataStore { upid: Some(upid.to_string()), ..Default::default() }; + let tuning: DatastoreTuning = serde_json::from_value( + DatastoreTuning::API_SCHEMA + .parse_property_string(gc_store_config.tuning.as_deref().unwrap_or(""))?, + )?; + if tuning.gc_atime_check.unwrap_or(true) { + self.inner.chunk_store.check_fs_atime_update()?; + info!("Filesystem atime update check successful."); + } else { + info!("Filesystem atime update check disabled by datastore tuning options."); + } info!("Start GC phase1 (mark used chunks)"); diff --git a/src/api2/config/datastore.rs b/src/api2/config/datastore.rs index fe3260f6d..1cd38f2db 100644 --- a/src/api2/config/datastore.rs +++ b/src/api2/config/datastore.rs @@ -119,6 +119,7 @@ pub(crate) fn do_create_datastore( backup_user.uid, backup_user.gid, tuning.sync_level.unwrap_or_default(), + tuning.gc_atime_check.unwrap_or(true), ) .map(|_| ()) } else { -- 2.39.5 _______________________________________________ pbs-devel mailing list pbs-devel@lists.proxmox.com https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel