0-byte files created in overlay filesystem
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux-base (Ubuntu) |
New
|
Undecided
|
Unassigned |
Bug Description
Copied from https:/
A number of users have reported that under certain conditions using
the overlay filesystem, copy_file_range() can unexpectedly create a
0-byte file. [0]
This bug can cause significant problems because applications that copy
files expect the target file to match the source immediately after the
copy. After upgrading from Linux 5.4 to Linux 5.10, our Docker-based
CI tests started failing due to this bug, since Ruby's IO.copy_stream
uses this system call. We have worked around the problem by touching
the target file before using it, but this shouldn't be necessary.
Other projects, such as Rust, have added similar workarounds. [1]
As discussed in the linux-fsdevel mailing list [2], the bug appears to
be present in Linux 5.6 to 5.10, but not in Linux 5.11. We should be
able to cherry-pick the following upstream patches to fix this. Could
you cherry-pick them to 5.10.x stable? I've confirmed that these
patches, applied from top to bottom to that branch, pass the
reproduction test [3]:
82a763e61e2b601
9b91b6b019fda81
The diffstat:
fs/overlayfs/
+++++++
1 file changed, 31 insertions(+), 28 deletions(-)
Note that these patches do not pick cleanly into 5.6.x - 5.9.x stable.
[0] https:/
[1] https:/
[2] https:/
[3] https:/
---
I reproduced this bug in Ubuntu 18.04:
```
# bash test.sh
Sending build context to Docker daemon 43.05kB
Step 1/2 : FROM debian:10.8-slim
---> 115566c891d1
Step 2/2 : RUN apt update && apt install -y gcc strace
---> Using cache
---> 0dfb7ffcd427
Successfully built 0dfb7ffcd427
Successfully tagged strace:latest
Local:
OK
Docker - mounted:
Copy failed
Docker - copied:
OK
```
```
root@stanhu-
Description: Ubuntu 18.04.6 LTS
Release: 18.04
root@stanhu-
5.4.0-1057-gcp
```
Per [the latest update on the kernel stable mailing list](https://<email address hidden>), the kernel backport fix for 5.10 has been queued for review and should land in the [`stable-5.10.y` branch](https:/
To avoid this bug, I'd suggest avoid Linux v5.6.0 - v5.10.83 for now, unless you backport the two patches below:
1. https:/
1. https:/
I've confirmed that 5.5.19 does NOT have this bug, and it was introduced in 5.6.0 via https:/
* Ubuntu 18.04.6 LTS appears affected.
* Ubuntu 20.04.3 LTS does NOT appear affected with the Linux 5.11 kernel (HWE).