Received: by 10.192.165.156 with SMTP id m28csp492193imm; Thu, 19 Apr 2018 02:34:42 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/6QCDsAlU+VmDvkbng7XCMwoO34I/m8+yPIlbtSMfw0Z05Kq2tGspv58KXII30k1sZeJa9 X-Received: by 10.99.100.6 with SMTP id y6mr4560064pgb.205.1524130482136; Thu, 19 Apr 2018 02:34:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524130482; cv=none; d=google.com; s=arc-20160816; b=CEhSV3hCKwPGM3u1hFQREYoMFeuoAkug+0b+kYleA+IOeeQLl9mfrbmAk53Pe1IudT dETLvvqXDIALrspQGKxjy4YbamAxIRxLfSn/JB2v7wKY63vzPeWGudCeait9k7Dzf5lZ Wb/t5Docn8we/ZMPI98TKYVqbhz+BUW7y25LiimQY9/9Xv2WQ1KRvi8HV8d4xehvSbVu 6/9QvRKMqrfw1JGdBnfvXst3NtjVFoskIuoGaAwrb46nYxGOUGJ0k6xTLJzBbhqvd4Vc uFJ/HEEek3e93WSoruy/vBWLYxJILMGDEOiuYHziOsW3BEJ4ss7IHjLMzNk1FOdnhakI Gl6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature:arc-authentication-results; bh=r6Efvn/X+Uvn+tEqrjqkDbr6xlOX/p2nrwINk5kPfEk=; b=vZg4DaRJYQdBfkZ9xF5ioZbRKZs1KCjHf+LJgRetnpEfZnRb7TZFU4QVS9Icly18wk fAAB4Jir9Me1/anVXcabhZ4TXs22s2aclv7ztEXWqeIk/n+ZmlPTtY1c0F5WOwkBgtwf sAwwT6A4M/AYwYSDWnwY13F6/WSLdISBNJ/+HwI/+kDQ3l0SKVLjfZMgF4JAsuHg/qIL J3GUdiGP86+YRBa9ywCcsntDkeDRlQTy/SYxFV9uqZ05G9FMsXw9sS9koA6UiO6jGIvO rzhq34GQevRg9CdAVmGsY7UJME3lmJylxxw1kdAKa8x0vLF04zeE9BFRqWKA/KjscsoA ubyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=WyjjyKb3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q7si2790126pga.86.2018.04.19.02.34.28; Thu, 19 Apr 2018 02:34:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=WyjjyKb3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752981AbeDSJdI (ORCPT + 99 others); Thu, 19 Apr 2018 05:33:08 -0400 Received: from mail-wr0-f195.google.com ([209.85.128.195]:35004 "EHLO mail-wr0-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752841AbeDSJci (ORCPT ); Thu, 19 Apr 2018 05:32:38 -0400 Received: by mail-wr0-f195.google.com with SMTP id w3-v6so12139031wrg.2 for ; Thu, 19 Apr 2018 02:32:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=r6Efvn/X+Uvn+tEqrjqkDbr6xlOX/p2nrwINk5kPfEk=; b=WyjjyKb3KswOsS0f/zB3qYrLadwZQae8oBRpg6dS+wDqsmLQwL/o1G99qud/B6Zhuo DmGEUqaOaGLCojJdQfNodoTtvzacVD+MxMRfdq4YXFrykOh2Sr+6T+QWEwU5RRa/Y8PG TGrpMj4IUDF2lFYy8t31RgvPY0zSdkFtvu/Zk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=r6Efvn/X+Uvn+tEqrjqkDbr6xlOX/p2nrwINk5kPfEk=; b=YdhYYRJRge0rtJFhWZ0nzLM6aWgwlMoM0yulICkqAUc6dSCtlAD1DNNRlXWhWhCj3h NhrKd6zJwy7rKsjRBYUHUSvHckUThRgB1kTKzyIttebXH8uEQz6rW225kwlYV5H/uq4g sw6WTXQMwZ5IN6+ISGwKbUcC0KcXXIDR4WqBjWNDVNpnBfAWDkBBK05MPshOQea2Rx+y jMeNL3EXn1OYAceV0lKCbAL7fXKMJvmo3IBo7I3T78rugxxgFN8RKGodb7pKCvZ3T+13 huu7Ozisa3xaqOazG0mCtM5lOjTfjVGo4UywQafuOkruvjDEbaAnl5WPP7Jq151DVbl8 QJaQ== X-Gm-Message-State: ALQs6tDAIiH36o/uzTDtKWbwHz7E0AhTphDvHUckU2gM1FmV1p8z7Djg aSkeP92qAn+f3BNEzhuUi9OVHA== X-Received: by 10.28.141.148 with SMTP id p142mr4164265wmd.50.1524130357027; Thu, 19 Apr 2018 02:32:37 -0700 (PDT) Received: from [192.168.0.101] (146-241-43-55.dyn.eolo.it. [146.241.43.55]) by smtp.gmail.com with ESMTPSA id u36-v6sm6341972wrf.87.2018.04.19.02.32.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 19 Apr 2018 02:32:36 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\)) Subject: Re: usercopy whitelist woe in scsi_sense_cache From: Paolo Valente In-Reply-To: Date: Thu, 19 Apr 2018 11:32:34 +0200 Cc: Kees Cook , Oleksandr Natalenko , Bart Van Assche , David Windsor , "James E.J. Bottomley" , "Martin K. Petersen" , linux-scsi@vger.kernel.org, LKML , Christoph Hellwig , Hannes Reinecke , Johannes Thumshirn , linux-block , Ulf Hansson , Mark Brown , Linus Walleij Content-Transfer-Encoding: quoted-printable Message-Id: <13DBFC76-4849-4DDA-AC44-B2C1257912E7@linaro.org> References: <10360653.ov98egbaqx@natalenko.name> <8473f909-2123-0cfc-43b1-beba0b1aef9b@kernel.dk> <07f263ff-cea6-ac3c-944b-0f36fee8ba25@kernel.dk> <8b32e079-d4e6-3fea-a89d-ff856e4e13b1@kernel.dk> <0fbf2b13-8bae-c7c5-d930-ebaafdc72202@kernel.dk> <011EF7D1-B095-4B8D-AD2A-993048932C49@linaro.org> To: Jens Axboe X-Mailer: Apple Mail (2.3445.5.20) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Il giorno 18 apr 2018, alle ore 16:30, Jens Axboe ha = scritto: >=20 > On 4/18/18 3:08 AM, Paolo Valente wrote: >>=20 >>=20 >>> Il giorno 18 apr 2018, alle ore 00:57, Jens Axboe = ha scritto: >>>=20 >>> On 4/17/18 3:48 PM, Jens Axboe wrote: >>>> On 4/17/18 3:47 PM, Kees Cook wrote: >>>>> On Tue, Apr 17, 2018 at 2:39 PM, Jens Axboe = wrote: >>>>>> On 4/17/18 3:25 PM, Kees Cook wrote: >>>>>>> On Tue, Apr 17, 2018 at 1:46 PM, Kees Cook = wrote: >>>>>>>> I see elv.priv[1] assignments made in a few places -- is it = possible >>>>>>>> there is some kind of uninitialized-but-not-NULL state that can = leak >>>>>>>> in there? >>>>>>>=20 >>>>>>> Got it. This fixes it for me: >>>>>>>=20 >>>>>>> diff --git a/block/blk-mq.c b/block/blk-mq.c >>>>>>> index 0dc9e341c2a7..859df3160303 100644 >>>>>>> --- a/block/blk-mq.c >>>>>>> +++ b/block/blk-mq.c >>>>>>> @@ -363,7 +363,7 @@ static struct request = *blk_mq_get_request(struct >>>>>>> request_queue *q, >>>>>>>=20 >>>>>>> rq =3D blk_mq_rq_ctx_init(data, tag, op); >>>>>>> if (!op_is_flush(op)) { >>>>>>> - rq->elv.icq =3D NULL; >>>>>>> + memset(&rq->elv, 0, sizeof(rq->elv)); >>>>>>> if (e && e->type->ops.mq.prepare_request) { >>>>>>> if (e->type->icq_cache && rq_ioc(bio)) >>>>>>> blk_mq_sched_assign_ioc(rq, bio); >>>>>>> @@ -461,7 +461,7 @@ void blk_mq_free_request(struct request *rq) >>>>>>> e->type->ops.mq.finish_request(rq); >>>>>>> if (rq->elv.icq) { >>>>>>> put_io_context(rq->elv.icq->ioc); >>>>>>> - rq->elv.icq =3D NULL; >>>>>>> + memset(&rq->elv, 0, sizeof(rq->elv)); >>>>>>> } >>>>>>> } >>>>>>=20 >>>>>> This looks like a BFQ problem, this should not be necessary. = Paolo, >>>>>> you're calling your own prepare request handler from the insert >>>>>> as well, and your prepare request does nothing if rq->elv.icq =3D=3D= NULL. >>>>>=20 >>>>> I sent the patch anyway, since it's kind of a robustness = improvement, >>>>> I'd hope. If you fix BFQ also, please add: >>>>=20 >>>> It's also a memset() in the hot path, would prefer to avoid that... >>>> The issue here is really the convoluted bfq usage of = insert/prepare, >>>> I'm sure Paolo can take it from here. >>>=20 >>=20 >> Hi, >> I'm very sorry for tuning in very late, but, at the same time, very >> glad to find the problem probably already solved ;) (in this respect, = I swear, >> my delay was not intentional) >>=20 >>> Does this fix it? >>>=20 >>> diff --git a/block/bfq-iosched.c b/block/bfq-iosched.c >>> index f0ecd98509d8..d883469a1582 100644 >>> --- a/block/bfq-iosched.c >>> +++ b/block/bfq-iosched.c >>> @@ -4934,8 +4934,11 @@ static void bfq_prepare_request(struct = request *rq, struct bio *bio) >>> bool new_queue =3D false; >>> bool bfqq_already_existing =3D false, split =3D false; >>>=20 >>> - if (!rq->elv.icq) >>> + if (!rq->elv.icq) { >>> + rq->elv.priv[0] =3D rq->elv.priv[1] =3D NULL; >>> return; >>> + } >>> + >>=20 >> This does solve the problem at hand. But it also arouses a question, >> related to a possible subtle bug. >>=20 >> For BFQ, !rq->elv.icq basically means "this request is not for me, as >> I am an icq-based scheduler". But, IIUC the main points in this >> thread, then this assumption is false. If it is actually false, then >> I hope that all requests with !rq->elv.icq that are sent to BFQ do >> verify the condition (at_head || blk_rq_is_passthrough(rq)). In = fact, >> requests that do not verify that condition are those that BFQ must = put >> in a bfq_queue. So, even if this patch makes the crash disappear, we >> drive BFQ completely crazy (and we may expect other strange failures) >> if we send BFQ a request with !((at_head || = blk_rq_is_passthrough(rq)) >> and !rq->elv.icq. BFQ has to put that rq into a bfq_queue, but = simply >> cannot. >>=20 >> Jens, or any other, could you please shed a light on this, and = explain >> how things are exactly? >=20 First, thanks for summing up the problem. > Your assumption is correct, however you set ->priv[0] and ->priv[1] = for > requests, but only for ->elv.icq !=3D NULL. So let's assume you get a > request and assign those two, request completes. Later on, you get > the same request, bypass insert it. BFQ doesn't clear the bic/bfqq > pointers in the request, since ->elv.icq =3D=3D NULL. I'm missing something here. When the request gets completed in the first place, the hook bfq_finish_requeue_request gets called, and that hook clears both ->elv.priv elements (as the request has a non-null elv.icq). So, when bfq gets the same request again, those elements must be NULL. What am I getting wrong? I have some more concern on this point, but I'll stick to this for the moment, to not create more confusion. Thanks, Paolo > It gets inserted > into the dispatch list. >=20 > Then when __bfq_dispatch_request() is called, you do: >=20 > bfqq =3D RQ_BFQQ(rq); > if (bfqq) > bfqq->dispatched++; > [...] >=20 > which is wrong, since you don't know if you assigned a bfqq for this > request. The memory that bfqq points to could be long gone, if that > queue is freed. So you could either guard any bfqq/bic retrieval > with ->elv.icq !=3D NULL, or you could just clear the pointers for > the case where the values aren't valid. >=20 > --=20 > Jens Axboe