Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1082620pxk; Mon, 31 Aug 2020 09:17:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy3Q3rldN49/D6BNxou5bEflAcMQg4Vq03bjVWQ62Ba67kzI/R02uRPNT0zow/mr88Vy4Ss X-Received: by 2002:a17:906:7fca:: with SMTP id r10mr1745037ejs.534.1598890643184; Mon, 31 Aug 2020 09:17:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598890643; cv=none; d=google.com; s=arc-20160816; b=S146Cw5/iqfoaemHWdxgj8XYkEro6VBIXCCQlpz9e81hrV75bVK3d14dmREORLMAVQ nLF2CNh3w9/Xf6DB2eZUtd9R9k4h8wOCPNo5PcPMHn3E9eeVTem4rvzVIR1j8ua2SHrq P/3GIPHeQK/GKGzJgQJBR2VsTGSQyA0FFwRVsu6uP4MZdaUWvxVSvrgf7KOnWUT1knsu jcQgsk5V40SwYbt+vdMQKCIjunF7Cq319sXosi9lrtXkaNMFhyK+0jUJg8/yZwVk186m pUj8DxGHcA4xdy31k/RYiMHEvkO4GC0Of8wKHi/ZZa2wSpuOKsctWqj95jWwYK7mLafc GNbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=fFIuRtHKzci8uiFvR4jacCdBSxfXibx2xrrytD5ocFA=; b=I0yTXz4xq/HYURJSEJlavWk5lXILc13lexj0BlC+SI+1C8gubvjaWm6JY8CDGPWrSw nt/tE9W7b1XTLQV2WYipbVkZ20P7c6GaX0UQLCWN9H6GPyy6/9n2UWcFBvhjSnXyYr7j 6oE3yxDafwMZ1AKWsVrT7W8+BEPTxQidqiOzpdStVGjwW3MeEcP9fv0CUsBNVH8vhor5 5IZG2pUx7Lj3KVb4FrbooIoNSHDs+j+0x/MPq6e4v83OX6BktCyIgh7bQWryl43iFr/t ZieWDITrGicqY/4rWDMbtq5/crrSUc0UP5oPoaXf0dEB1O6GJA+rWCP/ieXo0g6mb2zK iJ3Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si5491602edt.53.2020.08.31.09.16.59; Mon, 31 Aug 2020 09:17:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728645AbgHaQNq (ORCPT + 99 others); Mon, 31 Aug 2020 12:13:46 -0400 Received: from sandeen.net ([63.231.237.45]:40924 "EHLO sandeen.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728394AbgHaQNo (ORCPT ); Mon, 31 Aug 2020 12:13:44 -0400 Received: from liberator.sandeen.net (liberator.sandeen.net [10.0.0.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by sandeen.net (Postfix) with ESMTPSA id 25B693248; Mon, 31 Aug 2020 11:13:24 -0500 (CDT) Subject: Re: [PATCH v2] iomap: Fix WARN_ON_ONCE() from unprivileged users To: "Darrick J. Wong" Cc: Qian Cai , hch@infradead.org, linux-xfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org References: <20200831014511.17174-1-cai@lca.pw> <20200831155652.GE6096@magnolia> From: Eric Sandeen Message-ID: <01443940-2006-d44e-d4b1-e45852a3c4a5@sandeen.net> Date: Mon, 31 Aug 2020 11:13:42 -0500 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.2.0 MIME-Version: 1.0 In-Reply-To: <20200831155652.GE6096@magnolia> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/31/20 10:56 AM, Darrick J. Wong wrote: > On Mon, Aug 31, 2020 at 10:48:59AM -0500, Eric Sandeen wrote: >> On 8/30/20 8:45 PM, Qian Cai wrote: >>> It is trivial to trigger a WARN_ON_ONCE(1) in iomap_dio_actor() by >>> unprivileged users which would taint the kernel, or worse - panic if >>> panic_on_warn or panic_on_taint is set. Hence, just convert it to >>> pr_warn_ratelimited() to let users know their workloads are racing. >>> Thanks Dave Chinner for the initial analysis of the racing reproducers. >>> >>> Signed-off-by: Qian Cai >>> --- >>> >>> v2: Record the path, pid and command as well. >>> >>> fs/iomap/direct-io.c | 17 ++++++++++++++++- >>> 1 file changed, 16 insertions(+), 1 deletion(-) >>> >>> diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c >>> index c1aafb2ab990..66a4502ef675 100644 >>> --- a/fs/iomap/direct-io.c >>> +++ b/fs/iomap/direct-io.c >>> @@ -374,6 +374,7 @@ iomap_dio_actor(struct inode *inode, loff_t pos, loff_t length, >>> void *data, struct iomap *iomap, struct iomap *srcmap) >>> { >>> struct iomap_dio *dio = data; >>> + char pathname[128], *path; >>> >>> switch (iomap->type) { >>> case IOMAP_HOLE: >>> @@ -389,7 +390,21 @@ iomap_dio_actor(struct inode *inode, loff_t pos, loff_t length, >>> case IOMAP_INLINE: >>> return iomap_dio_inline_actor(inode, pos, length, dio, iomap); >>> default: >>> - WARN_ON_ONCE(1); >> >> It seems like we should explicitly catch IOMAP_DELALLOC for this case, and leave the >> default: as a WARN_ON that is not user-triggerable? i.e. >> >> case IOMAP_DELALLOC: >> >> return -EIO; >> default: >> WARN_ON_ONCE(1); >> return -EIO; >> >>> + /* >>> + * DIO is not serialised against mmap() access at all, and so >>> + * if the page_mkwrite occurs between the writeback and the >>> + * iomap_apply() call in the DIO path, then it will see the >>> + * DELALLOC block that the page-mkwrite allocated. >>> + */ >>> + path = file_path(dio->iocb->ki_filp, pathname, >>> + sizeof(pathname)); >>> + if (IS_ERR(path)) >>> + path = "(unknown)"; >>> + >>> + pr_warn_ratelimited("page_mkwrite() is racing with DIO read (iomap->type = %u).\n" >>> + "File: %s PID: %d Comm: %.20s\n", >>> + iomap->type, path, current->pid, >>> + current->comm); >> >> This is very specific ... >> >> Do we know that mmap/page_mkwrite is (and will always be) the only way to reach this >> point? >> >> It seems to me that this message won't be very useful for the admin; "pg_mkwrite" may >> mean something to us, but doubtful for the general public. And "type = 1" won't mean >> much to the reader, either. >> >> Maybe something like: >> >> "DIO encountered delayed allocation block, racing buffered+direct? File: %s Comm: %.20s\n" >> >> It just seems that a user-facing warning should be something the admin has a chance of >> acting on without needing to file a bug for analysis by the developers. >> >> (though TBH "delayed allocation" probably doesn't mean much to the admin, either) > > /me suggests > > "Direct I/O collision with buffered write! File: %s..."? Sure, that sounds good to me. Terser is better. > I concede that we ought to leave the nastier WARN for the default > case since there are no other IOMAP_ types and so any other code is > a sign of a serious screwup. *nod* thanks. -Eric