Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1206014pxk; Mon, 31 Aug 2020 12:44:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJycr+F2fri4e6k9X+WAZudlULu7OX/lc2zW0wCx4+sLf91TjJg8Qxstqo0ys5+vrLEENUBg X-Received: by 2002:aa7:da8e:: with SMTP id q14mr2619413eds.359.1598903071624; Mon, 31 Aug 2020 12:44:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598903071; cv=none; d=google.com; s=arc-20160816; b=0vcvLkFpKn3FowgHdXDH90dinlyGG6jkvzCMQ6P1HxogflqMEtemYrSEZiQddDuqyt ZoW05TiUuAQrE4QWTcLqhzKuzi7plNVcWHb/JEgJJMp/SdvyddrESVwnOrPCympKeWDQ ZOBYe8G1DeYyhxqyjT9/S3uH4Z5wnNvWioi8ebLmT0J5UXIZIu8qc+cZ5L48n5b5o/V9 h9ryAAL3upZbZ5itIhRX5Ai1uHSMkR37/6I4DEOE+Fg+Cw7mMRv8MfjgguAVgNJP1Ovy tCdhgByDFu++BrDhiXAw3IkF+QSywGa4wrcpP++WNangUmEF80SI4W4mPfkdFd5uCwVK AwEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:subject:from:references:cc:to; bh=eOWCdZofX6EehBNC7EkBZQBWWOMW+x7ZLIbQyrNJSD4=; b=e1zKpRsxWjjHnxdLSyE+XE4J3/BXACo5wMvnl2+jglOsPwlu2h1g5sIlVWX8gnV6Q8 XdOrVhwdRCqcgtkKRLoEOK9bDDLw8Bsr4my+ODSh5xhC3nkvUZJW1jvRrU5bL865tTVX XaHNF0T6w3oHOZG0bxxbXdpFXnbupoDvUmHquHHiXuzQimDwdwd3En0NZFfr8PrlaLx6 fL+Q7Lb2r/xmQy221Vib9iKtopVeYIKrfoAKCroLF9O0PVK8jdBKWXCsIuG2GWldRyuZ J+PiCWrzj3h8E1RmHMt0A/n3ErYEd6SI4CXEGTnyYMZL31gnFjymAIbfgq1FtYxbEFsk W7iw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u6si5732137eje.234.2020.08.31.12.44.08; Mon, 31 Aug 2020 12:44:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728043AbgHaPtB (ORCPT + 99 others); Mon, 31 Aug 2020 11:49:01 -0400 Received: from sandeen.net ([63.231.237.45]:39658 "EHLO sandeen.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726204AbgHaPtB (ORCPT ); Mon, 31 Aug 2020 11:49:01 -0400 Received: from liberator.sandeen.net (liberator.sandeen.net [10.0.0.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by sandeen.net (Postfix) with ESMTPSA id 1117A3248; Mon, 31 Aug 2020 10:48:41 -0500 (CDT) To: Qian Cai , darrick.wong@oracle.com Cc: hch@infradead.org, linux-xfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org References: <20200831014511.17174-1-cai@lca.pw> From: Eric Sandeen Subject: Re: [PATCH v2] iomap: Fix WARN_ON_ONCE() from unprivileged users Message-ID: Date: Mon, 31 Aug 2020 10:48:59 -0500 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.2.0 MIME-Version: 1.0 In-Reply-To: <20200831014511.17174-1-cai@lca.pw> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/30/20 8:45 PM, Qian Cai wrote: > It is trivial to trigger a WARN_ON_ONCE(1) in iomap_dio_actor() by > unprivileged users which would taint the kernel, or worse - panic if > panic_on_warn or panic_on_taint is set. Hence, just convert it to > pr_warn_ratelimited() to let users know their workloads are racing. > Thanks Dave Chinner for the initial analysis of the racing reproducers. > > Signed-off-by: Qian Cai > --- > > v2: Record the path, pid and command as well. > > fs/iomap/direct-io.c | 17 ++++++++++++++++- > 1 file changed, 16 insertions(+), 1 deletion(-) > > diff --git a/fs/iomap/direct-io.c b/fs/iomap/direct-io.c > index c1aafb2ab990..66a4502ef675 100644 > --- a/fs/iomap/direct-io.c > +++ b/fs/iomap/direct-io.c > @@ -374,6 +374,7 @@ iomap_dio_actor(struct inode *inode, loff_t pos, loff_t length, > void *data, struct iomap *iomap, struct iomap *srcmap) > { > struct iomap_dio *dio = data; > + char pathname[128], *path; > > switch (iomap->type) { > case IOMAP_HOLE: > @@ -389,7 +390,21 @@ iomap_dio_actor(struct inode *inode, loff_t pos, loff_t length, > case IOMAP_INLINE: > return iomap_dio_inline_actor(inode, pos, length, dio, iomap); > default: > - WARN_ON_ONCE(1); It seems like we should explicitly catch IOMAP_DELALLOC for this case, and leave the default: as a WARN_ON that is not user-triggerable? i.e. case IOMAP_DELALLOC: return -EIO; default: WARN_ON_ONCE(1); return -EIO; > + /* > + * DIO is not serialised against mmap() access at all, and so > + * if the page_mkwrite occurs between the writeback and the > + * iomap_apply() call in the DIO path, then it will see the > + * DELALLOC block that the page-mkwrite allocated. > + */ > + path = file_path(dio->iocb->ki_filp, pathname, > + sizeof(pathname)); > + if (IS_ERR(path)) > + path = "(unknown)"; > + > + pr_warn_ratelimited("page_mkwrite() is racing with DIO read (iomap->type = %u).\n" > + "File: %s PID: %d Comm: %.20s\n", > + iomap->type, path, current->pid, > + current->comm); This is very specific ... Do we know that mmap/page_mkwrite is (and will always be) the only way to reach this point? It seems to me that this message won't be very useful for the admin; "pg_mkwrite" may mean something to us, but doubtful for the general public. And "type = 1" won't mean much to the reader, either. Maybe something like: "DIO encountered delayed allocation block, racing buffered+direct? File: %s Comm: %.20s\n" It just seems that a user-facing warning should be something the admin has a chance of acting on without needing to file a bug for analysis by the developers. (though TBH "delayed allocation" probably doesn't mean much to the admin, either) -Eric > return -EIO; > } > } >