Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp1544650pxy; Fri, 23 Apr 2021 10:30:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw7P7Y2BqsLSOnxIDYk7tdnZa7XOFVYfq6ZKt5QesRDyLW4gNVhzbGgnCT0XI2TmB5bQwf0 X-Received: by 2002:a17:90b:1955:: with SMTP id nk21mr7078269pjb.198.1619199050619; Fri, 23 Apr 2021 10:30:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619199050; cv=none; d=google.com; s=arc-20160816; b=VBuwwo5VPGsvQIfe0Qr2XGVv+IKWS9zcF34cQknMV4qz+ZpW5NscY1CQNMOYJMo2tE W2Itp84OysM/L2dFI6hePvoA8W8zK2bArsDMcSTAnBVvCCLdVhcwyxwvnIoRh79gN+1f rwd49jQ3Dyy9jyq0KMPOnNu27zY4wZzY06+x8W9IB4G3TngtbkdlcOgE91+awLeniHMN nu1rBT2RpsIENs8DA/29zjAMubVfu5Zw0VeSeqiOs1V3MgobmypluTDoCLhOvFgnJPFw jgSJWjsrUlfg8z0uu7NtLsZx6hZrdL0aB4VHXeokHmFGuGzNbS6VtBaGOP7AqLU4io6o ukiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=eGzPeFWps0sPc2m41b4WBCMHb/mmtZqvwzG1wB1a4mo=; b=ySX+RBPT53AVRLlMX8RRPT0WUHHFYGI4ZvHVIUaZqAxj0T6u5sHz+gFgE/MCBXvI1S Ep+Xj8SxnudNn3GSsIqaRZqz7xrgdzqD+uBv3nIR+csCm+/pwVk+quEw3z+dcXADSKsP qXckWX71yMUG3JhhiR/JxRuv+l1sz0f862gH8R5qWZfUDnG5pzRyEXSm+Rx4E8xu14IQ rsRgeh8wX+n/wH7i0yE2FnChPvK1allY0MTWxEwXqj7Xy+Lrvsh+Y1Ryd+lAoDk45ABf 3wu/j013oOGlHne4yZbrbpjN3YoNZAhj5TfcGWWzhLSaX5tVFkyV9CIiueTun9ucjzsf MYiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d185si7548575pga.311.2021.04.23.10.30.37; Fri, 23 Apr 2021 10:30:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243508AbhDWRbE (ORCPT + 99 others); Fri, 23 Apr 2021 13:31:04 -0400 Received: from mx2.suse.de ([195.135.220.15]:43736 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243443AbhDWRbA (ORCPT ); Fri, 23 Apr 2021 13:31:00 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 957ABB1E0; Fri, 23 Apr 2021 17:30:19 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 8D09B1E37A2; Fri, 23 Apr 2021 19:30:18 +0200 (CEST) From: Jan Kara To: Cc: Christoph Hellwig , Amir Goldstein , Dave Chinner , Ted Tso , Jan Kara , ceph-devel@vger.kernel.org, Chao Yu , Damien Le Moal , "Darrick J. Wong" , Hugh Dickins , Jaegeuk Kim , Jeff Layton , Johannes Thumshirn , linux-cifs@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net, linux-mm@kvack.org, linux-xfs@vger.kernel.org, Miklos Szeredi , Steve French Subject: [PATCH 0/12 v4] fs: Hole punch vs page cache filling races Date: Fri, 23 Apr 2021 19:29:29 +0200 Message-Id: <20210423171010.12-1-jack@suse.cz> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org Hello, here is another version of my patches to address races between hole punching and page cache filling functions for ext4 and other filesystems. I think we are coming close to a complete solution so I've removed the RFC tag from the subject. I went through all filesystems supporting hole punching and converted them from their private locks to a generic one (usually fixing the race ext4 had as a side effect). I also found out ceph & cifs didn't have any protection from the hole punch vs page fault race either so I've added appropriate protections there. Open are still GFS2 and OCFS2 filesystems. GFS2 actually avoids the race but is prone to deadlocks (acquires the same lock both above and below mmap_sem), OCFS2 locking seems kind of hosed and some read, write, and hole punch paths are not properly serialized possibly leading to fs corruption. Both issues are non-trivial so respective fs maintainers have to deal with those (I've informed them and problems were generally confirmed). Anyway, for all the other filesystem this kind of race should be closed. As a next step, I'd like to actually make sure all calls to truncate_inode_pages() happen under mapping->invalidate_lock, add the assert and then we can also get rid of i_size checks in some places (truncate can use the same serialization scheme as hole punch). But that step is mostly a cleanup so I'd like to get these functional fixes in first. Changes since v3: * Renamed and moved lock to struct address_space * Added conversions of tmpfs, ceph, cifs, fuse, f2fs * Fixed error handling path in filemap_read() * Removed .page_mkwrite() cleanup from the series for now Changes since v2: * Added documentation and comments regarding lock ordering and how the lock is supposed to be used * Added conversions of ext2, xfs, zonefs * Added patch removing i_mapping_sem protection from .page_mkwrite handlers Changes since v1: * Moved to using inode->i_mapping_sem instead of aops handler to acquire appropriate lock --- Motivation: Amir has reported [1] a that ext4 has a potential issues when reads can race with hole punching possibly exposing stale data from freed blocks or even corrupting filesystem when stale mapping data gets used for writeout. The problem is that during hole punching, new page cache pages can get instantiated and block mapping from the looked up in a punched range after truncate_inode_pages() has run but before the filesystem removes blocks from the file. In principle any filesystem implementing hole punching thus needs to implement a mechanism to block instantiating page cache pages during hole punching to avoid this race. This is further complicated by the fact that there are multiple places that can instantiate pages in page cache. We can have regular read(2) or page fault doing this but fadvise(2) or madvise(2) can also result in reading in page cache pages through force_page_cache_readahead(). There are couple of ways how to fix this. First way (currently implemented by XFS) is to protect read(2) and *advise(2) calls with i_rwsem so that they are serialized with hole punching. This is easy to do but as a result all reads would then be serialized with writes and thus mixed read-write workloads suffer heavily on ext4. Thus this series introduces inode->i_mapping_sem and uses it when creating new pages in the page cache and looking up their corresponding block mapping. We also replace EXT4_I(inode)->i_mmap_sem with this new rwsem which provides necessary serialization with hole punching for ext4. Honza [1] https://lore.kernel.org/linux-fsdevel/CAOQ4uxjQNmxqmtA_VbYW0Su9rKRk2zobJmahcyeaEVOFKVQ5dw@mail.gmail.com/ Previous versions: Link: https://lore.kernel.org/linux-fsdevel/20210208163918.7871-1-jack@suse.cz/ Link: http://lore.kernel.org/r/20210413105205.3093-1-jack@suse.cz CC: ceph-devel@vger.kernel.org CC: Chao Yu CC: Damien Le Moal CC: "Darrick J. Wong" CC: Hugh Dickins CC: Jaegeuk Kim CC: Jeff Layton CC: Johannes Thumshirn CC: linux-cifs@vger.kernel.org CC: CC: linux-f2fs-devel@lists.sourceforge.net CC: CC: CC: CC: Miklos Szeredi CC: Steve French CC: Ted Tso