lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5215E4B7.3020003@parallels.com>
Date:	Thu, 22 Aug 2013 14:15:19 +0400
From:	Maxim Patlasov <mpatlasov@...allels.com>
To:	Andrew Morton <akpm@...ux-foundation.org>
CC:	<riel@...hat.com>, <jack@...e.cz>, <dev@...allels.com>,
	<miklos@...redi.hu>, <fuse-devel@...ts.sourceforge.net>,
	<xemul@...allels.com>, <linux-kernel@...r.kernel.org>,
	<jbottomley@...allels.com>, <linux-mm@...ck.org>,
	<viro@...iv.linux.org.uk>, <linux-fsdevel@...r.kernel.org>,
	<fengguang.wu@...el.com>, <devel@...nvz.org>, <mgorman@...e.de>
Subject: Re: [PATCH] mm: strictlimit feature -v4

08/22/2013 12:38 AM, Andrew Morton пишет:
> On Wed, 21 Aug 2013 17:56:32 +0400 Maxim Patlasov<mpatlasov@...allels.com>  wrote:
>
>> The feature prevents mistrusted filesystems to grow a large number of dirty
>> pages before throttling. For such filesystems balance_dirty_pages always
>> check bdi counters against bdi limits. I.e. even if global "nr_dirty" is under
>> "freerun", it's not allowed to skip bdi checks. The only use case for now is
>> fuse: it sets bdi max_ratio to 1% by default and system administrators are
>> supposed to expect that this limit won't be exceeded.
>>
>> The feature is on if a BDI is marked by BDI_CAP_STRICTLIMIT flag.
>> A filesystem may set the flag when it initializes its BDI.
> Now I think about it, I don't really understand the need for this
> feature.  Can you please go into some detail about the problematic
> scenarios and why they need fixing?  Including an expanded descritopn
> of the term "mistrusted filesystem"?

Saying "mistrusted filesystem" I meant FUSE mount created by 
unprivileged user. Userspace fuse library provides suid binary 
"fusermount". Here is an excerpt from its man-page:

 > Filesystem in Userspace (FUSE) is a simple interface for userspace pro-
 > grams to export a virtual filesystem to the Linux kernel. It also aims
 > to provide a secure method for non privileged users to create and mount
 > their own filesystem implementations.
 >
 > fusermount is a program to mount and unmount FUSE filesystems.

I'm citing it here to emphasize the fact that running buggy or 
malevolent filesystem implementation is not pure theoretical. Every time 
you have fuse library properly installed, any user can compile and mount 
its own filesystem implementation.

The problematic scenario comes from the fact that nobody pays attention 
to the NR_WRITEBACK_TEMP counter (i.e. number of pages under fuse 
writeback). The implementation of fuse writeback releases original page 
(by calling end_page_writeback) almost immediately. A fuse request 
queued for real processing bears a copy of original page. Hence, if 
userspace fuse daemon doesn't finalize write requests in timely manner, 
an aggressive mmap writer can pollute virtually all memory by those 
temporary fuse page copies. They are carefully accounted in 
NR_WRITEBACK_TEMP, but nobody cares.

To make further explanations shorter, let me use "NR_WRITEBACK_TEMP 
problem" as a shortcut for "a possibility of uncontrolled grow of amount 
of RAM consumed by temporary pages allocated by kernel fuse to process 
writeback".

> Is this some theoretical happens-in-the-lab thing, or are real world
> users actually hurting due to the lack of this feature?

The problem was very easy to reproduce. There is a trivial example 
filesystem implementation in fuse userspace distribution: fusexmp_fh.c. 
I added "sleep(1);" to the write methods, then recompiled and mounted 
it. Then created a huge file on the mount point and run a simple program 
which mmap-ed the file to a memory region, then wrote a data to the 
region. An hour later I observed almost all RAM consumed by fuse 
writeback. Since then some unrelated changes in kernel fuse made it more 
difficult to reproduce, but it is still possible now.

Putting this theoretical happens-in-the-lab thing aside, there is 
another thing that really hurts real world (FUSE) users. This is 
write-through page cache policy FUSE currently uses. I.e. handling 
write(2), kernel fuse populates page cache and flushes user data to the 
server synchronously. This is excessively suboptimal. Pavel Emelyanov's 
patches ("writeback cache policy") solve the problem, but they also make 
resolving NR_WRITEBACK_TEMP problem absolutely necessary. Otherwise, 
simply copying a huge file to a fuse mount would result in memory 
starvation. Miklos, the maintainer of FUSE, believes strictlimit feature 
the way to go.

And eventually putting FUSE topics aside, there is one more use-case for 
strictlimit feature. Using a slow USB stick (mass storage) in a machine 
with huge amount of RAM installed is a well-known pain. Let's make 
simple computations. Assuming 64GB of RAM installed, existing 
implementation of balance_dirty_pages will start throttling only after 
9.6GB of RAM becomes dirty (freerun == 15% of total RAM). So, the 
command "cp 9GB_file /media/my-usb-storage/" may return in a few 
seconds, but subsequent "umount /media/my-usb-storage/" will take more 
than two hours if effective throughput of the storage is, to say, 1MB/sec.

After inclusion of strictlimit feature, it will be trivial to add a knob 
(e.g. /sys/devices/virtual/bdi/x:y/strictlimit) to enable it on demand. 
Manually or via udev rule. May be I'm wrong, but it seems to be quite a 
natural desire to limit the amount of dirty memory for some devices we 
are not fully trust (in the sense of sustainable throughput).

> I think I'll apply it to -mm for now to get a bit of testing, but would
> very much like it if Fengguang could find time to review the
> implementation, please.
Great! Fengguang, please...

Thanks,
Maxim
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ