lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 30 Oct 2020 19:42:09 -0700
From:   Eric Biggers <ebiggers@...nel.org>
To:     Konstantin Komarov <almaz.alexandrovich@...agon-software.com>
Cc:     linux-fsdevel@...r.kernel.org, viro@...iv.linux.org.uk,
        linux-kernel@...r.kernel.org, pali@...nel.org, dsterba@...e.cz,
        aaptel@...e.com, willy@...radead.org, rdunlap@...radead.org,
        joe@...ches.com, mark@...mstone.com, nborisov@...e.com,
        linux-ntfs-dev@...ts.sourceforge.net, anton@...era.com
Subject: Re: [PATCH v11 00/10] NTFS read-write driver GPL implementation by
 Paragon Software

Hi Konstantin,

On Fri, Oct 30, 2020 at 06:02:29PM +0300, Konstantin Komarov wrote:
> This patch adds NTFS Read-Write driver to fs/ntfs3.
> 
> Having decades of expertise in commercial file systems development and huge
> test coverage, we at Paragon Software GmbH want to make our contribution to
> the Open Source Community by providing implementation of NTFS Read-Write
> driver for the Linux Kernel.
> 
> This is fully functional NTFS Read-Write driver. Current version works with
> NTFS(including v3.1) and normal/compressed/sparse files and supports journal replaying.
> 
> We plan to support this version after the codebase once merged, and add new
> features and fix bugs. For example, full journaling support over JBD will be
> added in later updates.
> 

Have you tried testing this filesystem using some of the kernel debugging
options (lockdep, KASAN, etc.?).  I tried a basic test just for fun, and I
immediately got a lockdep report:

mkfs.ntfs -f /dev/vdb
mount /dev/vdb /mnt -t ntfs3
echo foo > /mnt/foo

======================================================
WARNING: possible circular locking dependency detected
5.10.0-rc1-00275-ga34a2c322380 #33 Not tainted
------------------------------------------------------
bash/160 is trying to acquire lock:
ffff888011e68108 (&ni->ni_lock){+.+.}-{3:3}, at: ni_lock fs/ntfs3/ntfs_fs.h:959 [inline]
ffff888011e68108 (&ni->ni_lock){+.+.}-{3:3}, at: ntfs_set_size+0xee/0x210 fs/ntfs3/inode.c:880

but task is already holding lock:
ffff888011e68370 (&sb->s_type->i_mutex_key#11){+.+.}-{3:3}, at: inode_trylock include/linux/fs.h:794 [inline]
ffff888011e68370 (&sb->s_type->i_mutex_key#11){+.+.}-{3:3}, at: ntfs_file_write_iter+0x1bc/0x4e0 fs/ntfs3/file.c:1040

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #1 (&sb->s_type->i_mutex_key#11){+.+.}-{3:3}:
       __lock_acquire+0x7b7/0x1060 kernel/locking/lockdep.c:4837
       lock_acquire.part.0+0x13b/0x2a0 kernel/locking/lockdep.c:5442
       lock_acquire+0xb4/0x1d0 kernel/locking/lockdep.c:5415
       down_write+0x93/0x150 kernel/locking/rwsem.c:1531
       inode_lock include/linux/fs.h:774 [inline]
       ntfs_set_state+0x192/0x650 fs/ntfs3/fsntfs.c:996
       ntfs_create_inode+0x318/0x4590 fs/ntfs3/inode.c:1254
       ntfs_atomic_open+0x350/0x450 fs/ntfs3/namei.c:521
       atomic_open+0x16b/0x420 fs/namei.c:2970
       lookup_open+0x7d1/0xdc0 fs/namei.c:3076
       open_last_lookups+0x277/0x1040 fs/namei.c:3178
       path_openat+0x161/0x310 fs/namei.c:3366
       do_filp_open+0x17d/0x3b0 fs/namei.c:3396
       do_sys_openat2+0x120/0x3d0 fs/open.c:1168
       do_sys_open fs/open.c:1184 [inline]
       __do_sys_openat fs/open.c:1200 [inline]
       __se_sys_openat fs/open.c:1195 [inline]
       __x64_sys_openat+0x124/0x200 fs/open.c:1195
       do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46
       entry_SYSCALL_64_after_hwframe+0x44/0xa9

-> #0 (&ni->ni_lock){+.+.}-{3:3}:
       check_prev_add+0x162/0x20b0 kernel/locking/lockdep.c:2864
       check_prevs_add kernel/locking/lockdep.c:2989 [inline]
       validate_chain+0xbff/0x1620 kernel/locking/lockdep.c:3607
       __lock_acquire+0x7b7/0x1060 kernel/locking/lockdep.c:4837
       lock_acquire.part.0+0x13b/0x2a0 kernel/locking/lockdep.c:5442
       lock_acquire+0xb4/0x1d0 kernel/locking/lockdep.c:5415
       __mutex_lock_common kernel/locking/mutex.c:956 [inline]
       __mutex_lock+0x142/0x12d0 kernel/locking/mutex.c:1103
       mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1118
       ni_lock fs/ntfs3/ntfs_fs.h:959 [inline]
       ntfs_set_size+0xee/0x210 fs/ntfs3/inode.c:880
       ntfs_extend_ex+0x3b1/0x5c0 fs/ntfs3/file.c:466
       ntfs_file_write_iter+0x244/0x4e0 fs/ntfs3/file.c:1050
       call_write_iter include/linux/fs.h:1887 [inline]
       new_sync_write+0x348/0x6d0 fs/read_write.c:518
       vfs_write+0x408/0x5b0 fs/read_write.c:605
       ksys_write+0x11d/0x220 fs/read_write.c:658
       __do_sys_write fs/read_write.c:670 [inline]
       __se_sys_write fs/read_write.c:667 [inline]
       __x64_sys_write+0x6e/0xb0 fs/read_write.c:667
       do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46
       entry_SYSCALL_64_after_hwframe+0x44/0xa9

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&sb->s_type->i_mutex_key#11);
                               lock(&ni->ni_lock);
                               lock(&sb->s_type->i_mutex_key#11);
  lock(&ni->ni_lock);

 *** DEADLOCK ***

2 locks held by bash/160:
 #0: ffff8880084ac458 (sb_writers#11){.+.+}-{0:0}, at: file_start_write include/linux/fs.h:2759 [inline]
 #0: ffff8880084ac458 (sb_writers#11){.+.+}-{0:0}, at: vfs_write+0x3bc/0x5b0 fs/read_write.c:601
 #1: ffff888011e68370 (&sb->s_type->i_mutex_key#11){+.+.}-{3:3}, at: inode_trylock include/linux/fs.h:794 [inline]
 #1: ffff888011e68370 (&sb->s_type->i_mutex_key#11){+.+.}-{3:3}, at: ntfs_file_write_iter+0x1bc/0x4e0 fs/ntfs3/file.c:1040

stack backtrace:
CPU: 1 PID: 160 Comm: bash Not tainted 5.10.0-rc1-00275-ga34a2c322380 #33
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ArchLinux 1.14.0-1 04/01/2014
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0xa4/0xd9 lib/dump_stack.c:118
 print_circular_bug.cold+0x34/0x39 kernel/locking/lockdep.c:1994
 check_noncircular+0x277/0x350 kernel/locking/lockdep.c:2115
 check_prev_add+0x162/0x20b0 kernel/locking/lockdep.c:2864
 check_prevs_add kernel/locking/lockdep.c:2989 [inline]
 validate_chain+0xbff/0x1620 kernel/locking/lockdep.c:3607
 __lock_acquire+0x7b7/0x1060 kernel/locking/lockdep.c:4837
 lock_acquire.part.0+0x13b/0x2a0 kernel/locking/lockdep.c:5442
 lock_acquire+0xb4/0x1d0 kernel/locking/lockdep.c:5415
 __mutex_lock_common kernel/locking/mutex.c:956 [inline]
 __mutex_lock+0x142/0x12d0 kernel/locking/mutex.c:1103
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1118
 ni_lock fs/ntfs3/ntfs_fs.h:959 [inline]
 ntfs_set_size+0xee/0x210 fs/ntfs3/inode.c:880
 ntfs_extend_ex+0x3b1/0x5c0 fs/ntfs3/file.c:466
 ntfs_file_write_iter+0x244/0x4e0 fs/ntfs3/file.c:1050
 call_write_iter include/linux/fs.h:1887 [inline]
 new_sync_write+0x348/0x6d0 fs/read_write.c:518
 vfs_write+0x408/0x5b0 fs/read_write.c:605
 ksys_write+0x11d/0x220 fs/read_write.c:658
 __do_sys_write fs/read_write.c:670 [inline]
 __se_sys_write fs/read_write.c:667 [inline]
 __x64_sys_write+0x6e/0xb0 fs/read_write.c:667
 do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fad69e95f67
Code: 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
RSP: 002b:00007ffc66bcfaa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fad69e95f67
RDX: 0000000000000004 RSI: 0000555d79dccba0 RDI: 0000000000000001
RBP: 0000555d79dccba0 R08: 000000000000000a R09: 00007fad69f67a60
R10: 0000000000000080 R11: 0000000000000246 R12: 0000000000000004
R13: 00007fad69f68520 R14: 0000000000000004 R15: 00007fad69f68720

Powered by blists - more mailing lists