On Fri, Apr 28, 2023 at 03:50:20PM -0300, Jason Gunthorpe wrote: > > Do we think we can still trigger a kernel crash, or maybe even some > > more exciting like an arbitrary buffer overrun, via the > > process_vm_writev(2) system call into a file-backed mmap'ed region? I paged back into my memory the details, and (un)fortunately(?) it probably can't be turned into high severity security exploit; it's "just" a silent case of data loss. (Which is *so* much better.... :-) There was a reliable reproducer which was found by Syzkaller, that didn't require any kind of exotic hardware or setup[1], and we ultimately kluged a workaround in commit cc5095747edf ("ext4: don't BUG if someone dirty pages without asking ext4 first"). [1] https://lore.kernel.org/all/Yg0m6IjcNmfaSokM@xxxxxxxxxx/ Commit cc5095747edf had the (un)fortunate(?) side effect that GUP writes to ext4 file-backed mappings no longer would cause random low-probability crashes on large installations using RDMA, which has apparently removed some of the motivation of really fixing the problem instead of papering over it. The good news is that I'm no longer getting complaints from syzbot for this issue, and *I* don't have to support anyone trying to use RDMA into file-backed mappings. :-) In any case, the file system maintainers' position (mine and I doubt Dave Chinner's position has changed) is that if you write to file-backed mappings via GUP/RDMA/process_vm_writev, and it causes silent data corruption, you get to keep both pieces, and don't go looking for us for anything other than sympathy... - Ted