From nobody Sun Oct 5 09:07:14 2025 Received: from mout-p-103.mailbox.org (mout-p-103.mailbox.org [80.241.56.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8F17329CB5A; Wed, 6 Aug 2025 17:55:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=80.241.56.161 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754502944; cv=none; b=qPh3XSFHoWMj7ib0qcG9AmXMFD6Pyswdp3L35YbC9qBJ2+9bDEl11xGkleCznj/+f4VQcL9Fu362adlxX23vPFB6hhvNkoqqnWlZIMzDmVuz7ggtf9C56EHhMJFH6gNmCVxk0ZS0333T8gYh/yrENXi6GVV0ZQnEeqOiPoeFHh4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754502944; c=relaxed/simple; bh=z68HCvfkXK90e/VOiKW5nRZ0qgXVCLpKrldZh1HS3so=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=iElFDAh8jWrM8yg/m0o4XBsHo6WsFNiHhtXlemfy7CiZphle3WCl1K/Ng1ulF2M+uxad9O0cQlp8OLNuuA19t69On/LEx9CLyalUYcTvF6+MoGTdl81r15TRe6CvAiB6XcijvaFcLGupONGzcQchrXVXxWix179LGXBWbkmD55g= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=cyphar.com; spf=pass smtp.mailfrom=cyphar.com; dkim=pass (2048-bit key) header.d=cyphar.com header.i=@cyphar.com header.b=pK/OvsSg; arc=none smtp.client-ip=80.241.56.161 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=cyphar.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=cyphar.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=cyphar.com header.i=@cyphar.com header.b="pK/OvsSg" Received: from smtp2.mailbox.org (smtp2.mailbox.org [10.196.197.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-103.mailbox.org (Postfix) with ESMTPS id 4bxyd52rDZz9slL; Wed, 6 Aug 2025 19:55:37 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cyphar.com; s=MBO0001; t=1754502937; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=TE0rtw3lb0X3gYduAmyvXOk6AuwnMINma8AtPhbNONI=; b=pK/OvsSgwSmb0JVhYJ3NPCyxxamZFKHXzBUonvb1WH0ixik/97pcXNdLP7IBXQnl4NK3Nv QyudSOwQVjkZF/DyeiuNEoZaljw5Bcxz/ayRu2St6OUFoxbOAIYPG41pG1FE9odkKZvipr KOSJEYKwsFfcpk4EVqU2lPDh7gsGfHCJO6qVo8igY25wJg6li4Solpq0vCwoZLdJ+h0Leq T37CddkZVRCSNf+cGRx6928gQhchsArT3XFPMFrw/XnJP2gjeYtzBflx2WNqjZ9W3CuldI E411yg20viNNk3jbNyuA/BFL/mOwR+klnHWhMtwYziL+L9r78HMPjb1E9hniaw== From: Aleksa Sarai Date: Thu, 07 Aug 2025 03:55:23 +1000 Subject: [PATCH v3 1/2] fscontext: do not consume log entries when returning -EMSGSIZE Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250807-fscontext-log-cleanups-v3-1-8d91d6242dc3@cyphar.com> References: <20250807-fscontext-log-cleanups-v3-0-8d91d6242dc3@cyphar.com> In-Reply-To: <20250807-fscontext-log-cleanups-v3-0-8d91d6242dc3@cyphar.com> To: Alexander Viro , Christian Brauner , Jan Kara , David Howells , Shuah Khan Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Aleksa Sarai , stable@vger.kernel.org X-Developer-Signature: v=1; a=openpgp-sha256; l=2838; i=cyphar@cyphar.com; h=from:subject:message-id; bh=z68HCvfkXK90e/VOiKW5nRZ0qgXVCLpKrldZh1HS3so=; b=owGbwMvMwCWmMf3Xpe0vXfIZT6slMWRMns7PE19l8n/CQtawrKZggcPTRT98Yz/iJjlpVfKJ3 6d/77RT7yhlYRDjYpAVU2TZ5ucZumn+4ivJn1aywcxhZQIZwsDFKQAT6Uxk+J+8UuzEq2xxjXD1 Cb9/18nULnYwMD4WV+Qz/5PZYamvyvsZ/ulOeZkmv5L9xfJ4xey3dtt6dGV/nhF5WL/H+fqlvx/ 6rfgA X-Developer-Key: i=cyphar@cyphar.com; a=openpgp; fpr=C9C370B246B09F6DBCFC744C34401015D1D2D386 Userspace generally expects APIs that return -EMSGSIZE to allow for them to adjust their buffer size and retry the operation. However, the fscontext log would previously clear the message even in the -EMSGSIZE case. Given that it is very cheap for us to check whether the buffer is too small before we remove the message from the ring buffer, let's just do that instead. While we're at it, refactor some fscontext_read() into a separate helper to make the ring buffer logic a bit easier to read. Fixes: 007ec26cdc9f ("vfs: Implement logging through fs_context") Cc: David Howells Cc: # v5.2+ Signed-off-by: Aleksa Sarai --- fs/fsopen.c | 54 ++++++++++++++++++++++++++++++------------------------ 1 file changed, 30 insertions(+), 24 deletions(-) diff --git a/fs/fsopen.c b/fs/fsopen.c index 1aaf4cb2afb2..538fdf814fbf 100644 --- a/fs/fsopen.c +++ b/fs/fsopen.c @@ -18,47 +18,53 @@ #include "internal.h" #include "mount.h" =20 +static inline const char *fetch_message_locked(struct fc_log *log, size_t = len, + bool *need_free) +{ + const char *p; + int index; + + if (unlikely(log->head =3D=3D log->tail)) + return ERR_PTR(-ENODATA); + + index =3D log->tail & (ARRAY_SIZE(log->buffer) - 1); + p =3D log->buffer[index]; + if (unlikely(strlen(p) > len)) + return ERR_PTR(-EMSGSIZE); + + log->buffer[index] =3D NULL; + *need_free =3D log->need_free & (1 << index); + log->need_free &=3D ~(1 << index); + log->tail++; + + return p; +} + /* * Allow the user to read back any error, warning or informational message= s. + * Only one message is returned for each read(2) call. */ static ssize_t fscontext_read(struct file *file, char __user *_buf, size_t len, loff_t *pos) { struct fs_context *fc =3D file->private_data; - struct fc_log *log =3D fc->log.log; - unsigned int logsize =3D ARRAY_SIZE(log->buffer); ssize_t ret; - char *p; + const char *p; bool need_free; - int index, n; + int n; =20 ret =3D mutex_lock_interruptible(&fc->uapi_mutex); if (ret < 0) return ret; - - if (log->head =3D=3D log->tail) { - mutex_unlock(&fc->uapi_mutex); - return -ENODATA; - } - - index =3D log->tail & (logsize - 1); - p =3D log->buffer[index]; - need_free =3D log->need_free & (1 << index); - log->buffer[index] =3D NULL; - log->need_free &=3D ~(1 << index); - log->tail++; + p =3D fetch_message_locked(fc->log.log, len, &need_free); mutex_unlock(&fc->uapi_mutex); + if (IS_ERR(p)) + return PTR_ERR(p); =20 - ret =3D -EMSGSIZE; n =3D strlen(p); - if (n > len) - goto err_free; - ret =3D -EFAULT; - if (copy_to_user(_buf, p, n) !=3D 0) - goto err_free; + if (copy_to_user(_buf, p, n)) + n =3D -EFAULT; ret =3D n; - -err_free: if (need_free) kfree(p); return ret; --=20 2.50.1 From nobody Sun Oct 5 09:07:14 2025 Received: from mout-p-102.mailbox.org (mout-p-102.mailbox.org [80.241.56.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2148B2BCF5D; Wed, 6 Aug 2025 17:55:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=80.241.56.152 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754502948; cv=none; b=Wx+XX6QYWuZeLyc48k7FI3wyT14sfmRX1+CW+7zsvn7J/lO0ffogdopnR6VTTAOQFfksiKbvBZEtasrGVmVbnXLejwkrY41N+KryRWppDyKGLW0KCEs4fdNlJl2Zv6GQ/mJsJki6ANabTmyA5daGxINRCUSQQWctZClPwDM1XRM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754502948; c=relaxed/simple; bh=YfzESCjmw7efFV3Bycvd9p6+JMPz/pBQ3JyWrH1QtCo=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=EeAdO4UMYtZTWgiDyNQ43LR1Pc7WdsuSm2Enftoi+jTuT2C+rHmAA9P4lf9Qq44Ihpd3hau2gMvJQ4nDIqJpr1HBd2u0tA7wBBz2JQLZSPLPD3e3vr0IWrm3ch3JpzTYg+PbhdEmg9eKuFSnspb1vfIt0kEvIJyluAamc+Z+ZcY= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=cyphar.com; spf=pass smtp.mailfrom=cyphar.com; dkim=pass (2048-bit key) header.d=cyphar.com header.i=@cyphar.com header.b=M3u0mtN8; arc=none smtp.client-ip=80.241.56.152 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=cyphar.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=cyphar.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=cyphar.com header.i=@cyphar.com header.b="M3u0mtN8" Received: from smtp2.mailbox.org (smtp2.mailbox.org [10.196.197.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-p-102.mailbox.org (Postfix) with ESMTPS id 4bxyd95hCLz9tmC; Wed, 6 Aug 2025 19:55:41 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cyphar.com; s=MBO0001; t=1754502941; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=GgHcJ8FhweBKsT5Y/D492w6gSm+YeJZzSPhVUGFdD20=; b=M3u0mtN8SUXUZdMrfkndbmCAWNckXJ1hVWL8pWTn0sSKc1gnbIhV7sEjDO7ojFIkXF3XJu +YSeuwWop84DbMG4rQ+0Y+sZShOh7lIRW24eFgWlIu+fkQy+6a3qfOCY2Nu20er/x/ZopH yXAfOFBlw9NOZR9DQEjYV/592tvIyA0617v1zdzBtwVijOtcrG72LpvkETZFDLt/O8b3F+ NzRpbnIJh4/1HvRe3fpwqahqkpZxIivt2tZ7w/DPJk9B0YwRwXcV49lZPI+a/TMD9UguJd GlUXNK2o3gNg43xWk1FMojyfFW73vw4ArusAr2sifhfJtyke2p14gUgPVNMhhw== From: Aleksa Sarai Date: Thu, 07 Aug 2025 03:55:24 +1000 Subject: [PATCH v3 2/2] selftests/filesystems: add basic fscontext log tests Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20250807-fscontext-log-cleanups-v3-2-8d91d6242dc3@cyphar.com> References: <20250807-fscontext-log-cleanups-v3-0-8d91d6242dc3@cyphar.com> In-Reply-To: <20250807-fscontext-log-cleanups-v3-0-8d91d6242dc3@cyphar.com> To: Alexander Viro , Christian Brauner , Jan Kara , David Howells , Shuah Khan Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Aleksa Sarai X-Developer-Signature: v=1; a=openpgp-sha256; l=5274; i=cyphar@cyphar.com; h=from:subject:message-id; bh=YfzESCjmw7efFV3Bycvd9p6+JMPz/pBQ3JyWrH1QtCo=; b=owGbwMvMwCWmMf3Xpe0vXfIZT6slMWRMns6/VGvj81OTt9x+yjlPIjT5+pOrtowLP96Pa7X6G TVj6WFG8Y5SFgYxLgZZMUWWbX6eoZvmL76S/GklG8wcViaQIQxcnAIwEYtVDP/ju2tfL3/Nsv7N u5XsH9q/SjGGpnpt9vtx5ccizq3n+/4sYWS4lqc/PZKtVSO9PrfxVzz71ev+NlFBNXdOuL49e9p z2RFWAA== X-Developer-Key: i=cyphar@cyphar.com; a=openpgp; fpr=C9C370B246B09F6DBCFC744C34401015D1D2D386 Signed-off-by: Aleksa Sarai --- tools/testing/selftests/filesystems/.gitignore | 1 + tools/testing/selftests/filesystems/Makefile | 2 +- tools/testing/selftests/filesystems/fclog.c | 130 +++++++++++++++++++++= ++++ 3 files changed, 132 insertions(+), 1 deletion(-) diff --git a/tools/testing/selftests/filesystems/.gitignore b/tools/testing= /selftests/filesystems/.gitignore index fcbdb1297e24..64ac0dfa46b7 100644 --- a/tools/testing/selftests/filesystems/.gitignore +++ b/tools/testing/selftests/filesystems/.gitignore @@ -1,6 +1,7 @@ # SPDX-License-Identifier: GPL-2.0-only dnotify_test devpts_pts +fclog file_stressor anon_inode_test kernfs_test diff --git a/tools/testing/selftests/filesystems/Makefile b/tools/testing/s= elftests/filesystems/Makefile index 73d4650af1a5..85427d7f19b9 100644 --- a/tools/testing/selftests/filesystems/Makefile +++ b/tools/testing/selftests/filesystems/Makefile @@ -1,7 +1,7 @@ # SPDX-License-Identifier: GPL-2.0 =20 CFLAGS +=3D $(KHDR_INCLUDES) -TEST_GEN_PROGS :=3D devpts_pts file_stressor anon_inode_test kernfs_test +TEST_GEN_PROGS :=3D devpts_pts file_stressor anon_inode_test kernfs_test f= clog TEST_GEN_PROGS_EXTENDED :=3D dnotify_test =20 include ../lib.mk diff --git a/tools/testing/selftests/filesystems/fclog.c b/tools/testing/se= lftests/filesystems/fclog.c new file mode 100644 index 000000000000..912a8b755c3b --- /dev/null +++ b/tools/testing/selftests/filesystems/fclog.c @@ -0,0 +1,130 @@ +// SPDX-License-Identifier: GPL-2.0-or-later +/* + * Author: Aleksa Sarai + * Copyright (C) 2025 SUSE LLC. + */ + +#include +#include +#include +#include +#include +#include +#include +#include + +#include "../kselftest_harness.h" + +#define ASSERT_ERRNO(expected, _t, seen) \ + __EXPECT(expected, #expected, \ + ({__typeof__(seen) _tmp_seen =3D (seen); \ + _tmp_seen >=3D 0 ? _tmp_seen : -errno; }), #seen, _t, 1) + +#define ASSERT_ERRNO_EQ(expected, seen) \ + ASSERT_ERRNO(expected, =3D=3D, seen) + +#define ASSERT_SUCCESS(seen) \ + ASSERT_ERRNO(0, <=3D, seen) + +FIXTURE(ns) +{ + int host_mntns; +}; + +FIXTURE_SETUP(ns) +{ + /* Stash the old mntns. */ + self->host_mntns =3D open("/proc/self/ns/mnt", O_RDONLY|O_CLOEXEC); + ASSERT_SUCCESS(self->host_mntns); + + /* Create a new mount namespace and make it private. */ + ASSERT_SUCCESS(unshare(CLONE_NEWNS)); + ASSERT_SUCCESS(mount(NULL, "/", NULL, MS_PRIVATE|MS_REC, NULL)); +} + +FIXTURE_TEARDOWN(ns) +{ + ASSERT_SUCCESS(setns(self->host_mntns, CLONE_NEWNS)); + ASSERT_SUCCESS(close(self->host_mntns)); +} + +TEST_F(ns, fscontext_log_enodata) +{ + int fsfd =3D fsopen("tmpfs", FSOPEN_CLOEXEC); + ASSERT_SUCCESS(fsfd); + + /* A brand new fscontext has no log entries. */ + char buf[128] =3D {}; + for (int i =3D 0; i < 16; i++) + ASSERT_ERRNO_EQ(-ENODATA, read(fsfd, buf, sizeof(buf))); + + ASSERT_SUCCESS(close(fsfd)); +} + +TEST_F(ns, fscontext_log_errorfc) +{ + int fsfd =3D fsopen("tmpfs", FSOPEN_CLOEXEC); + ASSERT_SUCCESS(fsfd); + + ASSERT_ERRNO_EQ(-EINVAL, fsconfig(fsfd, FSCONFIG_SET_STRING, "invalid-arg= ", "123", 0)); + + char buf[128] =3D {}; + ASSERT_SUCCESS(read(fsfd, buf, sizeof(buf))); + EXPECT_STREQ("e tmpfs: Unknown parameter 'invalid-arg'\n", buf); + + /* The message has been consumed. */ + ASSERT_ERRNO_EQ(-ENODATA, read(fsfd, buf, sizeof(buf))); + ASSERT_SUCCESS(close(fsfd)); +} + +TEST_F(ns, fscontext_log_errorfc_after_fsmount) +{ + int fsfd =3D fsopen("tmpfs", FSOPEN_CLOEXEC); + ASSERT_SUCCESS(fsfd); + + ASSERT_ERRNO_EQ(-EINVAL, fsconfig(fsfd, FSCONFIG_SET_STRING, "invalid-arg= ", "123", 0)); + + ASSERT_SUCCESS(fsconfig(fsfd, FSCONFIG_CMD_CREATE, NULL, NULL, 0)); + int mfd =3D fsmount(fsfd, FSMOUNT_CLOEXEC, MOUNT_ATTR_NOEXEC | MOUNT_ATTR= _NOSUID); + ASSERT_SUCCESS(mfd); + ASSERT_SUCCESS(move_mount(mfd, "", AT_FDCWD, "/tmp", MOVE_MOUNT_F_EMPTY_P= ATH)); + + /* + * The fscontext log should still contain data even after + * FSCONFIG_CMD_CREATE and fsmount(). + */ + char buf[128] =3D {}; + ASSERT_SUCCESS(read(fsfd, buf, sizeof(buf))); + EXPECT_STREQ("e tmpfs: Unknown parameter 'invalid-arg'\n", buf); + + /* The message has been consumed. */ + ASSERT_ERRNO_EQ(-ENODATA, read(fsfd, buf, sizeof(buf))); + ASSERT_SUCCESS(close(fsfd)); +} + +TEST_F(ns, fscontext_log_emsgsize) +{ + int fsfd =3D fsopen("tmpfs", FSOPEN_CLOEXEC); + ASSERT_SUCCESS(fsfd); + + ASSERT_ERRNO_EQ(-EINVAL, fsconfig(fsfd, FSCONFIG_SET_STRING, "invalid-arg= ", "123", 0)); + + char buf[128] =3D {}; + /* + * Attempting to read a message with too small a buffer should not + * result in the message getting consumed. + */ + ASSERT_ERRNO_EQ(-EMSGSIZE, read(fsfd, buf, 0)); + ASSERT_ERRNO_EQ(-EMSGSIZE, read(fsfd, buf, 1)); + for (int i =3D 0; i < 16; i++) + ASSERT_ERRNO_EQ(-EMSGSIZE, read(fsfd, buf, 16)); + + ASSERT_SUCCESS(read(fsfd, buf, sizeof(buf))); + EXPECT_STREQ("e tmpfs: Unknown parameter 'invalid-arg'\n", buf); + + /* The message has been consumed. */ + ASSERT_ERRNO_EQ(-ENODATA, read(fsfd, buf, sizeof(buf))); + ASSERT_SUCCESS(close(fsfd)); +} + +TEST_HARNESS_MAIN --=20 2.50.1