Linux NFS development
 help / color / mirror / Atom feed
From: "J. Bruce Fields" <bfields@fieldses.org>
To: Jeff Layton <jlayton@poochiereds.net>
Cc: Anders Blomdell <anders.blomdell@control.lth.se>,
	linux-nfs@vger.kernel.org
Subject: Re: NULL pointer dereference in nfs_delegation_find_inode
Date: Fri, 23 Oct 2015 15:21:43 -0400	[thread overview]
Message-ID: <20151023192143.GA16137@fieldses.org> (raw)
In-Reply-To: <20151023151712.6cec9529@synchrony.poochiereds.net>

On Fri, Oct 23, 2015 at 03:17:12PM -0400, Jeff Layton wrote:
> On Fri, 23 Oct 2015 14:28:58 +0200
> Anders Blomdell <anders.blomdell@control.lth.se> wrote:
> 
> > On 2015-10-23 13:28, Jeff Layton wrote:
> > > On Fri, 23 Oct 2015 10:00:51 +0200
> > > Anders Blomdell <anders.blomdell@control.lth.se> wrote:
> > > 
> > >> We occasionally (about once every 2-4 weeks on 1 of a 100 machenes) get 
> > >>
> > >>   BUG: unable to handle kernel NULL pointer dereference at 0000000000000548
> > >>   IP: [<ffffffffa0651744>] nfs_delegation_find_inode+0x64/0x150 [nfsv4]
> > >>
> > >> the attached bug is from 4.1.8-100.fc21, but I have seen it on 4.1.5-100.fc21 as
> > >> well. Right now I have a realtime modified (xenomai.org) 3.8.13 system that exhibits
> > >> the problem more frequently, and that leads me to belive that the problem is
> > >> a data race problem, and by instrumenting fs/nfs/delegation.c (3.8.13) to:
> > >>
> > >>
> > >>   static struct inode *
> > >>   nfs_delegation_find_inode_server(struct nfs_server *server,
> > >> 				 const struct nfs_fh *fhandle)
> > >>   {
> > >> 	  struct nfs_delegation *delegation;
> > >> 	  struct inode *res = NULL;
> > >>
> > >>  	  printk(KERN_ERR "server = %p\n", server);
> > >> 	  list_for_each_entry_rcu(delegation, &server->delegations, super_list) {
> > >> 		  printk(KERN_ERR "delegation = %p\n", delegation);
> > >> 		  printk(KERN_ERR "delegation->lock = %p\n", delegation->lock);
> > >> 		  spin_lock(&delegation->lock);
> > >> 		  printk(KERN_ERR "delegation->inode = %p\n", delegation->inode);
> > >> 		  if (delegation->inode != NULL) {
> > >> 			  printk(KERN_ERR "NFS_I(delegation->inode) = %p", NFS_I(delegation->inode));
> > >> 			  printk(KERN_ERR "NFS_I(delegation->inode)->fh = %p", NFS_I(delegation->inode)->fh);
> > >> 		  }
> > >> 		  if (delegation->inode != NULL &&
> > >> 		      nfs_compare_fh(fhandle, &NFS_I(delegation->inode)->fh) == 0) {
> > >> 			  res = igrab(delegation->inode);
> > >> 		  }
> > >> 		  spin_unlock(&delegation->lock);
> > >> 		  if (res != NULL)
> > >> 			  break;
> > >> 	  }
> > >> 	  return res;
> > >>   }
> > >>
> > >> the system dies with (delegation.c compiled with -O0):
> > >>
> > >>   server = ffff8803dee58458
> > >>   delegation =           (null)
> > >>   BUG: unable to handle kernel NULL pointer dereference at 0000000000000050
> > >>   IP: [<ffffffffa08924ae>] nfs_delegation_find_inode_server+0x80/0x1e0 [nfsv4]
> > >>
> > >> Anybody thet can give me a hint how to write a program that gives rise to multiple 
> > >> delegations to further investigate this issue?
> > >>
> > >> Regards
> > >>
> > >> Anders Blomdell
> > >>
> > > 
> > > Huh. That delegation pointer really never be NULL. 
> >                                       ^should
> > > I'm unclear on how
> > > that could even happen in the context of a list_for_each_entry_rcu
> > > loop. Oh, but super_list is the first struct member in nfs_delegation
> > > so it probably means that server->delegations was NULL.
> > > 
> > > Maybe this is a use-after free of some sort or there's a memory
> > > scribble involved?
> > That is my guess, and the realtime patch used probably makes the window of opportunity
> > much larger (since the bug happens every few hours instead of every few years on average).
> > 
> > 
> > > You might want to consider turning up some memory
> > > debugging options while reproducing this.
> > Any hints on what options? Could/should they beturned on for the NFS module only
> > 
> 
> If your kernel uses SLUB then you can poke around with the options
> under /sys/kernel/slab. Figure out which cache that object belongs too
> (it appears to be kmalloc'ed) and enable stuff like "poison" and
> red_zone.
> 
> If you can get a vmcore then you could also open it up with the
> debugger and see what at "server" object looks like. Has it been freed?
> Does it belong to the right slabcache? etc...
> 
> > Any hints of what file operations to use to force delegations to happen?
> > 
> 
> You can't really force it as it's 100% up to the server. They are
> handed out at OPEN time. So any open-heavy workload should help
> reproduce it.

Also if it's a Linux server it will only give out delegations on
read-only opens.  (But I didn't notice if you said what the server was.)

--b.

      reply	other threads:[~2015-10-23 19:21 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-10-23  8:00 NULL pointer dereference in nfs_delegation_find_inode Anders Blomdell
2015-10-23 11:28 ` Jeff Layton
2015-10-23 12:28   ` Anders Blomdell
2015-10-23 19:17     ` Jeff Layton
2015-10-23 19:21       ` J. Bruce Fields [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20151023192143.GA16137@fieldses.org \
    --to=bfields@fieldses.org \
    --cc=anders.blomdell@control.lth.se \
    --cc=jlayton@poochiereds.net \
    --cc=linux-nfs@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox