* [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d()
@ 2017-10-17 16:36 Coly Li
2017-10-17 20:03 ` NeilBrown
0 siblings, 1 reply; 8+ messages in thread
From: Coly Li @ 2017-10-17 16:36 UTC (permalink / raw)
To: shli, neilb, linux-raid; +Cc: Coly Li
We have a bug report about NULL dereference in md raid10 code. The
operations are,
- Create a raid10 device
- add a spare disk
- disconnect one of the online disks from the raid10 device
- wait to the recovery happens on the spare disk
- remove the spare disk which is recovering
And sometimes a kernel oops of NULL dereference in md raid10 module can
be observed, and crash tool reports the following information:
> (gdb) list *(raid10d+0xad6)
> 0x5de6 is in raid10d (../drivers/md/raid10.c:2300).
> 2295 * the latter is free to free wbio2.
> 2296 */
> 2297 if (wbio2 && !wbio2->bi_end_io)
> 2298 wbio2 = NULL;
> 2299 if (wbio->bi_end_io) {
> 2300 atomic_inc(&conf->mirrors[d].rdev->nr_pending);
> 2301 md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
> 2302 generic_make_request(wbio);
> 2303 }
> 2304 if (wbio2) {
At line 2300, conf->mirrors[d].rdev is NULL, this causes a NULL pointer
dereference to conf->mirrors[d].rdev->nr_pending. After reading previous
raid10 patches, I find conf->mirrors[d].rdev can be NULL at any point
unless,
- a counted reference is held
- ->reconfig_mutex is held, or
- rcu_read_lock() is held
In context of kernel thread raid10d, non of the above conditions happens,
therefore using rcu to protect the access to conf->mirrors[].rdev and
conf->mirrors[].replacement pointers is necessary.
This patch is an effort to add rcu protection in raid10d() code path,
which including the following sub-routines,
- handle_write_completed()
- reshape_request_write()
- sync_request_write()
- recovery_request_write()
Because the reported issue can not be always reproduced, I am still
working on verification. This RFC patch is sent out for early feedback
in case there is something I missed in the fix.
Thanks in advance for the review and comments.
Signed-off-by: Coly Li <colyli@suse.de>
Reported-by: Tomasz Majchrzak <tomasz.majchrzak@intel.com>
---
drivers/md/raid10.c | 99 +++++++++++++++++++++++++++++++++++++++++++----------
1 file changed, 80 insertions(+), 19 deletions(-)
diff --git a/drivers/md/raid10.c b/drivers/md/raid10.c
index 374df5796649..fe9ce25ffc08 100644
--- a/drivers/md/raid10.c
+++ b/drivers/md/raid10.c
@@ -2041,13 +2041,25 @@ static void sync_request_write(struct mddev *mddev, struct r10bio *r10_bio)
tpages = get_resync_pages(tbio)->pages;
d = r10_bio->devs[i].devnum;
- rdev = conf->mirrors[d].rdev;
+ rcu_read_lock();
+ rdev = rcu_dereference(conf->mirrors[d].rdev);
+ if (rdev == NULL) {
+ rcu_read_unlock();
+ continue;
+ }
+
if (!r10_bio->devs[i].bio->bi_status) {
/* We know that the bi_io_vec layout is the same for
* both 'first' and 'i', so we just compare them.
* All vec entries are PAGE_SIZE;
*/
int sectors = r10_bio->sectors;
+
+ /*
+ * rdev is not referenced here, don't need rcu lock
+ * any more.
+ */
+ rcu_read_unlock();
for (j = 0; j < vcnt; j++) {
int len = PAGE_SIZE;
if (sectors < (len / 512))
@@ -2067,8 +2079,10 @@ static void sync_request_write(struct mddev *mddev, struct r10bio *r10_bio)
} else if (test_bit(FailFast, &rdev->flags)) {
/* Just give up on this device */
md_error(rdev->mddev, rdev);
+ rcu_read_unlock();
continue;
}
+ rcu_read_unlock();
/* Ok, we need to write this bio, either to correct an
* inconsistency or to correct an unreadable block.
* First we need to fixup bv_offset, bv_len and
@@ -2087,14 +2101,21 @@ static void sync_request_write(struct mddev *mddev, struct r10bio *r10_bio)
bio_copy_data(tbio, fbio);
- atomic_inc(&conf->mirrors[d].rdev->nr_pending);
+ rcu_read_lock();
+ rdev = rcu_dereference(conf->mirrors[d].rdev);
+ if (rdev == NULL) {
+ rcu_read_unlock();
+ continue;
+ }
+ atomic_inc(&rdev->nr_pending);
atomic_inc(&r10_bio->remaining);
- md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(tbio));
+ md_sync_acct(rdev->bdev, bio_sectors(tbio));
- if (test_bit(FailFast, &conf->mirrors[d].rdev->flags))
+ if (test_bit(FailFast, &rdev->flags))
tbio->bi_opf |= MD_FAILFAST;
- tbio->bi_iter.bi_sector += conf->mirrors[d].rdev->data_offset;
- bio_set_dev(tbio, conf->mirrors[d].rdev->bdev);
+ tbio->bi_iter.bi_sector += rdev->data_offset;
+ bio_set_dev(tbio, rdev->bdev);
+ rcu_read_unlock();
generic_make_request(tbio);
}
@@ -2222,6 +2243,7 @@ static void recovery_request_write(struct mddev *mddev, struct r10bio *r10_bio)
struct r10conf *conf = mddev->private;
int d;
struct bio *wbio, *wbio2;
+ struct md_rdev *rdev, *replacement;
if (!test_bit(R10BIO_Uptodate, &r10_bio->state)) {
fix_recovery_read_error(r10_bio);
@@ -2236,6 +2258,8 @@ static void recovery_request_write(struct mddev *mddev, struct r10bio *r10_bio)
d = r10_bio->devs[1].devnum;
wbio = r10_bio->devs[1].bio;
wbio2 = r10_bio->devs[1].repl_bio;
+
+
/* Need to test wbio2->bi_end_io before we call
* generic_make_request as if the former is NULL,
* the latter is free to free wbio2.
@@ -2243,15 +2267,25 @@ static void recovery_request_write(struct mddev *mddev, struct r10bio *r10_bio)
if (wbio2 && !wbio2->bi_end_io)
wbio2 = NULL;
if (wbio->bi_end_io) {
- atomic_inc(&conf->mirrors[d].rdev->nr_pending);
- md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
- generic_make_request(wbio);
+ rcu_read_lock();
+ rdev = rcu_dereference(conf->mirrors[d].rdev);
+ if (rdev) {
+ atomic_inc(&rdev->nr_pending);
+ md_sync_acct(rdev->bdev, bio_sectors(wbio));
+ generic_make_request(wbio);
+ }
+ rcu_read_unlock();
}
if (wbio2) {
- atomic_inc(&conf->mirrors[d].replacement->nr_pending);
- md_sync_acct(conf->mirrors[d].replacement->bdev,
+ rcu_read_lock();
+ replacement = rcu_dereference(conf->mirrors[d].replacement);
+ if (replacement) {
+ atomic_inc(&replacement->nr_pending);
+ md_sync_acct(replacement->bdev,
bio_sectors(wbio2));
- generic_make_request(wbio2);
+ generic_make_request(wbio2);
+ }
+ rcu_read_unlock();
}
}
@@ -2620,9 +2654,17 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
test_bit(R10BIO_IsRecover, &r10_bio->state)) {
for (m = 0; m < conf->copies; m++) {
int dev = r10_bio->devs[m].devnum;
- rdev = conf->mirrors[dev].rdev;
- if (r10_bio->devs[m].bio == NULL)
+
+ rcu_read_lock();
+ rdev = rcu_dereference(conf->mirrors[dev].rdev);
+ if (rdev == NULL) {
+ rcu_read_unlock();
+ continue;
+ }
+ if (r10_bio->devs[m].bio == NULL) {
+ rcu_read_unlock();
continue;
+ }
if (!r10_bio->devs[m].bio->bi_status) {
rdev_clear_badblocks(
rdev,
@@ -2635,9 +2677,16 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
r10_bio->sectors, 0))
md_error(conf->mddev, rdev);
}
- rdev = conf->mirrors[dev].replacement;
- if (r10_bio->devs[m].repl_bio == NULL)
+
+ rdev = rcu_dereference(conf->mirrors[dev].replacement);
+ if (rdev == NULL) {
+ rcu_read_unlock();
continue;
+ }
+ if (r10_bio->devs[m].repl_bio == NULL) {
+ rcu_read_unlock();
+ continue;
+ }
if (!r10_bio->devs[m].repl_bio->bi_status) {
rdev_clear_badblocks(
@@ -2651,6 +2700,7 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
r10_bio->sectors, 0))
md_error(conf->mddev, rdev);
}
+ rcu_read_unlock();
}
put_buf(r10_bio);
} else {
@@ -2658,7 +2708,13 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
for (m = 0; m < conf->copies; m++) {
int dev = r10_bio->devs[m].devnum;
struct bio *bio = r10_bio->devs[m].bio;
- rdev = conf->mirrors[dev].rdev;
+
+ rcu_read_lock();
+ rdev = rcu_dereference(conf->mirrors[dev].rdev);
+ if (rdev == NULL) {
+ rcu_read_unlock();
+ continue;
+ }
if (bio == IO_MADE_GOOD) {
rdev_clear_badblocks(
rdev,
@@ -2675,14 +2731,19 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
rdev_dec_pending(rdev, conf->mddev);
}
bio = r10_bio->devs[m].repl_bio;
- rdev = conf->mirrors[dev].replacement;
- if (rdev && bio == IO_MADE_GOOD) {
+ rdev = rcu_dereference(conf->mirrors[dev].replacement);
+ if (rdev == NULL) {
+ rcu_read_unlock();
+ continue;
+ }
+ if (bio == IO_MADE_GOOD) {
rdev_clear_badblocks(
rdev,
r10_bio->devs[m].addr,
r10_bio->sectors, 0);
rdev_dec_pending(rdev, conf->mddev);
}
+ rcu_read_unlock();
}
if (fail) {
spin_lock_irq(&conf->device_lock);
--
2.13.6
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d()
2017-10-17 16:36 [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d() Coly Li
@ 2017-10-17 20:03 ` NeilBrown
2017-10-18 23:06 ` NeilBrown
0 siblings, 1 reply; 8+ messages in thread
From: NeilBrown @ 2017-10-17 20:03 UTC (permalink / raw)
To: shli, linux-raid; +Cc: Coly Li
[-- Attachment #1: Type: text/plain, Size: 10247 bytes --]
On Wed, Oct 18 2017, Coly Li wrote:
> We have a bug report about NULL dereference in md raid10 code. The
> operations are,
> - Create a raid10 device
> - add a spare disk
> - disconnect one of the online disks from the raid10 device
> - wait to the recovery happens on the spare disk
> - remove the spare disk which is recovering
> And sometimes a kernel oops of NULL dereference in md raid10 module can
> be observed, and crash tool reports the following information:
>> (gdb) list *(raid10d+0xad6)
>> 0x5de6 is in raid10d (../drivers/md/raid10.c:2300).
>> 2295 * the latter is free to free wbio2.
>> 2296 */
>> 2297 if (wbio2 && !wbio2->bi_end_io)
>> 2298 wbio2 = NULL;
>> 2299 if (wbio->bi_end_io) {
>> 2300 atomic_inc(&conf->mirrors[d].rdev->nr_pending);
>> 2301 md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
>> 2302 generic_make_request(wbio);
>> 2303 }
>> 2304 if (wbio2) {
> At line 2300, conf->mirrors[d].rdev is NULL, this causes a NULL pointer
> dereference to conf->mirrors[d].rdev->nr_pending. After reading previous
> raid10 patches, I find conf->mirrors[d].rdev can be NULL at any point
> unless,
> - a counted reference is held
> - ->reconfig_mutex is held, or
> - rcu_read_lock() is held
There is one other condition: MD_RECOVERY_RUNNING is set (without
MD_RECOVERY_DONE).
mirrors[d].rdev is only set to NULL by ->hot_remove_disk() which is only
called from remove_and_add_spares(), and that is never called while
resync/recovery/reshape is happening.
So there is no need for RCU protection here.
Only ... remove_and_add_spares() *can* sometimes be called during
resync -
Commit: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
added a called to remove_and_add_spares() when "remove" is written to
the device/state attribute. That was wrong.
This:
} else if (cmd_match(buf, "remove")) {
- if (rdev->mddev->pers) {
+ if (rdev->mddev->pers &&
+ !test_bit(MD_RECOVERY_RECOVER, &mddev->recovery)) {
clear_bit(Blocked, &rdev->flags);
remove_and_add_spares(rdev->mddev, rdev);
should fix it.
Thanks,
NeilBrown
> In context of kernel thread raid10d, non of the above conditions happens,
> therefore using rcu to protect the access to conf->mirrors[].rdev and
> conf->mirrors[].replacement pointers is necessary.
>
> This patch is an effort to add rcu protection in raid10d() code path,
> which including the following sub-routines,
> - handle_write_completed()
> - reshape_request_write()
> - sync_request_write()
> - recovery_request_write()
>
> Because the reported issue can not be always reproduced, I am still
> working on verification. This RFC patch is sent out for early feedback
> in case there is something I missed in the fix.
>
> Thanks in advance for the review and comments.
>
> Signed-off-by: Coly Li <colyli@suse.de>
> Reported-by: Tomasz Majchrzak <tomasz.majchrzak@intel.com>
> ---
> drivers/md/raid10.c | 99 +++++++++++++++++++++++++++++++++++++++++++----------
> 1 file changed, 80 insertions(+), 19 deletions(-)
>
> diff --git a/drivers/md/raid10.c b/drivers/md/raid10.c
> index 374df5796649..fe9ce25ffc08 100644
> --- a/drivers/md/raid10.c
> +++ b/drivers/md/raid10.c
> @@ -2041,13 +2041,25 @@ static void sync_request_write(struct mddev *mddev, struct r10bio *r10_bio)
>
> tpages = get_resync_pages(tbio)->pages;
> d = r10_bio->devs[i].devnum;
> - rdev = conf->mirrors[d].rdev;
> + rcu_read_lock();
> + rdev = rcu_dereference(conf->mirrors[d].rdev);
> + if (rdev == NULL) {
> + rcu_read_unlock();
> + continue;
> + }
> +
> if (!r10_bio->devs[i].bio->bi_status) {
> /* We know that the bi_io_vec layout is the same for
> * both 'first' and 'i', so we just compare them.
> * All vec entries are PAGE_SIZE;
> */
> int sectors = r10_bio->sectors;
> +
> + /*
> + * rdev is not referenced here, don't need rcu lock
> + * any more.
> + */
> + rcu_read_unlock();
> for (j = 0; j < vcnt; j++) {
> int len = PAGE_SIZE;
> if (sectors < (len / 512))
> @@ -2067,8 +2079,10 @@ static void sync_request_write(struct mddev *mddev, struct r10bio *r10_bio)
> } else if (test_bit(FailFast, &rdev->flags)) {
> /* Just give up on this device */
> md_error(rdev->mddev, rdev);
> + rcu_read_unlock();
> continue;
> }
> + rcu_read_unlock();
> /* Ok, we need to write this bio, either to correct an
> * inconsistency or to correct an unreadable block.
> * First we need to fixup bv_offset, bv_len and
> @@ -2087,14 +2101,21 @@ static void sync_request_write(struct mddev *mddev, struct r10bio *r10_bio)
>
> bio_copy_data(tbio, fbio);
>
> - atomic_inc(&conf->mirrors[d].rdev->nr_pending);
> + rcu_read_lock();
> + rdev = rcu_dereference(conf->mirrors[d].rdev);
> + if (rdev == NULL) {
> + rcu_read_unlock();
> + continue;
> + }
> + atomic_inc(&rdev->nr_pending);
> atomic_inc(&r10_bio->remaining);
> - md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(tbio));
> + md_sync_acct(rdev->bdev, bio_sectors(tbio));
>
> - if (test_bit(FailFast, &conf->mirrors[d].rdev->flags))
> + if (test_bit(FailFast, &rdev->flags))
> tbio->bi_opf |= MD_FAILFAST;
> - tbio->bi_iter.bi_sector += conf->mirrors[d].rdev->data_offset;
> - bio_set_dev(tbio, conf->mirrors[d].rdev->bdev);
> + tbio->bi_iter.bi_sector += rdev->data_offset;
> + bio_set_dev(tbio, rdev->bdev);
> + rcu_read_unlock();
> generic_make_request(tbio);
> }
>
> @@ -2222,6 +2243,7 @@ static void recovery_request_write(struct mddev *mddev, struct r10bio *r10_bio)
> struct r10conf *conf = mddev->private;
> int d;
> struct bio *wbio, *wbio2;
> + struct md_rdev *rdev, *replacement;
>
> if (!test_bit(R10BIO_Uptodate, &r10_bio->state)) {
> fix_recovery_read_error(r10_bio);
> @@ -2236,6 +2258,8 @@ static void recovery_request_write(struct mddev *mddev, struct r10bio *r10_bio)
> d = r10_bio->devs[1].devnum;
> wbio = r10_bio->devs[1].bio;
> wbio2 = r10_bio->devs[1].repl_bio;
> +
> +
> /* Need to test wbio2->bi_end_io before we call
> * generic_make_request as if the former is NULL,
> * the latter is free to free wbio2.
> @@ -2243,15 +2267,25 @@ static void recovery_request_write(struct mddev *mddev, struct r10bio *r10_bio)
> if (wbio2 && !wbio2->bi_end_io)
> wbio2 = NULL;
> if (wbio->bi_end_io) {
> - atomic_inc(&conf->mirrors[d].rdev->nr_pending);
> - md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
> - generic_make_request(wbio);
> + rcu_read_lock();
> + rdev = rcu_dereference(conf->mirrors[d].rdev);
> + if (rdev) {
> + atomic_inc(&rdev->nr_pending);
> + md_sync_acct(rdev->bdev, bio_sectors(wbio));
> + generic_make_request(wbio);
> + }
> + rcu_read_unlock();
> }
> if (wbio2) {
> - atomic_inc(&conf->mirrors[d].replacement->nr_pending);
> - md_sync_acct(conf->mirrors[d].replacement->bdev,
> + rcu_read_lock();
> + replacement = rcu_dereference(conf->mirrors[d].replacement);
> + if (replacement) {
> + atomic_inc(&replacement->nr_pending);
> + md_sync_acct(replacement->bdev,
> bio_sectors(wbio2));
> - generic_make_request(wbio2);
> + generic_make_request(wbio2);
> + }
> + rcu_read_unlock();
> }
> }
>
> @@ -2620,9 +2654,17 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
> test_bit(R10BIO_IsRecover, &r10_bio->state)) {
> for (m = 0; m < conf->copies; m++) {
> int dev = r10_bio->devs[m].devnum;
> - rdev = conf->mirrors[dev].rdev;
> - if (r10_bio->devs[m].bio == NULL)
> +
> + rcu_read_lock();
> + rdev = rcu_dereference(conf->mirrors[dev].rdev);
> + if (rdev == NULL) {
> + rcu_read_unlock();
> + continue;
> + }
> + if (r10_bio->devs[m].bio == NULL) {
> + rcu_read_unlock();
> continue;
> + }
> if (!r10_bio->devs[m].bio->bi_status) {
> rdev_clear_badblocks(
> rdev,
> @@ -2635,9 +2677,16 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
> r10_bio->sectors, 0))
> md_error(conf->mddev, rdev);
> }
> - rdev = conf->mirrors[dev].replacement;
> - if (r10_bio->devs[m].repl_bio == NULL)
> +
> + rdev = rcu_dereference(conf->mirrors[dev].replacement);
> + if (rdev == NULL) {
> + rcu_read_unlock();
> continue;
> + }
> + if (r10_bio->devs[m].repl_bio == NULL) {
> + rcu_read_unlock();
> + continue;
> + }
>
> if (!r10_bio->devs[m].repl_bio->bi_status) {
> rdev_clear_badblocks(
> @@ -2651,6 +2700,7 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
> r10_bio->sectors, 0))
> md_error(conf->mddev, rdev);
> }
> + rcu_read_unlock();
> }
> put_buf(r10_bio);
> } else {
> @@ -2658,7 +2708,13 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
> for (m = 0; m < conf->copies; m++) {
> int dev = r10_bio->devs[m].devnum;
> struct bio *bio = r10_bio->devs[m].bio;
> - rdev = conf->mirrors[dev].rdev;
> +
> + rcu_read_lock();
> + rdev = rcu_dereference(conf->mirrors[dev].rdev);
> + if (rdev == NULL) {
> + rcu_read_unlock();
> + continue;
> + }
> if (bio == IO_MADE_GOOD) {
> rdev_clear_badblocks(
> rdev,
> @@ -2675,14 +2731,19 @@ static void handle_write_completed(struct r10conf *conf, struct r10bio *r10_bio)
> rdev_dec_pending(rdev, conf->mddev);
> }
> bio = r10_bio->devs[m].repl_bio;
> - rdev = conf->mirrors[dev].replacement;
> - if (rdev && bio == IO_MADE_GOOD) {
> + rdev = rcu_dereference(conf->mirrors[dev].replacement);
> + if (rdev == NULL) {
> + rcu_read_unlock();
> + continue;
> + }
> + if (bio == IO_MADE_GOOD) {
> rdev_clear_badblocks(
> rdev,
> r10_bio->devs[m].addr,
> r10_bio->sectors, 0);
> rdev_dec_pending(rdev, conf->mddev);
> }
> + rcu_read_unlock();
> }
> if (fail) {
> spin_lock_irq(&conf->device_lock);
> --
> 2.13.6
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d()
2017-10-17 20:03 ` NeilBrown
@ 2017-10-18 23:06 ` NeilBrown
2017-11-17 20:03 ` Shaohua Li
0 siblings, 1 reply; 8+ messages in thread
From: NeilBrown @ 2017-10-18 23:06 UTC (permalink / raw)
To: shli, linux-raid; +Cc: Coly Li
[-- Attachment #1: Type: text/plain, Size: 4064 bytes --]
On Wed, Oct 18 2017, NeilBrown wrote:
> On Wed, Oct 18 2017, Coly Li wrote:
>
>> We have a bug report about NULL dereference in md raid10 code. The
>> operations are,
>> - Create a raid10 device
>> - add a spare disk
>> - disconnect one of the online disks from the raid10 device
>> - wait to the recovery happens on the spare disk
>> - remove the spare disk which is recovering
>> And sometimes a kernel oops of NULL dereference in md raid10 module can
>> be observed, and crash tool reports the following information:
>>> (gdb) list *(raid10d+0xad6)
>>> 0x5de6 is in raid10d (../drivers/md/raid10.c:2300).
>>> 2295 * the latter is free to free wbio2.
>>> 2296 */
>>> 2297 if (wbio2 && !wbio2->bi_end_io)
>>> 2298 wbio2 = NULL;
>>> 2299 if (wbio->bi_end_io) {
>>> 2300 atomic_inc(&conf->mirrors[d].rdev->nr_pending);
>>> 2301 md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
>>> 2302 generic_make_request(wbio);
>>> 2303 }
>>> 2304 if (wbio2) {
>> At line 2300, conf->mirrors[d].rdev is NULL, this causes a NULL pointer
>> dereference to conf->mirrors[d].rdev->nr_pending. After reading previous
>> raid10 patches, I find conf->mirrors[d].rdev can be NULL at any point
>> unless,
>> - a counted reference is held
>> - ->reconfig_mutex is held, or
>> - rcu_read_lock() is held
>
> There is one other condition: MD_RECOVERY_RUNNING is set (without
> MD_RECOVERY_DONE).
> mirrors[d].rdev is only set to NULL by ->hot_remove_disk() which is only
> called from remove_and_add_spares(), and that is never called while
> resync/recovery/reshape is happening.
> So there is no need for RCU protection here.
>
> Only ... remove_and_add_spares() *can* sometimes be called during
> resync -
> Commit: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
> added a called to remove_and_add_spares() when "remove" is written to
> the device/state attribute. That was wrong.
> This:
>
> } else if (cmd_match(buf, "remove")) {
> - if (rdev->mddev->pers) {
> + if (rdev->mddev->pers &&
> + !test_bit(MD_RECOVERY_RECOVER, &mddev->recovery)) {
> clear_bit(Blocked, &rdev->flags);
> remove_and_add_spares(rdev->mddev, rdev);
>
> should fix it.
Actually, that doesn't even compile :-(
I think this is a better fix.
Thanks,
NeilBrown
From: NeilBrown <neilb@suse.com>
Date: Thu, 19 Oct 2017 09:58:19 +1100
Subject: [PATCH] md: only allow remove_and_add_spares() when no sync_thread running.
The locking protocols in md assume that a device will
never be removed from an array during resync/recovery/reshape.
When that isn't happening, rcu or reconfig_mutex is needed
to protect an rdev pointer while taking a refcount. When
it is happening, that protection isn't needed.
Unfortuantely there is a case were remove_and_add_spares() is
called when recovery might be happening: when "remove" is
written to the device/state sysfs attribute.
This call is an optimization and not essential so it doesn't
matter if it fails.
So change remove_and_add_spares() to abort early if
resync/recovery/reshape is happening.
As this can result in a NULL dereference, the fix is suitable
for -stable.
Cc: Tomasz Majchrzak <tomasz.majchrzak@intel.com>
Fixes: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
Cc: stable@ver.kernel.org (v4.8+)
Signed-off-by: NeilBrown <neilb@suse.com>
---
drivers/md/md.c | 4 ++++
1 file changed, 4 insertions(+)
diff --git a/drivers/md/md.c b/drivers/md/md.c
index b3192943de7d..01eac0dbca98 100644
--- a/drivers/md/md.c
+++ b/drivers/md/md.c
@@ -8563,6 +8563,10 @@ static int remove_and_add_spares(struct mddev *mddev,
int removed = 0;
bool remove_some = false;
+ if (test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))
+ /* Mustn't remove devices when resync thread is running */
+ return 0;
+
rdev_for_each(rdev, mddev) {
if ((this == NULL || rdev == this) &&
rdev->raid_disk >= 0 &&
--
2.14.0.rc0.dirty
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d()
2017-10-18 23:06 ` NeilBrown
@ 2017-11-17 20:03 ` Shaohua Li
[not found] ` <45cfa4a5-fe04-8b02-531d-c642ad6e7b4c@huawei.com>
0 siblings, 1 reply; 8+ messages in thread
From: Shaohua Li @ 2017-11-17 20:03 UTC (permalink / raw)
To: NeilBrown; +Cc: Coly Li, linux-raid
On Thu, Oct 19, 2017 at 10:06:56AM +1100, Neil Brown wrote:
> On Wed, Oct 18 2017, NeilBrown wrote:
>
> > On Wed, Oct 18 2017, Coly Li wrote:
> >
> >> We have a bug report about NULL dereference in md raid10 code. The
> >> operations are,
> >> - Create a raid10 device
> >> - add a spare disk
> >> - disconnect one of the online disks from the raid10 device
> >> - wait to the recovery happens on the spare disk
> >> - remove the spare disk which is recovering
> >> And sometimes a kernel oops of NULL dereference in md raid10 module can
> >> be observed, and crash tool reports the following information:
> >>> (gdb) list *(raid10d+0xad6)
> >>> 0x5de6 is in raid10d (../drivers/md/raid10.c:2300).
> >>> 2295 * the latter is free to free wbio2.
> >>> 2296 */
> >>> 2297 if (wbio2 && !wbio2->bi_end_io)
> >>> 2298 wbio2 = NULL;
> >>> 2299 if (wbio->bi_end_io) {
> >>> 2300 atomic_inc(&conf->mirrors[d].rdev->nr_pending);
> >>> 2301 md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
> >>> 2302 generic_make_request(wbio);
> >>> 2303 }
> >>> 2304 if (wbio2) {
> >> At line 2300, conf->mirrors[d].rdev is NULL, this causes a NULL pointer
> >> dereference to conf->mirrors[d].rdev->nr_pending. After reading previous
> >> raid10 patches, I find conf->mirrors[d].rdev can be NULL at any point
> >> unless,
> >> - a counted reference is held
> >> - ->reconfig_mutex is held, or
> >> - rcu_read_lock() is held
> >
> > There is one other condition: MD_RECOVERY_RUNNING is set (without
> > MD_RECOVERY_DONE).
> > mirrors[d].rdev is only set to NULL by ->hot_remove_disk() which is only
> > called from remove_and_add_spares(), and that is never called while
> > resync/recovery/reshape is happening.
> > So there is no need for RCU protection here.
> >
> > Only ... remove_and_add_spares() *can* sometimes be called during
> > resync -
> > Commit: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
> > added a called to remove_and_add_spares() when "remove" is written to
> > the device/state attribute. That was wrong.
> > This:
> >
> > } else if (cmd_match(buf, "remove")) {
> > - if (rdev->mddev->pers) {
> > + if (rdev->mddev->pers &&
> > + !test_bit(MD_RECOVERY_RECOVER, &mddev->recovery)) {
> > clear_bit(Blocked, &rdev->flags);
> > remove_and_add_spares(rdev->mddev, rdev);
> >
> > should fix it.
>
> Actually, that doesn't even compile :-(
>
> I think this is a better fix.
> Thanks,
> NeilBrown
>
> From: NeilBrown <neilb@suse.com>
> Date: Thu, 19 Oct 2017 09:58:19 +1100
> Subject: [PATCH] md: only allow remove_and_add_spares() when no sync_thread running.
>
> The locking protocols in md assume that a device will
> never be removed from an array during resync/recovery/reshape.
> When that isn't happening, rcu or reconfig_mutex is needed
> to protect an rdev pointer while taking a refcount. When
> it is happening, that protection isn't needed.
>
> Unfortuantely there is a case were remove_and_add_spares() is
> called when recovery might be happening: when "remove" is
> written to the device/state sysfs attribute.
>
> This call is an optimization and not essential so it doesn't
> matter if it fails.
> So change remove_and_add_spares() to abort early if
> resync/recovery/reshape is happening.
>
> As this can result in a NULL dereference, the fix is suitable
> for -stable.
>
> Cc: Tomasz Majchrzak <tomasz.majchrzak@intel.com>
> Fixes: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
> Cc: stable@ver.kernel.org (v4.8+)
> Signed-off-by: NeilBrown <neilb@suse.com>
> ---
> drivers/md/md.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
> diff --git a/drivers/md/md.c b/drivers/md/md.c
> index b3192943de7d..01eac0dbca98 100644
> --- a/drivers/md/md.c
> +++ b/drivers/md/md.c
> @@ -8563,6 +8563,10 @@ static int remove_and_add_spares(struct mddev *mddev,
> int removed = 0;
> bool remove_some = false;
Sorry, I missed this patch.
I'd really appreciate if you can add the locking protocol into comments here,
digging changelog is much painful.
> + if (test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))
> + /* Mustn't remove devices when resync thread is running */
> + return 0;
> +
This will bypass hotadd too, is it what we want?
Thanks,
Shaohua
> rdev_for_each(rdev, mddev) {
> if ((this == NULL || rdev == this) &&
> rdev->raid_disk >= 0 &&
> --
> 2.14.0.rc0.dirty
>
>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d()
[not found] ` <45cfa4a5-fe04-8b02-531d-c642ad6e7b4c@huawei.com>
@ 2018-02-01 12:26 ` yuyufen
2018-02-01 22:22 ` NeilBrown
0 siblings, 1 reply; 8+ messages in thread
From: yuyufen @ 2018-02-01 12:26 UTC (permalink / raw)
To: neilb, colyli, shli; +Cc: linux-raid
hi.
> On Thu, Oct 19, 2017 at 10:06:56AM +1100, Neil Brown wrote:
>> On Wed, Oct 18 2017, NeilBrown wrote:
>>
>>> On Wed, Oct 18 2017, Coly Li wrote:
>>>
>>>> We have a bug report about NULL dereference in md raid10 code. The
>>>> operations are,
>>>> - Create a raid10 device
>>>> - add a spare disk
>>>> - disconnect one of the online disks from the raid10 device
>>>> - wait to the recovery happens on the spare disk
>>>> - remove the spare disk which is recovering
>>>> And sometimes a kernel oops of NULL dereference in md raid10 module can
>>>> be observed, and crash tool reports the following information:
>>>>> (gdb) list *(raid10d+0xad6)
>>>>> 0x5de6 is in raid10d (../drivers/md/raid10.c:2300).
>>>>> 2295 * the latter is free to free wbio2.
>>>>> 2296 */
>>>>> 2297 if (wbio2 && !wbio2->bi_end_io)
>>>>> 2298 wbio2 = NULL;
>>>>> 2299 if (wbio->bi_end_io) {
>>>>> 2300 atomic_inc(&conf->mirrors[d].rdev->nr_pending);
>>>>> 2301 md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
>>>>> 2302 generic_make_request(wbio);
>>>>> 2303 }
>>>>> 2304 if (wbio2) {
>>>> At line 2300, conf->mirrors[d].rdev is NULL, this causes a NULL pointer
>>>> dereference to conf->mirrors[d].rdev->nr_pending. After reading previous
>>>> raid10 patches, I find conf->mirrors[d].rdev can be NULL at any point
>>>> unless,
>>>> - a counted reference is held
>>>> - ->reconfig_mutex is held, or
>>>> - rcu_read_lock() is held
We have the same bug report about NULL dereference in md raid10 code.
operations are:
- create raid10, including 4 disk and 2 spare disk
mdadm -C /dev/md1 -l 10 -n 4 /dev/sda /dev/sdb /dev/sdc
/dev/sdd -x 2 /dev/sde /dev/sdf -R
- block and offline a disk in raid10
- hot remove a disk by
mdadm --manage /dev/md1 -r sdX
- add disk
mdadm --manage /dev/md1 -r sdX
(gdb) l *(0xffffffff815daafd)
0xffffffff815daafd is in rdev_clear_badblocks (drivers/md/md.c:8688).
8683 int is_new)
8684 {
8685 if (is_new)
8686 s += rdev->new_data_offset;
8687 else
8688 s += rdev->data_offset; <====================
8689 return md_clear_badblocks(&rdev->badblocks,
8690 s, sectors);
8691 }
8692 EXPORT_SYMBOL_GPL(rdev_clear_badblocks);
Call Trace and crash tools show it is triggered as following:
raid10d() => handle_write_completed() => rdev_clear_badblocks()
>>> There is one other condition: MD_RECOVERY_RUNNING is set (without
>>> MD_RECOVERY_DONE).
>>> mirrors[d].rdev is only set to NULL by ->hot_remove_disk() which is only
>>> called from remove_and_add_spares(), and that is never called while
>>> resync/recovery/reshape is happening.
>>> So there is no need for RCU protection here.
>>>
>>> Only ... remove_and_add_spares() *can* sometimes be called during
>>> resync -
>>> Commit: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
>>> added a called to remove_and_add_spares() when "remove" is written to
>>> the device/state attribute. That was wrong.
>>> This:
>>>
>>> } else if (cmd_match(buf, "remove")) {
>>> - if (rdev->mddev->pers) {
>>> + if (rdev->mddev->pers &&
>>> + !test_bit(MD_RECOVERY_RECOVER, &mddev->recovery)) {
>>> clear_bit(Blocked, &rdev->flags);
>>> remove_and_add_spares(rdev->mddev, rdev);
>>>
>>> should fix it.
>> Actually, that doesn't even compile :-(
>>
>> I think this is a better fix.
>> Thanks,
>> NeilBrown
>>
>> From: NeilBrown <neilb@suse.com>
>> Date: Thu, 19 Oct 2017 09:58:19 +1100
>> Subject: [PATCH] md: only allow remove_and_add_spares() when no sync_thread running.
>>
>> The locking protocols in md assume that a device will
>> never be removed from an array during resync/recovery/reshape.
>> When that isn't happening, rcu or reconfig_mutex is needed
>> to protect an rdev pointer while taking a refcount. When
>> it is happening, that protection isn't needed.
>>
>> Unfortuantely there is a case were remove_and_add_spares() is
>> called when recovery might be happening: when "remove" is
>> written to the device/state sysfs attribute.
>>
>> This call is an optimization and not essential so it doesn't
>> matter if it fails.
>> So change remove_and_add_spares() to abort early if
>> resync/recovery/reshape is happening.
>>
>> As this can result in a NULL dereference, the fix is suitable
>> for -stable.
>>
>> Cc: Tomasz Majchrzak <tomasz.majchrzak@intel.com>
>> Fixes: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
>> Cc: stable@ver.kernel.org (v4.8+)
>> Signed-off-by: NeilBrown <neilb@suse.com>
>> ---
>> drivers/md/md.c | 4 ++++
>> 1 file changed, 4 insertions(+)
>>
>> diff --git a/drivers/md/md.c b/drivers/md/md.c
>> index b3192943de7d..01eac0dbca98 100644
>> --- a/drivers/md/md.c
>> +++ b/drivers/md/md.c
>> @@ -8563,6 +8563,10 @@ static int remove_and_add_spares(struct mddev *mddev,
>> int removed = 0;
>> bool remove_some = false;
> Sorry, I missed this patch.
>
> I'd really appreciate if you can add the locking protocol into comments here,
> digging changelog is much painful.
> > + if (test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))
>> + /* Mustn't remove devices when resync thread is running */
>> + return 0;
>> +
> This will bypass hotadd too, is it what we want?
After applying this patch, there is no more Oops, but the number of
disks will become less and less, which is not expected.
I think it's caused by bypassing of hotadd. Can we just add spare disk
without removing disk?
Any suggestions for this fix or any progress on this patch?
Thanks a lot,
Yufen Yu
>
> Thanks,
> Shaohua
>> rdev_for_each(rdev, mddev) {
>> if ((this == NULL || rdev == this) &&
>> rdev->raid_disk >= 0 &&
>> --
>> 2.14.0.rc0.dirty
>>
>>
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-raid" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
> .
>
>
>
> .
>
.
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d()
2018-02-01 12:26 ` yuyufen
@ 2018-02-01 22:22 ` NeilBrown
2018-02-02 13:49 ` yuyufen
0 siblings, 1 reply; 8+ messages in thread
From: NeilBrown @ 2018-02-01 22:22 UTC (permalink / raw)
To: yuyufen, colyli, shli; +Cc: linux-raid
[-- Attachment #1: Type: text/plain, Size: 6810 bytes --]
On Thu, Feb 01 2018, yuyufen wrote:
> hi.
>
>> On Thu, Oct 19, 2017 at 10:06:56AM +1100, Neil Brown wrote:
>>> On Wed, Oct 18 2017, NeilBrown wrote:
>>>
>>>> On Wed, Oct 18 2017, Coly Li wrote:
>>>>
>>>>> We have a bug report about NULL dereference in md raid10 code. The
>>>>> operations are,
>>>>> - Create a raid10 device
>>>>> - add a spare disk
>>>>> - disconnect one of the online disks from the raid10 device
>>>>> - wait to the recovery happens on the spare disk
>>>>> - remove the spare disk which is recovering
>>>>> And sometimes a kernel oops of NULL dereference in md raid10 module can
>>>>> be observed, and crash tool reports the following information:
>>>>>> (gdb) list *(raid10d+0xad6)
>>>>>> 0x5de6 is in raid10d (../drivers/md/raid10.c:2300).
>>>>>> 2295 * the latter is free to free wbio2.
>>>>>> 2296 */
>>>>>> 2297 if (wbio2 && !wbio2->bi_end_io)
>>>>>> 2298 wbio2 = NULL;
>>>>>> 2299 if (wbio->bi_end_io) {
>>>>>> 2300 atomic_inc(&conf->mirrors[d].rdev->nr_pending);
>>>>>> 2301 md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
>>>>>> 2302 generic_make_request(wbio);
>>>>>> 2303 }
>>>>>> 2304 if (wbio2) {
>>>>> At line 2300, conf->mirrors[d].rdev is NULL, this causes a NULL pointer
>>>>> dereference to conf->mirrors[d].rdev->nr_pending. After reading previous
>>>>> raid10 patches, I find conf->mirrors[d].rdev can be NULL at any point
>>>>> unless,
>>>>> - a counted reference is held
>>>>> - ->reconfig_mutex is held, or
>>>>> - rcu_read_lock() is held
>
> We have the same bug report about NULL dereference in md raid10 code.
> operations are:
>
> - create raid10, including 4 disk and 2 spare disk
> mdadm -C /dev/md1 -l 10 -n 4 /dev/sda /dev/sdb /dev/sdc
> /dev/sdd -x 2 /dev/sde /dev/sdf -R
> - block and offline a disk in raid10
> - hot remove a disk by
> mdadm --manage /dev/md1 -r sdX
> - add disk
> mdadm --manage /dev/md1 -r sdX
>
> (gdb) l *(0xffffffff815daafd)
> 0xffffffff815daafd is in rdev_clear_badblocks (drivers/md/md.c:8688).
> 8683 int is_new)
> 8684 {
> 8685 if (is_new)
> 8686 s += rdev->new_data_offset;
> 8687 else
> 8688 s += rdev->data_offset; <====================
> 8689 return md_clear_badblocks(&rdev->badblocks,
> 8690 s, sectors);
> 8691 }
> 8692 EXPORT_SYMBOL_GPL(rdev_clear_badblocks);
>
> Call Trace and crash tools show it is triggered as following:
> raid10d() => handle_write_completed() => rdev_clear_badblocks()
>
>>>> There is one other condition: MD_RECOVERY_RUNNING is set (without
>>>> MD_RECOVERY_DONE).
>>>> mirrors[d].rdev is only set to NULL by ->hot_remove_disk() which is only
>>>> called from remove_and_add_spares(), and that is never called while
>>>> resync/recovery/reshape is happening.
>>>> So there is no need for RCU protection here.
>>>>
>>>> Only ... remove_and_add_spares() *can* sometimes be called during
>>>> resync -
>>>> Commit: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
>>>> added a called to remove_and_add_spares() when "remove" is written to
>>>> the device/state attribute. That was wrong.
>>>> This:
>>>>
>>>> } else if (cmd_match(buf, "remove")) {
>>>> - if (rdev->mddev->pers) {
>>>> + if (rdev->mddev->pers &&
>>>> + !test_bit(MD_RECOVERY_RECOVER, &mddev->recovery)) {
>>>> clear_bit(Blocked, &rdev->flags);
>>>> remove_and_add_spares(rdev->mddev, rdev);
>>>>
>>>> should fix it.
>>> Actually, that doesn't even compile :-(
>>>
>>> I think this is a better fix.
>>> Thanks,
>>> NeilBrown
>>>
>>> From: NeilBrown <neilb@suse.com>
>>> Date: Thu, 19 Oct 2017 09:58:19 +1100
>>> Subject: [PATCH] md: only allow remove_and_add_spares() when no sync_thread running.
>>>
>>> The locking protocols in md assume that a device will
>>> never be removed from an array during resync/recovery/reshape.
>>> When that isn't happening, rcu or reconfig_mutex is needed
>>> to protect an rdev pointer while taking a refcount. When
>>> it is happening, that protection isn't needed.
>>>
>>> Unfortuantely there is a case were remove_and_add_spares() is
>>> called when recovery might be happening: when "remove" is
>>> written to the device/state sysfs attribute.
>>>
>>> This call is an optimization and not essential so it doesn't
>>> matter if it fails.
>>> So change remove_and_add_spares() to abort early if
>>> resync/recovery/reshape is happening.
>>>
>>> As this can result in a NULL dereference, the fix is suitable
>>> for -stable.
>>>
>>> Cc: Tomasz Majchrzak <tomasz.majchrzak@intel.com>
>>> Fixes: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
>>> Cc: stable@ver.kernel.org (v4.8+)
>>> Signed-off-by: NeilBrown <neilb@suse.com>
>>> ---
>>> drivers/md/md.c | 4 ++++
>>> 1 file changed, 4 insertions(+)
>>>
>>> diff --git a/drivers/md/md.c b/drivers/md/md.c
>>> index b3192943de7d..01eac0dbca98 100644
>>> --- a/drivers/md/md.c
>>> +++ b/drivers/md/md.c
>>> @@ -8563,6 +8563,10 @@ static int remove_and_add_spares(struct mddev *mddev,
>>> int removed = 0;
>>> bool remove_some = false;
>> Sorry, I missed this patch.
>>
>> I'd really appreciate if you can add the locking protocol into comments here,
>> digging changelog is much painful.
>> > + if (test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))
>>> + /* Mustn't remove devices when resync thread is running */
>>> + return 0;
>>> +
>> This will bypass hotadd too, is it what we want?
>
> After applying this patch, there is no more Oops, but the number of
> disks will become less and less, which is not expected.
Please explain what you mean by "the number of disks will become less
and less"?? What is the sequence of events?
> I think it's caused by bypassing of hotadd. Can we just add spare disk
> without removing disk?
>
> Any suggestions for this fix or any progress on this patch?
I had forgotten about this patch and will resend. However I think the
only change needs is adding some comments. I still think the code is
correct.
Thanks,
NeilBrown
>
> Thanks a lot,
> Yufen Yu
>
>>
>> Thanks,
>> Shaohua
>>> rdev_for_each(rdev, mddev) {
>>> if ((this == NULL || rdev == this) &&
>>> rdev->raid_disk >= 0 &&
>>> --
>>> 2.14.0.rc0.dirty
>>>
>>>
>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe linux-raid" in
>> the body of a message to majordomo@vger.kernel.org
>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>
>> .
>>
>>
>>
>> .
>>
> .
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d()
2018-02-01 22:22 ` NeilBrown
@ 2018-02-02 13:49 ` yuyufen
2018-02-02 22:14 ` NeilBrown
0 siblings, 1 reply; 8+ messages in thread
From: yuyufen @ 2018-02-02 13:49 UTC (permalink / raw)
To: NeilBrown, colyli, shli; +Cc: linux-raid
On 2018/2/2 6:22, NeilBrown wrote:
> On Thu, Feb 01 2018, yuyufen wrote:
>
>> hi.
>>
>>> On Thu, Oct 19, 2017 at 10:06:56AM +1100, Neil Brown wrote:
>>>> On Wed, Oct 18 2017, NeilBrown wrote:
>>>>
>>>>> On Wed, Oct 18 2017, Coly Li wrote:
>>>>>
>>>>>> We have a bug report about NULL dereference in md raid10 code. The
>>>>>> operations are,
>>>>>> - Create a raid10 device
>>>>>> - add a spare disk
>>>>>> - disconnect one of the online disks from the raid10 device
>>>>>> - wait to the recovery happens on the spare disk
>>>>>> - remove the spare disk which is recovering
>>>>>> And sometimes a kernel oops of NULL dereference in md raid10 module can
>>>>>> be observed, and crash tool reports the following information:
>>>>>>> (gdb) list *(raid10d+0xad6)
>>>>>>> 0x5de6 is in raid10d (../drivers/md/raid10.c:2300).
>>>>>>> 2295 * the latter is free to free wbio2.
>>>>>>> 2296 */
>>>>>>> 2297 if (wbio2 && !wbio2->bi_end_io)
>>>>>>> 2298 wbio2 = NULL;
>>>>>>> 2299 if (wbio->bi_end_io) {
>>>>>>> 2300 atomic_inc(&conf->mirrors[d].rdev->nr_pending);
>>>>>>> 2301 md_sync_acct(conf->mirrors[d].rdev->bdev, bio_sectors(wbio));
>>>>>>> 2302 generic_make_request(wbio);
>>>>>>> 2303 }
>>>>>>> 2304 if (wbio2) {
>>>>>> At line 2300, conf->mirrors[d].rdev is NULL, this causes a NULL pointer
>>>>>> dereference to conf->mirrors[d].rdev->nr_pending. After reading previous
>>>>>> raid10 patches, I find conf->mirrors[d].rdev can be NULL at any point
>>>>>> unless,
>>>>>> - a counted reference is held
>>>>>> - ->reconfig_mutex is held, or
>>>>>> - rcu_read_lock() is held
>> We have the same bug report about NULL dereference in md raid10 code.
>> operations are:
>>
>> - create raid10, including 4 disk and 2 spare disk
>> mdadm -C /dev/md1 -l 10 -n 4 /dev/sda /dev/sdb /dev/sdc
>> /dev/sdd -x 2 /dev/sde /dev/sdf -R
>> - block and offline a disk in raid10
>> - hot remove a disk by
>> mdadm --manage /dev/md1 -r sdX
>> - add disk
>> mdadm --manage /dev/md1 -r sdX
>>
>> (gdb) l *(0xffffffff815daafd)
>> 0xffffffff815daafd is in rdev_clear_badblocks (drivers/md/md.c:8688).
>> 8683 int is_new)
>> 8684 {
>> 8685 if (is_new)
>> 8686 s += rdev->new_data_offset;
>> 8687 else
>> 8688 s += rdev->data_offset; <====================
>> 8689 return md_clear_badblocks(&rdev->badblocks,
>> 8690 s, sectors);
>> 8691 }
>> 8692 EXPORT_SYMBOL_GPL(rdev_clear_badblocks);
>>
>> Call Trace and crash tools show it is triggered as following:
>> raid10d() => handle_write_completed() => rdev_clear_badblocks()
>>
>>>>> There is one other condition: MD_RECOVERY_RUNNING is set (without
>>>>> MD_RECOVERY_DONE).
>>>>> mirrors[d].rdev is only set to NULL by ->hot_remove_disk() which is only
>>>>> called from remove_and_add_spares(), and that is never called while
>>>>> resync/recovery/reshape is happening.
>>>>> So there is no need for RCU protection here.
>>>>>
>>>>> Only ... remove_and_add_spares() *can* sometimes be called during
>>>>> resync -
>>>>> Commit: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
>>>>> added a called to remove_and_add_spares() when "remove" is written to
>>>>> the device/state attribute. That was wrong.
>>>>> This:
>>>>>
>>>>> } else if (cmd_match(buf, "remove")) {
>>>>> - if (rdev->mddev->pers) {
>>>>> + if (rdev->mddev->pers &&
>>>>> + !test_bit(MD_RECOVERY_RECOVER, &mddev->recovery)) {
>>>>> clear_bit(Blocked, &rdev->flags);
>>>>> remove_and_add_spares(rdev->mddev, rdev);
>>>>>
>>>>> should fix it.
>>>> Actually, that doesn't even compile :-(
>>>>
>>>> I think this is a better fix.
>>>> Thanks,
>>>> NeilBrown
>>>>
>>>> From: NeilBrown <neilb@suse.com>
>>>> Date: Thu, 19 Oct 2017 09:58:19 +1100
>>>> Subject: [PATCH] md: only allow remove_and_add_spares() when no sync_thread running.
>>>>
>>>> The locking protocols in md assume that a device will
>>>> never be removed from an array during resync/recovery/reshape.
>>>> When that isn't happening, rcu or reconfig_mutex is needed
>>>> to protect an rdev pointer while taking a refcount. When
>>>> it is happening, that protection isn't needed.
>>>>
>>>> Unfortuantely there is a case were remove_and_add_spares() is
>>>> called when recovery might be happening: when "remove" is
>>>> written to the device/state sysfs attribute.
>>>>
>>>> This call is an optimization and not essential so it doesn't
>>>> matter if it fails.
>>>> So change remove_and_add_spares() to abort early if
>>>> resync/recovery/reshape is happening.
>>>>
>>>> As this can result in a NULL dereference, the fix is suitable
>>>> for -stable.
>>>>
>>>> Cc: Tomasz Majchrzak <tomasz.majchrzak@intel.com>
>>>> Fixes: 8430e7e0af9a ("md: disconnect device from personality before trying to remove it.")
>>>> Cc: stable@ver.kernel.org (v4.8+)
>>>> Signed-off-by: NeilBrown <neilb@suse.com>
>>>> ---
>>>> drivers/md/md.c | 4 ++++
>>>> 1 file changed, 4 insertions(+)
>>>>
>>>> diff --git a/drivers/md/md.c b/drivers/md/md.c
>>>> index b3192943de7d..01eac0dbca98 100644
>>>> --- a/drivers/md/md.c
>>>> +++ b/drivers/md/md.c
>>>> @@ -8563,6 +8563,10 @@ static int remove_and_add_spares(struct mddev *mddev,
>>>> int removed = 0;
>>>> bool remove_some = false;
>>> Sorry, I missed this patch.
>>>
>>> I'd really appreciate if you can add the locking protocol into comments here,
>>> digging changelog is much painful.
>>> > + if (test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))
>>>> + /* Mustn't remove devices when resync thread is running */
>>>> + return 0;
>>>> +
>>> This will bypass hotadd too, is it what we want?
>> After applying this patch, there is no more Oops, but the number of
>> disks will become less and less, which is not expected.
> Please explain what you mean by "the number of disks will become less
> and less"?? What is the sequence of events?
>
>
>> I think it's caused by bypassing of hotadd. Can we just add spare disk
>> without removing disk?
>>
>> Any suggestions for this fix or any progress on this patch?
> I had forgotten about this patch and will resend. However I think the
> only change needs is adding some comments. I still think the code is
> correct.
(1) When raid10 create, there are 4 disks in raid and 2 spare disks
(sda5, sdd5)
[ 100.473118] RAID10 conf printout:
[ 100.473121] --- wd:3 rd:4
[ 100.473123] disk 0, wo:0, o:1, dev:sdb5
[ 100.473124] disk 1, wo:1, o:0, dev:sdc5
[ 100.473126] disk 2, wo:0, o:1, dev:sde5
[ 100.473127] disk 3, wo:0, o:1, dev:sdf5
(2) mdadm: hot removed /dev/sdc5 from /dev/md5
[ 100.473118] RAID10 conf printout:
[ 110.390027] --- wd:3 rd:4
[ 110.390028] disk 0, wo:0, o:1, dev:sdb5
[ 110.390029] disk 2, wo:0, o:1, dev:sde5
[ 110.390030] disk 3, wo:0, o:1, dev:sdf5
However, as there are 2 spare disks, we expect raid10 can hot add a disk.
(3)
mdadm: added /dev/sdc5
mdadm: hot removed /dev/sdc5 from /dev/md5
[ 148.680032] RAID10 conf printout:
[ 148.680035] --- wd:2 rd:4
[ 148.680037] disk 0, wo:0, o:1, dev:sdb5
[ 148.680038] disk 2, wo:0, o:1, dev:sde5
Now, there are 3 spare disks (sda5, sdc5, sdd5)
Also, we expect hot add 2 disk, not just 2 disk in raid10.
I try to explain, but not sure:
The only place of the runtime to invoke mddev->pers->hot_add_disk(mddev,
rdev) is md_check_recovery().
But, it will set MD_RECOVERY_RUNNING before invoking
remove_and_add_spares():
8702 void md_check_recovery(struct mddev *mddev)
8703 {
……
8800 mddev->curr_resync_completed = 0;
8801 spin_lock(&mddev->lock);
8802 set_bit(MD_RECOVERY_RUNNING, &mddev->recovery);
<=======================
8803 spin_unlock(&mddev->lock);
8804 /* Clear some bits that don't mean anything, but
8805 * might be left set
8806 */
8807 clear_bit(MD_RECOVERY_INTR, &mddev->recovery);
8808 clear_bit(MD_RECOVERY_DONE, &mddev->recovery);
8809
8810 if (!test_and_clear_bit(MD_RECOVERY_NEEDED,
&mddev->recovery) ||
8811 test_bit(MD_RECOVERY_FROZEN, &mddev->recovery))
8812 goto not_running;
8813 /* no recovery is running.
8814 * remove any failed drives, then
8815 * add spares if possible.
8816 * Spares are also removed and re-added, to allow
8817 * the personality to fail the re-add.
8818 */
8819
8820 if (mddev->reshape_position != MaxSector) {
8821 if (mddev->pers->check_reshape == NULL ||
8822 mddev->pers->check_reshape(mddev) != 0)
8823 /* Cannot proceed */
8824 goto not_running;
8825 set_bit(MD_RECOVERY_RESHAPE, &mddev->recovery);
8826 clear_bit(MD_RECOVERY_RECOVER, &mddev->recovery);
8827 } else if ((spares = remove_and_add_spares(mddev, NULL)))
{ <=======================
8828 clear_bit(MD_RECOVERY_SYNC, &mddev->recovery);
……
8874 }
8875 EXPORT_SYMBOL(md_check_recovery);
That means, test_bit(MD_RECOVERY_RUNNING, &mddev->recovery) always be true.
So it will bypass hot add.
+ if (test_bit(MD_RECOVERY_RUNNING, &mddev->recovery))
+ /* Mustn't remove devices when resync thread is running */
+ return 0;
What's more, I found there some D status fio processes (I use fio to test).
They seems to waiting for IO complete. But I can't explain reason.
[ 463.085649] sysrq: SysRq : Show Blocked State
[ 463.087764] task PC stack pid father
[ 463.090151] fio D ffff88012e45ba68 0 1420 1398
0x00000000
[ 463.095138] ffff88012e45b9e8 ffff8800b5893ba0 ffff8800a55bf200
0000000000015c40
[ 463.098142] ffffffff810d8698 ffff8800b58940f0 225383e5f11e4e2e
ffff88012e45b9d8
[ 463.102101] ffff88012e45c000 ffff88013fcd5c40 7fffffffffffffff
ffff88012e45b9f8
[ 463.105651] Call Trace:
[ 463.107430] [<ffffffff810d8698>] ? __wake_up+0x48/0x60
[ 463.110126] [<ffffffff81745567>] schedule+0x37/0x90
[ 463.112817] [<ffffffff81747dd9>] schedule_timeout+0x1a9/0x200
[ 463.116131] [<ffffffff81745567>] ? schedule+0x37/0x90
[ 463.119738] [<ffffffff81747dd9>] ? schedule_timeout+0x1a9/0x200
[ 463.123879] [<ffffffff81108470>] ? ktime_get+0x40/0xb0
[ 463.126737] [<ffffffff81248896>] ? __blockdev_direct_IO+0xf46/0x1720
[ 463.130833] [<ffffffff81353b11>] ? bio_put+0x51/0x90
[ 463.134180] [<ffffffff817449a4>] ? io_schedule_timeout+0xa4/0x110
[ 463.138207] [<ffffffff81248896>] ? __blockdev_direct_IO+0xf46/0x1720
[ 463.142740] [<ffffffff81243340>] ? I_BDEV+0x10/0x10
[ 463.146066] [<ffffffff81243c7c>] ? blkdev_direct_IO+0x4c/0x50
[ 463.149205] [<ffffffff811942f0>] ? generic_file_read_iter+0x540/0x6f0
[ 463.154051] [<ffffffff8135dd48>] ? blk_finish_plug+0x18/0x50
[ 463.156457] [<ffffffff81244bc5>] ? blkdev_read_iter+0x35/0x50
[ 463.159293] [<ffffffff81207e0d>] ? __vfs_read+0xcd/0x110
[ 463.162703] [<ffffffff812086bc>] ? vfs_write+0x9c/0x1b0
[ 463.166147] [<ffffffff8120855a>] ? vfs_read+0x7a/0x140
[ 463.168477] [<ffffffff8120924a>] ? SyS_pread64+0x9a/0xc0
[ 463.171970] [<ffffffff811058d1>] ? SyS_clock_gettime+0x81/0xd0
[ 463.175796] [<ffffffff81748c57>] ? system_call_fastpath+0x12/0x6a
Thanks,
Yufen Yu
> Thanks,
> NeilBrown
>
>> Thanks a lot,
>> Yufen Yu
>>
>>> Thanks,
>>> Shaohua
>>>> rdev_for_each(rdev, mddev) {
>>>> if ((this == NULL || rdev == this) &&
>>>> rdev->raid_disk >= 0 &&
>>>> --
>>>> 2.14.0.rc0.dirty
>>>>
>>>>
>>> --
>>> To unsubscribe from this list: send the line "unsubscribe linux-raid" in
>>> the body of a message to majordomo@vger.kernel.org
>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>>
>>> .
>>>
>>>
>>>
>>> .
>>>
>> .
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d()
2018-02-02 13:49 ` yuyufen
@ 2018-02-02 22:14 ` NeilBrown
0 siblings, 0 replies; 8+ messages in thread
From: NeilBrown @ 2018-02-02 22:14 UTC (permalink / raw)
To: yuyufen, colyli, shli; +Cc: linux-raid
[-- Attachment #1: Type: text/plain, Size: 1701 bytes --]
On Fri, Feb 02 2018, yuyufen@huawei.com wrote:
>> I had forgotten about this patch and will resend. However I think the
>> only change needs is adding some comments. I still think the code is
>> correct.
> (1) When raid10 create, there are 4 disks in raid and 2 spare disks
> (sda5, sdd5)
>
> [ 100.473118] RAID10 conf printout:
> [ 100.473121] --- wd:3 rd:4
> [ 100.473123] disk 0, wo:0, o:1, dev:sdb5
> [ 100.473124] disk 1, wo:1, o:0, dev:sdc5
> [ 100.473126] disk 2, wo:0, o:1, dev:sde5
> [ 100.473127] disk 3, wo:0, o:1, dev:sdf5
>
> (2) mdadm: hot removed /dev/sdc5 from /dev/md5
> [ 100.473118] RAID10 conf printout:
> [ 110.390027] --- wd:3 rd:4
> [ 110.390028] disk 0, wo:0, o:1, dev:sdb5
> [ 110.390029] disk 2, wo:0, o:1, dev:sde5
> [ 110.390030] disk 3, wo:0, o:1, dev:sdf5
>
> However, as there are 2 spare disks, we expect raid10 can hot add a disk.
>
> (3)
> mdadm: added /dev/sdc5
> mdadm: hot removed /dev/sdc5 from /dev/md5
> [ 148.680032] RAID10 conf printout:
> [ 148.680035] --- wd:2 rd:4
> [ 148.680037] disk 0, wo:0, o:1, dev:sdb5
> [ 148.680038] disk 2, wo:0, o:1, dev:sde5
>
> Now, there are 3 spare disks (sda5, sdc5, sdd5)
> Also, we expect hot add 2 disk, not just 2 disk in raid10.
>
> I try to explain, but not sure:
> The only place of the runtime to invoke mddev->pers->hot_add_disk(mddev,
> rdev) is md_check_recovery().
> But, it will set MD_RECOVERY_RUNNING before invoking
> remove_and_add_spares():
This is the piece I was missing. Thanks for pointing that out,
definitely a bug in my patch. I'll send a new patch which tests 'this'
as well as the flag.
Thanks a lot,
NeilBrown
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 832 bytes --]
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2018-02-02 22:14 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-10-17 16:36 [PATCH] [RFC] md raid10: use rcu to avoid NULL dereference in raid10d() Coly Li
2017-10-17 20:03 ` NeilBrown
2017-10-18 23:06 ` NeilBrown
2017-11-17 20:03 ` Shaohua Li
[not found] ` <45cfa4a5-fe04-8b02-531d-c642ad6e7b4c@huawei.com>
2018-02-01 12:26 ` yuyufen
2018-02-01 22:22 ` NeilBrown
2018-02-02 13:49 ` yuyufen
2018-02-02 22:14 ` NeilBrown
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).