public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* nfs mount fail on linus 20090402 git
       [not found] ` <20090402222106.GC9239@elte.hu>
@ 2009-04-03  1:19   ` Yinghai Lu
  2009-04-03  5:52     ` Pekka Enberg
  0 siblings, 1 reply; 12+ messages in thread
From: Yinghai Lu @ 2009-04-03  1:19 UTC (permalink / raw)
  To: Ingo Molnar, David Miller; +Cc: Pekka Enberg, linux-kernel@vger.kernel.org

mpk12-3214-189-158:~ # cat x
mount -t nfs 10.6.75.100:/data/shared/pxeboot /x
mpk12-3214-189-158:~ # sh x
[   63.198629] ------------[ cut here ]------------
[   63.202589] kernel BUG at mm/slub.c:2753!
[   63.202589] invalid opcode: 0000 [#1] SMP 
[   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
[   63.202589] CPU 0 
[   63.202589] Modules linked in:
[   63.202589] Pid: 10027, comm: mount.nfs Not tainted 2.6.29-07100-g833bb30 #21 Sun Fire X4440
[   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] kfree+0x5a/0xcd
[   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
[   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: ffffffff80a7dc1f
[   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: ffffe2001c018950
[   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: ffffffff811019c0
[   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: ffff880800706475
[   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: ffff882042cebbf0
[   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) knlGS:0000000000000000
[   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 00000000000006e0
[   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[   63.202589] Process mount.nfs (pid: 10027, threadinfo ffff882042cea000, task ffff8820434dc290)
[   63.202589] Stack:
[   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 ffff882042886028
[   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 ffff882042886000
[   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 ffff882042c9ee18
[   63.202589] Call Trace:
[   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
[   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
[   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
[   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
[   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
[   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
[   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
[   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
[   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
[   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
[   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
[   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
[   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
[   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
[   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
[   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
[   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
[   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
[   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
[   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
[   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
[   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
[   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
[   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
[   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
[   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
[   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
[   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b 
[   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
[   63.202589]  RSP <ffff882042ceb9f8>
[   63.524555] ---[ end trace cd0d38e02ad11d61 ]---


^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: nfs mount fail on linus 20090402 git
  2009-04-03  1:19   ` nfs mount fail on linus 20090402 git Yinghai Lu
@ 2009-04-03  5:52     ` Pekka Enberg
  2009-04-03  7:08       ` Ingo Molnar
  2009-04-03  7:16       ` [PATCH] nfs: fix nfs_parse_mount_options() double kfree() Ingo Molnar
  0 siblings, 2 replies; 12+ messages in thread
From: Pekka Enberg @ 2009-04-03  5:52 UTC (permalink / raw)
  To: Yinghai Lu
  Cc: Ingo Molnar, David Miller, linux-kernel@vger.kernel.org,
	Trond Myklebust, chuck.lever

On Fri, Apr 3, 2009 at 4:19 AM, Yinghai Lu <yinghai@kernel.org> wrote:
> mpk12-3214-189-158:~ # cat x
> mount -t nfs 10.6.75.100:/data/shared/pxeboot /x
> mpk12-3214-189-158:~ # sh x
> [   63.198629] ------------[ cut here ]------------
> [   63.202589] kernel BUG at mm/slub.c:2753!
> [   63.202589] invalid opcode: 0000 [#1] SMP
> [   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
> [   63.202589] CPU 0
> [   63.202589] Modules linked in:
> [   63.202589] Pid: 10027, comm: mount.nfs Not tainted 2.6.29-07100-g833bb30 #21 Sun Fire X4440
> [   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] kfree+0x5a/0xcd
> [   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
> [   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: ffffffff80a7dc1f
> [   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: ffffe2001c018950
> [   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: ffffffff811019c0
> [   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: ffff880800706475
> [   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: ffff882042cebbf0
> [   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) knlGS:0000000000000000
> [   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> [   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 00000000000006e0
> [   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [   63.202589] Process mount.nfs (pid: 10027, threadinfo ffff882042cea000, task ffff8820434dc290)
> [   63.202589] Stack:
> [   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 ffff882042886028
> [   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 ffff882042886000
> [   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 ffff882042c9ee18
> [   63.202589] Call Trace:
> [   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
> [   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
> [   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
> [   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> [   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
> [   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
> [   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
> [   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> [   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
> [   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
> [   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> [   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
> [   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
> [   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
> [   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
> [   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
> [   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
> [   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
> [   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
> [   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
> [   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
> [   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
> [   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
> [   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
> [   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b
> [   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
> [   63.202589]  RSP <ffff882042ceb9f8>
> [   63.524555] ---[ end trace cd0d38e02ad11d61 ]---

Looks like a bogus pointer passed to kfree(). Lets cc some NFS folks.

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: nfs mount fail on linus 20090402 git
  2009-04-03  5:52     ` Pekka Enberg
@ 2009-04-03  7:08       ` Ingo Molnar
  2009-04-03  7:15         ` Yinghai Lu
  2009-04-03  7:16       ` [PATCH] nfs: fix nfs_parse_mount_options() double kfree() Ingo Molnar
  1 sibling, 1 reply; 12+ messages in thread
From: Ingo Molnar @ 2009-04-03  7:08 UTC (permalink / raw)
  To: Pekka Enberg, Tom Talpey
  Cc: Yinghai Lu, David Miller, linux-kernel@vger.kernel.org,
	Trond Myklebust, chuck.lever


* Pekka Enberg <penberg@cs.helsinki.fi> wrote:

> On Fri, Apr 3, 2009 at 4:19 AM, Yinghai Lu <yinghai@kernel.org> wrote:
> > mpk12-3214-189-158:~ # cat x
> > mount -t nfs 10.6.75.100:/data/shared/pxeboot /x
> > mpk12-3214-189-158:~ # sh x
> > [   63.198629] ------------[ cut here ]------------
> > [   63.202589] kernel BUG at mm/slub.c:2753!
> > [   63.202589] invalid opcode: 0000 [#1] SMP
> > [   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
> > [   63.202589] CPU 0
> > [   63.202589] Modules linked in:
> > [   63.202589] Pid: 10027, comm: mount.nfs Not tainted 2.6.29-07100-g833bb30 #21 Sun Fire X4440
> > [   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] kfree+0x5a/0xcd
> > [   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
> > [   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: ffffffff80a7dc1f
> > [   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: ffffe2001c018950
> > [   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: ffffffff811019c0
> > [   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: ffff880800706475
> > [   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: ffff882042cebbf0
> > [   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) knlGS:0000000000000000
> > [   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> > [   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 00000000000006e0
> > [   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > [   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> > [   63.202589] Process mount.nfs (pid: 10027, threadinfo ffff882042cea000, task ffff8820434dc290)
> > [   63.202589] Stack:
> > [   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 ffff882042886028
> > [   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 ffff882042886000
> > [   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 ffff882042c9ee18
> > [   63.202589] Call Trace:
> > [   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
> > [   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
> > [   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
> > [   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
> > [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> > [   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
> > [   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
> > [   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
> > [   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
> > [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> > [   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
> > [   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
> > [   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
> > [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> > [   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
> > [   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
> > [   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
> > [   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
> > [   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
> > [   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
> > [   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
> > [   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
> > [   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
> > [   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
> > [   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
> > [   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
> > [   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
> > [   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b
> > [   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
> > [   63.202589]  RSP <ffff882042ceb9f8>
> > [   63.524555] ---[ end trace cd0d38e02ad11d61 ]---
> 
> Looks like a bogus pointer passed to kfree(). Lets cc some NFS folks.

a quick look suggests that this fresh commit moves around a kfree() 
and a destructor call:

  a67d18f: NFS: load the rpc/rdma transport module automatically

the commit log does not mention why the kfree was moved which 
suggests that it might have been done by mistake. (And it might be 
totally correct even - i have not checked the details.) I'll send a 
patch undoing those bits in the next mail.

	Ingo

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: nfs mount fail on linus 20090402 git
  2009-04-03  7:08       ` Ingo Molnar
@ 2009-04-03  7:15         ` Yinghai Lu
  2009-04-03  7:19           ` Ingo Molnar
  0 siblings, 1 reply; 12+ messages in thread
From: Yinghai Lu @ 2009-04-03  7:15 UTC (permalink / raw)
  To: Ingo Molnar
  Cc: Pekka Enberg, Tom Talpey, David Miller,
	linux-kernel@vger.kernel.org, Trond Myklebust, chuck.lever

Ingo Molnar wrote:
> * Pekka Enberg <penberg@cs.helsinki.fi> wrote:
> 
>> On Fri, Apr 3, 2009 at 4:19 AM, Yinghai Lu <yinghai@kernel.org> wrote:
>>> mpk12-3214-189-158:~ # cat x
>>> mount -t nfs 10.6.75.100:/data/shared/pxeboot /x
>>> mpk12-3214-189-158:~ # sh x
>>> [   63.198629] ------------[ cut here ]------------
>>> [   63.202589] kernel BUG at mm/slub.c:2753!
>>> [   63.202589] invalid opcode: 0000 [#1] SMP
>>> [   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
>>> [   63.202589] CPU 0
>>> [   63.202589] Modules linked in:
>>> [   63.202589] Pid: 10027, comm: mount.nfs Not tainted 2.6.29-07100-g833bb30 #21 Sun Fire X4440
>>> [   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] kfree+0x5a/0xcd
>>> [   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
>>> [   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: ffffffff80a7dc1f
>>> [   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: ffffe2001c018950
>>> [   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: ffffffff811019c0
>>> [   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: ffff880800706475
>>> [   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: ffff882042cebbf0
>>> [   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) knlGS:0000000000000000
>>> [   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>>> [   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 00000000000006e0
>>> [   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>> [   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>> [   63.202589] Process mount.nfs (pid: 10027, threadinfo ffff882042cea000, task ffff8820434dc290)
>>> [   63.202589] Stack:
>>> [   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 ffff882042886028
>>> [   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 ffff882042886000
>>> [   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 ffff882042c9ee18
>>> [   63.202589] Call Trace:
>>> [   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
>>> [   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
>>> [   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
>>> [   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
>>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>>> [   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
>>> [   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
>>> [   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
>>> [   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
>>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>>> [   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
>>> [   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
>>> [   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
>>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>>> [   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
>>> [   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
>>> [   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
>>> [   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
>>> [   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
>>> [   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
>>> [   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
>>> [   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
>>> [   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
>>> [   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
>>> [   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
>>> [   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
>>> [   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
>>> [   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b
>>> [   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
>>> [   63.202589]  RSP <ffff882042ceb9f8>
>>> [   63.524555] ---[ end trace cd0d38e02ad11d61 ]---
>> Looks like a bogus pointer passed to kfree(). Lets cc some NFS folks.
> 
> a quick look suggests that this fresh commit moves around a kfree() 
> and a destructor call:
> 
>   a67d18f: NFS: load the rpc/rdma transport module automatically
> 
> the commit log does not mention why the kfree was moved which 
> suggests that it might have been done by mistake. (And it might be 
> totally correct even - i have not checked the details.) I'll send a 
> patch undoing those bits in the next mail.
> 

got two kfree(string), could be some merging problem.

                        string = match_strdup(args);
                        if (string == NULL)
                                goto out_nomem;
                        token = match_token(string,
                                            nfs_xprt_protocol_tokens, args);
                        kfree(string);

                        switch (token) {
                        case Opt_xprt_udp:
                                mnt->flags &= ~NFS_MOUNT_TCP;
                                mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
                                break;
                        case Opt_xprt_tcp:
                                mnt->flags |= NFS_MOUNT_TCP;
                                mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
                                break;
                        case Opt_xprt_rdma:
                                /* vector side protocols to TCP */
                                mnt->flags |= NFS_MOUNT_TCP;
                                mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
                                xprt_load_transport(string);
                                break;
                        default:
                                errors++;
                                dfprintk(MOUNT, "NFS:   unrecognized "
                                                "transport protocol\n");
                        }
                        kfree(string);


^ permalink raw reply	[flat|nested] 12+ messages in thread

* [PATCH] nfs: fix nfs_parse_mount_options() double kfree()
  2009-04-03  5:52     ` Pekka Enberg
  2009-04-03  7:08       ` Ingo Molnar
@ 2009-04-03  7:16       ` Ingo Molnar
  2009-04-03  7:23         ` Pekka Enberg
  2009-04-03 12:15         ` Tom Talpey
  1 sibling, 2 replies; 12+ messages in thread
From: Ingo Molnar @ 2009-04-03  7:16 UTC (permalink / raw)
  To: Pekka Enberg
  Cc: Yinghai Lu, David Miller, linux-kernel@vger.kernel.org,
	Trond Myklebust, chuck.lever, Tom Talpey


Impact: fix crash

Yinghai Lu reported the following crash:

> mpk12-3214-189-158:~ # sh x
> [   63.198629] ------------[ cut here ]------------
> [   63.202589] kernel BUG at mm/slub.c:2753!
> [   63.202589] invalid opcode: 0000 [#1] SMP
> [   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
> [   63.202589] CPU 0
> [   63.202589] Modules linked in:
> [   63.202589] Pid: 10027, comm: mount.nfs Not tainted 2.6.29-07100-g833bb30 #21 Sun Fire X4440
> [   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] kfree+0x5a/0xcd
> [   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
> [   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: ffffffff80a7dc1f
> [   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: ffffe2001c018950
> [   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: ffffffff811019c0
> [   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: ffff880800706475
> [   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: ffff882042cebbf0
> [   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) knlGS:0000000000000000
> [   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> [   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 00000000000006e0
> [   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [   63.202589] Process mount.nfs (pid: 10027, threadinfo ffff882042cea000, task ffff8820434dc290)
> [   63.202589] Stack:
> [   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 ffff882042886028
> [   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 ffff882042886000
> [   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 ffff882042c9ee18
> [   63.202589] Call Trace:
> [   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
> [   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
> [   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
> [   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> [   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
> [   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
> [   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
> [   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> [   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
> [   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
> [   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> [   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
> [   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
> [   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
> [   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
> [   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
> [   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
> [   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
> [   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
> [   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
> [   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
> [   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
> [   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
> [   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
> [   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b
> [   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
> [   63.202589]  RSP <ffff882042ceb9f8>
> [   63.524555] ---[ end trace cd0d38e02ad11d61 ]---

Pekka observed that a bogus pointer was passed to kfree().

This commit:

  a67d18f: NFS: load the rpc/rdma transport module automatically

Moved a kfree() of the options strings in nfs_parse_mount_options()
inadvertently and introduced a double kfree(). Fix it.

Reported-by: Yinghai Lu <yinghai@kernel.org>
Analyzed-by: Pekka Enberg <penberg@cs.helsinki.fi>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
---
 fs/nfs/super.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/fs/nfs/super.c b/fs/nfs/super.c
index 0942fcb..4e7f879 100644
--- a/fs/nfs/super.c
+++ b/fs/nfs/super.c
@@ -1191,7 +1191,6 @@ static int nfs_parse_mount_options(char *raw,
 				goto out_nomem;
 			token = match_token(string,
 					    nfs_xprt_protocol_tokens, args);
-			kfree(string);
 
 			switch (token) {
 			case Opt_xprt_udp:
@@ -1221,6 +1220,7 @@ static int nfs_parse_mount_options(char *raw,
 				goto out_nomem;
 			token = match_token(string,
 					    nfs_xprt_protocol_tokens, args);
+			kfree(string);
 
 			switch (token) {
 			case Opt_xprt_udp:

^ permalink raw reply related	[flat|nested] 12+ messages in thread

* Re: nfs mount fail on linus 20090402 git
  2009-04-03  7:15         ` Yinghai Lu
@ 2009-04-03  7:19           ` Ingo Molnar
  0 siblings, 0 replies; 12+ messages in thread
From: Ingo Molnar @ 2009-04-03  7:19 UTC (permalink / raw)
  To: Yinghai Lu
  Cc: Pekka Enberg, Tom Talpey, David Miller,
	linux-kernel@vger.kernel.org, Trond Myklebust, chuck.lever


* Yinghai Lu <yinghai@kernel.org> wrote:

> Ingo Molnar wrote:
> > * Pekka Enberg <penberg@cs.helsinki.fi> wrote:
> > 
> >> On Fri, Apr 3, 2009 at 4:19 AM, Yinghai Lu <yinghai@kernel.org> wrote:
> >>> mpk12-3214-189-158:~ # cat x
> >>> mount -t nfs 10.6.75.100:/data/shared/pxeboot /x
> >>> mpk12-3214-189-158:~ # sh x
> >>> [   63.198629] ------------[ cut here ]------------
> >>> [   63.202589] kernel BUG at mm/slub.c:2753!
> >>> [   63.202589] invalid opcode: 0000 [#1] SMP
> >>> [   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
> >>> [   63.202589] CPU 0
> >>> [   63.202589] Modules linked in:
> >>> [   63.202589] Pid: 10027, comm: mount.nfs Not tainted 2.6.29-07100-g833bb30 #21 Sun Fire X4440
> >>> [   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] kfree+0x5a/0xcd
> >>> [   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
> >>> [   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: ffffffff80a7dc1f
> >>> [   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: ffffe2001c018950
> >>> [   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: ffffffff811019c0
> >>> [   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: ffff880800706475
> >>> [   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: ffff882042cebbf0
> >>> [   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) knlGS:0000000000000000
> >>> [   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> >>> [   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 00000000000006e0
> >>> [   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> >>> [   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> >>> [   63.202589] Process mount.nfs (pid: 10027, threadinfo ffff882042cea000, task ffff8820434dc290)
> >>> [   63.202589] Stack:
> >>> [   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 ffff882042886028
> >>> [   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 ffff882042886000
> >>> [   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 ffff882042c9ee18
> >>> [   63.202589] Call Trace:
> >>> [   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
> >>> [   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
> >>> [   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
> >>> [   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
> >>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> >>> [   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
> >>> [   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
> >>> [   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
> >>> [   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
> >>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> >>> [   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
> >>> [   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
> >>> [   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
> >>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> >>> [   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
> >>> [   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
> >>> [   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
> >>> [   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
> >>> [   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
> >>> [   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
> >>> [   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
> >>> [   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
> >>> [   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
> >>> [   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
> >>> [   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
> >>> [   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
> >>> [   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
> >>> [   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b
> >>> [   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
> >>> [   63.202589]  RSP <ffff882042ceb9f8>
> >>> [   63.524555] ---[ end trace cd0d38e02ad11d61 ]---
> >> Looks like a bogus pointer passed to kfree(). Lets cc some NFS folks.
> > 
> > a quick look suggests that this fresh commit moves around a kfree() 
> > and a destructor call:
> > 
> >   a67d18f: NFS: load the rpc/rdma transport module automatically
> > 
> > the commit log does not mention why the kfree was moved which 
> > suggests that it might have been done by mistake. (And it might be 
> > totally correct even - i have not checked the details.) I'll send a 
> > patch undoing those bits in the next mail.
> > 
> 
> got two kfree(string), could be some merging problem.

Yes - i just sent the fix for that, could you please check whether 
it fixes the bug for you?

	Ingo

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: [PATCH] nfs: fix nfs_parse_mount_options() double kfree()
  2009-04-03  7:16       ` [PATCH] nfs: fix nfs_parse_mount_options() double kfree() Ingo Molnar
@ 2009-04-03  7:23         ` Pekka Enberg
  2009-04-03  7:49           ` Yinghai Lu
  2009-04-03 12:15         ` Tom Talpey
  1 sibling, 1 reply; 12+ messages in thread
From: Pekka Enberg @ 2009-04-03  7:23 UTC (permalink / raw)
  To: Ingo Molnar
  Cc: Yinghai Lu, David Miller, linux-kernel@vger.kernel.org,
	Trond Myklebust, chuck.lever, Tom Talpey

On Fri, 2009-04-03 at 09:16 +0200, Ingo Molnar wrote:
> Impact: fix crash
> 
> Yinghai Lu reported the following crash:
> 
> > mpk12-3214-189-158:~ # sh x
> > [   63.198629] ------------[ cut here ]------------
> > [   63.202589] kernel BUG at mm/slub.c:2753!
> > [   63.202589] invalid opcode: 0000 [#1] SMP
> > [   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
> > [   63.202589] CPU 0
> > [   63.202589] Modules linked in:
> > [   63.202589] Pid: 10027, comm: mount.nfs Not tainted 2.6.29-07100-g833bb30 #21 Sun Fire X4440
> > [   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] kfree+0x5a/0xcd
> > [   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
> > [   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: ffffffff80a7dc1f
> > [   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: ffffe2001c018950
> > [   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: ffffffff811019c0
> > [   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: ffff880800706475
> > [   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: ffff882042cebbf0
> > [   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) knlGS:0000000000000000
> > [   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> > [   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 00000000000006e0
> > [   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> > [   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> > [   63.202589] Process mount.nfs (pid: 10027, threadinfo ffff882042cea000, task ffff8820434dc290)
> > [   63.202589] Stack:
> > [   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 ffff882042886028
> > [   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 ffff882042886000
> > [   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 ffff882042c9ee18
> > [   63.202589] Call Trace:
> > [   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
> > [   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
> > [   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
> > [   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
> > [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> > [   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
> > [   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
> > [   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
> > [   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
> > [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> > [   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
> > [   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
> > [   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
> > [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
> > [   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
> > [   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
> > [   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
> > [   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
> > [   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
> > [   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
> > [   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
> > [   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
> > [   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
> > [   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
> > [   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
> > [   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
> > [   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
> > [   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b
> > [   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
> > [   63.202589]  RSP <ffff882042ceb9f8>
> > [   63.524555] ---[ end trace cd0d38e02ad11d61 ]---
> 
> Pekka observed that a bogus pointer was passed to kfree().
> 
> This commit:
> 
>   a67d18f: NFS: load the rpc/rdma transport module automatically
> 
> Moved a kfree() of the options strings in nfs_parse_mount_options()
> inadvertently and introduced a double kfree(). Fix it.
> 
> Reported-by: Yinghai Lu <yinghai@kernel.org>
> Analyzed-by: Pekka Enberg <penberg@cs.helsinki.fi>
> Signed-off-by: Ingo Molnar <mingo@elte.hu>

Looks good!

Reviewed-by: Pekka Enberg <penberg@cs.helsinki.fi>


^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: [PATCH] nfs: fix nfs_parse_mount_options() double kfree()
  2009-04-03  7:23         ` Pekka Enberg
@ 2009-04-03  7:49           ` Yinghai Lu
  0 siblings, 0 replies; 12+ messages in thread
From: Yinghai Lu @ 2009-04-03  7:49 UTC (permalink / raw)
  To: Pekka Enberg
  Cc: Ingo Molnar, David Miller, linux-kernel@vger.kernel.org,
	Trond Myklebust, chuck.lever, Tom Talpey

Pekka Enberg wrote:
> On Fri, 2009-04-03 at 09:16 +0200, Ingo Molnar wrote:
>> Impact: fix crash
>>
>> Yinghai Lu reported the following crash:
>>
>>> mpk12-3214-189-158:~ # sh x
>>> [   63.198629] ------------[ cut here ]------------
>>> [   63.202589] kernel BUG at mm/slub.c:2753!
>>> [   63.202589] invalid opcode: 0000 [#1] SMP
>>> [   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
>>> [   63.202589] CPU 0
>>> [   63.202589] Modules linked in:
>>> [   63.202589] Pid: 10027, comm: mount.nfs Not tainted 2.6.29-07100-g833bb30 #21 Sun Fire X4440
>>> [   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] kfree+0x5a/0xcd
>>> [   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
>>> [   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: ffffffff80a7dc1f
>>> [   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: ffffe2001c018950
>>> [   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: ffffffff811019c0
>>> [   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: ffff880800706475
>>> [   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: ffff882042cebbf0
>>> [   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) knlGS:0000000000000000
>>> [   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>>> [   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 00000000000006e0
>>> [   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>>> [   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>>> [   63.202589] Process mount.nfs (pid: 10027, threadinfo ffff882042cea000, task ffff8820434dc290)
>>> [   63.202589] Stack:
>>> [   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 ffff882042886028
>>> [   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 ffff882042886000
>>> [   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 ffff882042c9ee18
>>> [   63.202589] Call Trace:
>>> [   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
>>> [   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
>>> [   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
>>> [   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
>>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>>> [   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
>>> [   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
>>> [   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
>>> [   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
>>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>>> [   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
>>> [   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
>>> [   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
>>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>>> [   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
>>> [   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
>>> [   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
>>> [   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
>>> [   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
>>> [   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
>>> [   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
>>> [   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
>>> [   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
>>> [   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
>>> [   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
>>> [   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
>>> [   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
>>> [   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b
>>> [   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
>>> [   63.202589]  RSP <ffff882042ceb9f8>
>>> [   63.524555] ---[ end trace cd0d38e02ad11d61 ]---
>> Pekka observed that a bogus pointer was passed to kfree().
>>
>> This commit:
>>
>>   a67d18f: NFS: load the rpc/rdma transport module automatically
>>
>> Moved a kfree() of the options strings in nfs_parse_mount_options()
>> inadvertently and introduced a double kfree(). Fix it.
>>
>> Reported-by: Yinghai Lu <yinghai@kernel.org>
>> Analyzed-by: Pekka Enberg <penberg@cs.helsinki.fi>
>> Signed-off-by: Ingo Molnar <mingo@elte.hu>
> 
> Looks good!
> 
> Reviewed-by: Pekka Enberg <penberg@cs.helsinki.fi>

thanks. it fixs the problem.

YH

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: [PATCH] nfs: fix nfs_parse_mount_options() double kfree()
  2009-04-03  7:16       ` [PATCH] nfs: fix nfs_parse_mount_options() double kfree() Ingo Molnar
  2009-04-03  7:23         ` Pekka Enberg
@ 2009-04-03 12:15         ` Tom Talpey
  2009-04-03 13:07           ` Ingo Molnar
  1 sibling, 1 reply; 12+ messages in thread
From: Tom Talpey @ 2009-04-03 12:15 UTC (permalink / raw)
  To: Ingo Molnar
  Cc: Pekka Enberg, Yinghai Lu, David Miller,
	linux-kernel@vger.kernel.org, Trond Myklebust, chuck.lever

At 03:16 AM 4/3/2009, Ingo Molnar wrote:
>
>Impact: fix crash
>
>Yinghai Lu reported the following crash:

This has to have been a merge problem, I moved a single kfree()
down a few lines in order to use the pointer in a second context.
With the moved line, it had been running successfully in Trond's
tree and linux-next for several weeks.

Thanks for fixing!

Tom.

>
>> mpk12-3214-189-158:~ # sh x
>> [   63.198629] ------------[ cut here ]------------
>> [   63.202589] kernel BUG at mm/slub.c:2753!
>> [   63.202589] invalid opcode: 0000 [#1] SMP
>> [   63.202589] last sysfs file: /sys/devices/virtual/net/sit0/type
>> [   63.202589] CPU 0
>> [   63.202589] Modules linked in:
>> [   63.202589] Pid: 10027, comm: mount.nfs Not tainted 
>2.6.29-07100-g833bb30 #21 Sun Fire X4440
>> [   63.202589] RIP: 0010:[<ffffffff802e0015>]  [<ffffffff802e0015>] 
>kfree+0x5a/0xcd
>> [   63.202589] RSP: 0018:ffff882042ceb9f8  EFLAGS: 00010246
>> [   63.202589] RAX: 0200000000000000 RBX: 0000000000000005 RCX: 
>ffffffff80a7dc1f
>> [   63.202589] RDX: ffffe20000000000 RSI: ffffc2000000f470 RDI: 
>ffffe2001c018950
>> [   63.202589] RBP: ffff882042ceba18 R08: 0000000000000000 R09: 
>ffffffff811019c0
>> [   63.202589] R10: 000000004262ce02 R11: ffff882042ceba18 R12: 
>ffff880800706475
>> [   63.202589] R13: ffff882042886000 R14: ffff882042cebbd8 R15: 
>ffff882042cebbf0
>> [   63.202589] FS:  00007fac729ed6f0(0000) GS:ffffc20000000000(0000) 
>knlGS:0000000000000000
>> [   63.202589] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
>> [   63.202589] CR2: 00007fac72c12000 CR3: 0000001841cbb000 CR4: 
>00000000000006e0
>> [   63.202589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
>0000000000000000
>> [   63.202589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 
>0000000000000400
>> [   63.202589] Process mount.nfs (pid: 10027, threadinfo 
>ffff882042cea000, task ffff8820434dc290)
>> [   63.202589] Stack:
>> [   63.202589]  ffff882042ceba18 000000004262ce02 0000000000000005 
>ffff882042886028
>> [   63.202589]  ffff882042ceba58 ffffffff80a7dc1f 000000004262ce02 
>ffff882042886000
>> [   63.202589]  000000004262ce02 ffff882042886000 ffffffff80a7b4a6 
>ffff882042c9ee18
>> [   63.202589] Call Trace:
>> [   63.202589]  [<ffffffff80a7dc1f>] xs_destroy+0x67/0xac
>> [   63.202589]  [<ffffffff80a7b4a6>] ? xprt_destroy+0x0/0xa7
>> [   63.202589]  [<ffffffff80a7b532>] xprt_destroy+0x8c/0xa7
>> [   63.202589]  [<ffffffff80a823b2>] ? put_rpccred+0x112/0x131
>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>> [   63.202589]  [<ffffffff80a7a9a9>] ? rpc_free_client+0x0/0xf9
>> [   63.202589]  [<ffffffff80a7b490>] xprt_put+0x23/0x39
>> [   63.202589]  [<ffffffff80a7aa7a>] rpc_free_client+0xd1/0xf9
>> [   63.202589]  [<ffffffff80a83345>] ? unx_destroy+0x3c/0x57
>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>> [   63.202589]  [<ffffffff80a7aaa2>] ? rpc_free_auth+0x0/0x69
>> [   63.202589]  [<ffffffff80a7aaf0>] rpc_free_auth+0x4e/0x69
>> [   63.202589]  [<ffffffff8025b827>] ? __wake_up+0x52/0x75
>> [   63.202589]  [<ffffffff8051cdd5>] kref_put+0x65/0x87
>> [   63.202589]  [<ffffffff80a7a98e>] rpc_release_client+0x64/0x7f
>> [   63.202589]  [<ffffffff80a8061c>] ? rpc_put_task+0xb0/0xcb
>> [   63.202589]  [<ffffffff80a7abe0>] rpc_shutdown_client+0xd5/0xf8
>> [   63.202589]  [<ffffffff80a7a893>] ? rpc_call_sync+0x63/0x80
>> [   63.202589]  [<ffffffff803fc4ab>] nfs_mount+0x11f/0x1bf
>> [   63.202589]  [<ffffffff803f3036>] nfs_get_sb+0x4ac/0x82a
>> [   63.202589]  [<ffffffff802e8f24>] vfs_kern_mount+0x61/0xbf
>> [   63.202589]  [<ffffffff802fea1d>] ? get_fs_type+0x58/0xc5
>> [   63.202589]  [<ffffffff802e9015>] do_kern_mount+0x56/0x108
>> [   63.202589]  [<ffffffff80302195>] do_mount+0x729/0x788
>> [   63.202589]  [<ffffffff80300025>] ? copy_mount_options+0xdf/0x155
>> [   63.202589]  [<ffffffff8030228c>] sys_mount+0x98/0xf8
>> [   63.202589]  [<ffffffff80230d6b>] system_call_fastpath+0x16/0x1b
>> [   63.202589] Code: 0c 48 ba 00 00 00 00 00 e2 ff ff 48 6b c0 38 48 
>8d 3c 10 48 8b 07 f6 c4 40 74 04 48 8b 7f 10 48 8b 07 84 c0 78 10 f6 
>c4 60 75 04 <0f> 0b eb fe e8 90 75 fd ff eb 4c 48 8b 4d 08 4c 8b 4f 10 9c 5b
>> [   63.202589] RIP  [<ffffffff802e0015>] kfree+0x5a/0xcd
>> [   63.202589]  RSP <ffff882042ceb9f8>
>> [   63.524555] ---[ end trace cd0d38e02ad11d61 ]---
>
>Pekka observed that a bogus pointer was passed to kfree().
>
>This commit:
>
>  a67d18f: NFS: load the rpc/rdma transport module automatically
>
>Moved a kfree() of the options strings in nfs_parse_mount_options()
>inadvertently and introduced a double kfree(). Fix it.
>
>Reported-by: Yinghai Lu <yinghai@kernel.org>
>Analyzed-by: Pekka Enberg <penberg@cs.helsinki.fi>
>Signed-off-by: Ingo Molnar <mingo@elte.hu>
>---
> fs/nfs/super.c |    2 +-
> 1 files changed, 1 insertions(+), 1 deletions(-)
>
>diff --git a/fs/nfs/super.c b/fs/nfs/super.c
>index 0942fcb..4e7f879 100644
>--- a/fs/nfs/super.c
>+++ b/fs/nfs/super.c
>@@ -1191,7 +1191,6 @@ static int nfs_parse_mount_options(char *raw,
> 				goto out_nomem;
> 			token = match_token(string,
> 					    nfs_xprt_protocol_tokens, args);
>-			kfree(string);
> 
> 			switch (token) {
> 			case Opt_xprt_udp:
>@@ -1221,6 +1220,7 @@ static int nfs_parse_mount_options(char *raw,
> 				goto out_nomem;
> 			token = match_token(string,
> 					    nfs_xprt_protocol_tokens, args);
>+			kfree(string);
> 
> 			switch (token) {
> 			case Opt_xprt_udp:


^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: [PATCH] nfs: fix nfs_parse_mount_options() double kfree()
  2009-04-03 12:15         ` Tom Talpey
@ 2009-04-03 13:07           ` Ingo Molnar
  2009-04-03 13:25             ` Trond Myklebust
  0 siblings, 1 reply; 12+ messages in thread
From: Ingo Molnar @ 2009-04-03 13:07 UTC (permalink / raw)
  To: Tom Talpey
  Cc: Pekka Enberg, Yinghai Lu, David Miller,
	linux-kernel@vger.kernel.org, Trond Myklebust, chuck.lever


* Tom Talpey <tmtalpey@gmail.com> wrote:

> At 03:16 AM 4/3/2009, Ingo Molnar wrote:
> >
> >Impact: fix crash
> >
> >Yinghai Lu reported the following crash:
> 
> This has to have been a merge problem, I moved a single kfree() 
> down a few lines in order to use the pointer in a second context. 
> With the moved line, it had been running successfully in Trond's 
> tree and linux-next for several weeks.

Maybe the tree got rebased and that introduced this merge artifact? 

> Thanks for fixing!

You are welcome!

	Ingo

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: [PATCH] nfs: fix nfs_parse_mount_options() double kfree()
  2009-04-03 13:07           ` Ingo Molnar
@ 2009-04-03 13:25             ` Trond Myklebust
  2009-04-03 18:52               ` Yinghai Lu
  0 siblings, 1 reply; 12+ messages in thread
From: Trond Myklebust @ 2009-04-03 13:25 UTC (permalink / raw)
  To: Ingo Molnar
  Cc: Tom Talpey, Pekka Enberg, Yinghai Lu, David Miller,
	linux-kernel@vger.kernel.org, chuck.lever

On Fri, 2009-04-03 at 15:07 +0200, Ingo Molnar wrote:
> * Tom Talpey <tmtalpey@gmail.com> wrote:
> 
> > At 03:16 AM 4/3/2009, Ingo Molnar wrote:
> > >
> > >Impact: fix crash
> > >
> > >Yinghai Lu reported the following crash:
> > 
> > This has to have been a merge problem, I moved a single kfree() 
> > down a few lines in order to use the pointer in a second context. 
> > With the moved line, it had been running successfully in Trond's 
> > tree and linux-next for several weeks.
> 
> Maybe the tree got rebased and that introduced this merge artifact? 

No, but the linux-next tree also contained cachefs, which hasn't been
merged yet. Let's keep an eye out when it does...

-- 
Trond Myklebust
Linux NFS client maintainer

NetApp
Trond.Myklebust@netapp.com
www.netapp.com

^ permalink raw reply	[flat|nested] 12+ messages in thread

* Re: [PATCH] nfs: fix nfs_parse_mount_options() double kfree()
  2009-04-03 13:25             ` Trond Myklebust
@ 2009-04-03 18:52               ` Yinghai Lu
  0 siblings, 0 replies; 12+ messages in thread
From: Yinghai Lu @ 2009-04-03 18:52 UTC (permalink / raw)
  To: Trond Myklebust
  Cc: Ingo Molnar, Tom Talpey, Pekka Enberg, David Miller,
	linux-kernel@vger.kernel.org, chuck.lever

Trond Myklebust wrote:
> On Fri, 2009-04-03 at 15:07 +0200, Ingo Molnar wrote:
>> * Tom Talpey <tmtalpey@gmail.com> wrote:
>>
>>> At 03:16 AM 4/3/2009, Ingo Molnar wrote:
>>>> Impact: fix crash
>>>>
>>>> Yinghai Lu reported the following crash:
>>> This has to have been a merge problem, I moved a single kfree() 
>>> down a few lines in order to use the pointer in a second context. 
>>> With the moved line, it had been running successfully in Trond's 
>>> tree and linux-next for several weeks.
>> Maybe the tree got rebased and that introduced this merge artifact? 
> 
> No, but the linux-next tree also contained cachefs, which hasn't been
> merged yet. Let's keep an eye out when it does...

could be merging sequence.

YH

^ permalink raw reply	[flat|nested] 12+ messages in thread

end of thread, other threads:[~2009-04-03 18:52 UTC | newest]

Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <86802c440904021512o2405ffa2gcbe057b9f81d5a46@mail.gmail.com>
     [not found] ` <20090402222106.GC9239@elte.hu>
2009-04-03  1:19   ` nfs mount fail on linus 20090402 git Yinghai Lu
2009-04-03  5:52     ` Pekka Enberg
2009-04-03  7:08       ` Ingo Molnar
2009-04-03  7:15         ` Yinghai Lu
2009-04-03  7:19           ` Ingo Molnar
2009-04-03  7:16       ` [PATCH] nfs: fix nfs_parse_mount_options() double kfree() Ingo Molnar
2009-04-03  7:23         ` Pekka Enberg
2009-04-03  7:49           ` Yinghai Lu
2009-04-03 12:15         ` Tom Talpey
2009-04-03 13:07           ` Ingo Molnar
2009-04-03 13:25             ` Trond Myklebust
2009-04-03 18:52               ` Yinghai Lu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox