Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4435453ybi; Mon, 3 Jun 2019 10:48:22 -0700 (PDT) X-Google-Smtp-Source: APXvYqz+JNdCRM7hvTnIxcNLy4qiNTBe3PFHgHYsRq6V8Scq6wfr6fwVSRxvGnVoKX3I7lTJnfWO X-Received: by 2002:a62:582:: with SMTP id 124mr33288216pff.209.1559584101915; Mon, 03 Jun 2019 10:48:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559584101; cv=none; d=google.com; s=arc-20160816; b=cJYrm5O4UgcfHBN7SMvdeq8xeGKcXfXf1FXsYy89CD97sOOUYMWFKQEm6OnG0129Cw qYt/OliXcpY9klrKN++IG9g/xI0L4BHZaEERXVx0T+uGQsL8Z4S+LegAUxPyrgOJ7uar HBRNfwqfa79XVEYJvdTHrizTgaXzFB7/H4rYqgt1mmOt3u5OlLM7abIzPL7skTqFPEXq EsCL8VdCi6H8f9STaIH0L2QqaXEqihYMkXpPmHpBYc+cqLIEz4XnGoa/gdDXt7geuMDu 6j1bECHOOw13AKMw7df6JqfdAseUpHJczIHo8AZfDd1P4PRxlbI65xg6yCsejJuBeJHs 2Dxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature; bh=20IQdLWV7LoswGVHvSCpf8ERmeNkVp/K1G2Z5GkZ+1U=; b=Vc2clRDp1Z758Nyvc8FR8mhWlsD45o0groQK/jyIsyyUh9QMYkdTJDD7B6idp0ju1E UQtnEWfJXL/n9WU9jLiamvBYc18Y5wiG8inMYcje8KprDYitzWj87ZXSRDYVEgwWxZ4C VVql50tDFYMVpT2XA6WSMcbkB1kIfpz6dhaIepcKdm0W1xU7Yd555U0wIxFJ6IFPBnO9 jFXxwT8nDAAheMb5GlvUkvyi/PnE78BYuyPh+tuZRhNcvmjR3taFiNyOntne2l6F7k2x L/YdD1mrhi01M+4cOtDNJyWY8dSzds0xGNGrkufq6Xt4Y0mqtsysjseKSFd7ImxBKv5x /bSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@draconx-ca.20150623.gappssmtp.com header.s=20150623 header.b=u8ZfzoD3; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g73si23166953pfb.282.2019.06.03.10.48.07; Mon, 03 Jun 2019 10:48:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@draconx-ca.20150623.gappssmtp.com header.s=20150623 header.b=u8ZfzoD3; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727935AbfFCQeq (ORCPT + 99 others); Mon, 3 Jun 2019 12:34:46 -0400 Received: from mail-lf1-f65.google.com ([209.85.167.65]:35555 "EHLO mail-lf1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727354AbfFCQeq (ORCPT ); Mon, 3 Jun 2019 12:34:46 -0400 Received: by mail-lf1-f65.google.com with SMTP id a25so14133107lfg.2 for ; Mon, 03 Jun 2019 09:34:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=draconx-ca.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=20IQdLWV7LoswGVHvSCpf8ERmeNkVp/K1G2Z5GkZ+1U=; b=u8ZfzoD3hHurL5QG+Z+mWq3CZdM3MIEEVB3w0hJMMnl2vWx4nC/soIoZSNR6nCkvWJ 0/ExaNuiYQOoutuvMtBd3tfrU5EyoYPGDpSnNkc2CvJ+mTaaGVYFdjDNCtBCqUgK8OCv vhW/eaG+/FeVpMQRKDJDwwDR7Kj/YhYETdxP59uFUyrsvHkCxH/T9igDZ9rxeNOPXuw+ ssvJ9RnlKlOFlf1agAcQLraZHRWa4g5L6rnm8umQU+TvnvFZBrnN2EGHS7UmaHhaN4cW D546v2z54ieNiynWg4TkVZZFpS2s1Qu49FrkN/3oPyqnyIOrq+O2a6V1xoLaLaO2/G7g hhxg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=20IQdLWV7LoswGVHvSCpf8ERmeNkVp/K1G2Z5GkZ+1U=; b=aW81V1Qr/2FGPyGliozflYlIizoVIz+jwlvFRawcir1bkLLrXLq+BjEW2G7JnUHSrk ZnWpFnk0bhvmpbVMpDO7EzljtY4+ukWMWEX+W2ZHQGG+kUSRijtvhen6+n/+S40KhysY hc9JOBMjKFwDvp+t4qj46ahcqk1dwG4+X0fbQ7KHNHw7jU4GMYITRGNOfALSqbONSHLu TCZjvL2mbG53J/kjNawS55s1V0QRX0FEsb7qaZ7SiTErtfKAUgdOaK7QydVRzfJQM222 MN/9oaVLNOWYkuS5N/JBP4iOBjATinNWfOGmCiA4WIj8ACV/YYSmKoccE5yFfbwAZwPK 34kw== X-Gm-Message-State: APjAAAUwyE2s7rZ1rd16j+hsWvydK0PsEUKIHYik1irSWM+lIyGajDuF 4ygJ3wSyJ+ldMm6Y8kvzpZnQ9E9aBrpcHlo/XSc4Iw== X-Received: by 2002:a19:5046:: with SMTP id z6mr14316936lfj.185.1559579683831; Mon, 03 Jun 2019 09:34:43 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a2e:9d89:0:0:0:0:0 with HTTP; Mon, 3 Jun 2019 09:34:43 -0700 (PDT) X-Originating-IP: [162.243.96.244] In-Reply-To: References: <20190529151003.hzmesyoiopnbcgkb@aura.draconx.ca> From: Nick Bowler Date: Mon, 3 Jun 2019 12:34:43 -0400 Message-ID: Subject: Re: PROBLEM: oops spew with Linux 5.1.5 (NFS regression?) To: Olga Kornievskaia Cc: Trond Myklebust , "linux-nfs@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "Olga.Kornievskaia@netapp.com" Content-Type: text/plain; charset="UTF-8" Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On 2019-05-29, Olga Kornievskaia wrote: > On Wed, May 29, 2019 at 1:14 PM Trond Myklebust > wrote: >> >> On Wed, 2019-05-29 at 11:10 -0400, Nick Bowler wrote: >> > Hi, >> > >> > I upgraded to Linux 5.1.5 on one machine yesterday, and this morning >> > I happened noticed a large amount of backtraces in the log. It appears >> > that the system oopsed 62 times over a period of about 5 minutes, >> > producing about half a megabyte of log messages, after which the >> > messages stopped. No idea what action (if any) triggered these. >> > >> > However, other than the noise in the logs there is nothing obviously >> > broken, but I thought I should report the spews anyway. I was >> > running 5.0.9 previously and have not seen any similar errors. The >> > first couple spews are appended. All 64 faults look very similar >> > to these ones, with the same faulting address and the same >> > rpc_check_timeout function at the top of the backtrace. >> >> OK, I think this is the same problem that Olga was seeing (Cced), and >> it looks like I missed the use-after-free issue when the server returns >> a credential error when she asked. > > I think this is actually different than what I encountered for the > umount case but the trigger is the same -- failing validation. > > I tried to reproduce Nick's oops on 5.2-rc but haven't been able to > (but I'm not confident I produced the right trigger conditions. will > try 5.1). OK, I think I found something that triggers this fault. This happens when certain local users try to stat a file or directory on an nfs mount. Presumably these UIDs do not have appropriate permissions on the server but I'm not sure exactly (I do not control the server). I can reproduce the oops with a command like this: # su -s/bin/sh -c 'stat /path/to/nfs/file' problematic_user which oopes every time (and SIGKILLs the stat command). (I have not yet rebooted since the original report or tried with Trond's patch applied. I will do that next, and also try 5.1.6). Cheers, Nick