Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1412365ybl; Thu, 5 Dec 2019 00:40:46 -0800 (PST) X-Google-Smtp-Source: APXvYqx7uz0E5rl9mi12ZIlqh4B6r6+Szd+YrTZzaJQXB/yijBdbH9fJMYDzo0tYCg+Y7rzIuZsd X-Received: by 2002:a9d:7094:: with SMTP id l20mr5715328otj.190.1575535245953; Thu, 05 Dec 2019 00:40:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575535245; cv=none; d=google.com; s=arc-20160816; b=CV7DC4y99uGMCrYpHRcNhdMpVW+P1wvYNupEE4DNPfK8oRdaEyBP0Z34PB9WEd5Xq+ mLtb5GxaKF9sDH9QNEY1hNx9KeP5Ne/BsPkNCEvT5dT0tDumO7JVXagbl9K52mPXKTnq 8BjyixSqoek/AgQniYcuAbz29DIw4/NoIBTQLlDOX+O4Df/yTyFIIhAMOUmazYGURYPJ sERQeHwd3QH9OJKrntUpu8+R+DCBNsjoJjCQ+omD5oyq3WN3pfdWQwjvWrhuOO3DedUU o2Aw7AyoTw/qynTObQIPOjaGjmmOb6gzfFxPznLDtC8Gs0FIorinZbN5WLs+SYg1FKIU cACw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:to:from:subject; bh=6phLM9qPFSa4CDAz7tlOnron8mGBCCIkjK+742wLmuA=; b=VloH6zBUKNtu7tjh8J6ISm6c+wO2cqp5QOFI0CU+wDNy7gzYI9ca5Qo8eBwoE79cga Ih40y+PwkMPUvUamFJmqfxEa2sIYKjcvXHcGVAIk1d3/Bf7iiREQYT1OjfZa3w5qiKAF XByaD8L6iK1dRVM3nFSYcI7yIltRQjJjVkvwalPFia6zQ1uVu756W/8phLYMuHFdNISb w4s5U7Tcuw+2GRsOI9tkMM7w4nl23xA7q19XDcGfU+upDXyyVE5QH1JUpF92BmC2yLMK 1x9bMsda1unvjJCt+x/88FBrqGPmT4H29knkic+ZwDKg3500K0pFJ+Germq2tqKit497 QGdg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f26si4684921otc.89.2019.12.05.00.40.26; Thu, 05 Dec 2019 00:40:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726059AbfLEIkZ (ORCPT + 99 others); Thu, 5 Dec 2019 03:40:25 -0500 Received: from relay.sw.ru ([185.231.240.75]:44134 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726032AbfLEIkZ (ORCPT ); Thu, 5 Dec 2019 03:40:25 -0500 Received: from vvs-ws.sw.ru ([172.16.24.21]) by relay.sw.ru with esmtp (Exim 4.92.3) (envelope-from ) id 1icmg9-0005Cc-BT; Thu, 05 Dec 2019 11:40:05 +0300 Subject: Re: unsafe req->rq_xprt using inside bc_svc_process() ? From: Vasily Averin To: "linux-nfs@vger.kernel.org" , "J. Bruce Fields" , Chuck Lever , Trond Myklebust , Anna Schumaker References: <79494560-1876-494a-0838-cc646eabf68c@virtuozzo.com> Message-ID: <3b4bd000-13f6-bd4e-a0ea-3e4da3882135@virtuozzo.com> Date: Thu, 5 Dec 2019 11:40:04 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.1 MIME-Version: 1.0 In-Reply-To: <79494560-1876-494a-0838-cc646eabf68c@virtuozzo.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org I've found that Trond fixed it recently in commit 875f0706acc "SUNRPC: The TCP back channel mustn't disappear while requests are outstanding" On 11/29/19 5:10 PM, Vasily Averin wrote: > OpenVz team got complain on crash in bc_svc_process(). > Crashed node had 15 running containers with active nfsv4.1 mounts, > single nfsv4.1-svc thread was processed its back-channel requests. > In our case nfs41_callback_svc() took rpc_rqst *req from serv->sv_cb_list > started its processing but found that req->rq_xprt points to already freed > struct rpc_xprt aka part of struct sock_xprt transport. > > Back-channel request was submitted via xprt_complete_bc_request(), > its processing uses req->rq_xprt reference in many times, > however I did not found who keeps this reference. > It seems sock_xprt or even whole its net namespace can be freed before bc_svc_process() will start processing of submitted back-channel request, and req->rq_xprt using is unsafe in bc_svc_process() > > Am I missed something probably?