On Tue, 05 Apr 2011 15:46:08 -0700 Ben Greear <greearb@xxxxxxxxxxxxxxx> wrote: > When we try to create files with O_DIRECT on cifs file systems, > we get a repeatable crash in 2.6.38.2 (plus hacks, but no hacks to > cifs) > > It crashes in cifsFileInfo_put, probably because cif_file->dentry > is NULL, but I'm still working on confirming that. > > Assuming that is the cause, any ideas on how to go about fixing > this properly? > > (gdb) l *(cifsFileInfo_put+0x10) > 0xfd59 is in cifsFileInfo_put (/home/greearb/git/linux-2.6.dev.38.y/fs/cifs/file.c:287). > 282 * the filehandle out on the server. Must be called without holding > 283 * cifs_file_list_lock. > 284 */ > 285 void cifsFileInfo_put(struct cifsFileInfo *cifs_file) > 286 { > 287 struct inode *inode = cifs_file->dentry->d_inode; > 288 struct cifsTconInfo *tcon = tlink_tcon(cifs_file->tlink); > 289 struct cifsInodeInfo *cifsi = CIFS_I(inode); > 290 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb); > 291 struct cifsLockInfo *li, *tmp; > > > BUG: unable to handle kernel NULL pointer dereference at 0000001c > IP: [<f993e265>] cifsFileInfo_put+0x10/0x1b1 [cifs] > *pde = 7efaa067 > Oops: 0000 [#1] SMP > last sysfs file: /sys/devices/pci0000:00/0000:00:1e.0/0000:03:00.0/net/wlan0/flags > Modules linked in: md4 nls_utf8 cifs xt_CT iptable_raw ipt_addrtype xt_DSCP xt_dscp xt_string xt_owner xt_NFQUEUE xt_multiport xt_mark xt_iprange xt_hashlimit > xt_connmark veth cryptd aes_i586 aes_generic xt_TPROXY nf_tproxy_core xt_socket ip6_tables nf_defrag_ipv6 xt_connlimit 8021q garp stp llc fuse macvlan pktgen > coretemp hwmon nfs lockd fscache nfs_acl auth_rpcgss sunrpc ipv6 uinput arc4 ecb ath9k snd_hda_codec_realtek mac80211 snd_hda_intel snd_hda_codec ath9k_common > snd_hwdep snd_seq ath9k_hw snd_seq_device ath snd_pcm cfg80211 microcode snd_timer iTCO_wdt i2c_i801 iTCO_vendor_support snd r8169 pcspkr serio_raw soundcore > mii snd_page_alloc i915 drm_kms_helper drm i2c_algo_bit video [last unloaded: ipt_addrtype] > > Pid: 18514, comm: btserver Tainted: P 2.6.38-wl+ #53 To Be Filled By O.E.M. To Be Filled By O.E.M./To be filled by O.E.M. > EIP: 0060:[<f993e265>] EFLAGS: 00010292 CPU: 1 > EIP is at cifsFileInfo_put+0x10/0x1b1 [cifs] > EAX: 00000000 EBX: 00000000 ECX: f993e583 EDX: f086d540 > ESI: 00000008 EDI: e65302d4 EBP: f1e9bdbc ESP: f1e9bda8 > DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 > Process btserver (pid: 18514, ti=f1e9a000 task=f4e7d280 task.ti=f1e9a000) > Stack: > 00000000 00000000 f086d540 00000008 e65302d4 f1e9bdc8 f993e599 f086d540 > f1e9bdec c04e39a7 f06fe300 f086d548 e65302d4 eee5b780 ffffffea e65302d4 > 00000000 f1e9be0c c04e1486 eee5b780 f06fe300 00000000 eee5b780 f1e9beec > Call Trace: > [<f993e599>] cifs_close+0x16/0x25 [cifs] > [<c04e39a7>] fput+0xf4/0x170 > [<c04e1486>] __dentry_open+0x19b/0x21c > [<c04e163a>] lookup_instantiate_filp+0x70/0x8c > [<c04e0e60>] ? generic_file_open+0x0/0x58 > [<c04e0e60>] ? generic_file_open+0x0/0x58 > [<f993ca91>] cifs_lookup+0x2af/0x38f [cifs] > [<c04eaae5>] d_alloc_and_lookup+0x3d/0x54 > [<c04ead6e>] __lookup_hash+0x6a/0x71 > [<c04ebe0d>] do_last+0xb3/0x243 > [<c04ed69a>] do_filp_open+0x25f/0x4a9 > [<c04d566e>] ? __slab_alloc.clone.4+0xc6/0x203 > [<c07e20fa>] ? _raw_spin_unlock+0x22/0x25 > [<c04e11fd>] do_sys_open+0x49/0xc9 > [<c04ea73a>] ? path_put+0x1a/0x1d > [<c04e12c9>] sys_open+0x23/0x2b > [<c040315c>] sysenter_do_call+0x12/0x38 > Code: b3 4e 95 f9 68 72 4f 95 f9 e8 c4 1a ea c6 83 c4 14 8d 65 f4 31 c0 5b 5e 5f 5d c3 55 89 e5 57 56 53 83 ec 08 3e 8d 74 26 00 89 c3 <8b> 40 1c 8b 78 20 8b 43 > 24 8b 40 1c 89 45 f0 8b 47 10 8b 80 8c > EIP: [<f993e265>] cifsFileInfo_put+0x10/0x1b1 [cifs] SS:ESP 0068:f1e9bda8 > CR2: 000000000000001c > ---[ end trace db4167a97eeb41b3 ]--- > Does the attached patch fix it? It's probably stable material if so... FWIW, cifs doesn't handle O_DIRECT at all. -- Jeff Layton <jlayton@xxxxxxxxxx>
>From 0f1c5ffdb246b3166a9040dfc10a59eddfdd9828 Mon Sep 17 00:00:00 2001 From: Jeff Layton <jlayton@xxxxxxxxxx> Date: Tue, 5 Apr 2011 16:23:47 -0700 Subject: [PATCH] cifs: check for private_data before trying to put it cifs_close doesn't check that the filp->private_data is non-NULL before trying to put it. That can cause an oops in certain error conditions that can occur on open or lookup before the private_data is set. Reported-by: Ben Greear <greearb@xxxxxxxxxxxxxxx> Signed-off-by: Jeff Layton <jlayton@xxxxxxxxxx> --- fs/cifs/file.c | 6 ++++-- 1 files changed, 4 insertions(+), 2 deletions(-) diff --git a/fs/cifs/file.c b/fs/cifs/file.c index da53246..9c7f83f0 100644 --- a/fs/cifs/file.c +++ b/fs/cifs/file.c @@ -575,8 +575,10 @@ reopen_error_exit: int cifs_close(struct inode *inode, struct file *file) { - cifsFileInfo_put(file->private_data); - file->private_data = NULL; + if (file->private_data != NULL) { + cifsFileInfo_put(file->private_data); + file->private_data = NULL; + } /* return code from the ->release op is always ignored */ return 0; -- 1.7.4.2