cc: Scott Mayhew Dear Scott, could you please take look at patches? Let me describe the problem once again: lockd_inetaddr_event() ... if (nlmsvc_rqst) { ... svc_age_temp_xprts_now(nlmsvc_rqst->rq_server, (struct sockaddr *)&sin); } Usually access to nlmsvc_rqst is protected by nlmsvc_mutex However lockd_inet[6]addr_event does not take the mutex, therefore nlmsvc_rqst can be changed during execution. as result "if (nlmsvc_rqst)" can be passed, then another thread frees the memory or zeroes this pointer, and then svc_age_temp_xprts_now crash the host on access to already freed memory. Moreover on initialization nlmsvc_rqst can be temporally set to ERR_PTR. NFSD have similar issue. On 2017-10-17 19:40, Vasily Averin wrote: > lockd and nfsd inet[6]addr notifiers use pointer that can be changed during execution. > > lockd_inet[6]addr_event use nlmsvc_rqst without taken nlmsvc_mutex, > nfsd notifier have similar trouble. > > We got few crashes from OpenVz customers on RHEL6-based kernel, > and I have reproduced the problem locally on this kernel. > > I was unable to reproduce the problem on new kernels, > however seems they are affected. > > We cannot add mutexes into notifiers because inet6addr notifiers should be atomic. > > To fix the problem I use atomic counter and waitqueue: > counter allows notifier to access the pointer, > waitqueue allows to delay stop of service until notifier is in use. > > Patches was not tested because I was unable to reproduce the problem on new kernels. > > Please review it carefully and let me know if this can be fixed in a better way. > > Vasily Averin (2): > race of lockd inetaddr notifiers with nlmsvc_rqst change > race of nfsd inetaddr notifiers with nn->nfsd_serv change > > fs/lockd/svc.c | 16 ++++++++++++++-- > fs/nfsd/netns.h | 3 +++ > fs/nfsd/nfsctl.c | 3 +++ > fs/nfsd/nfssvc.c | 14 +++++++++++--- > 4 files changed, 31 insertions(+), 5 deletions(-) > -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html