Re: 3.18.1: broken directory with one file too many

From: J. Bruce Fields
Date: Wed Jan 07 2015 - 13:21:48 EST


On Wed, Jan 07, 2015 at 12:25:06AM +0000, Holger HoffstÃtte wrote:
> On Sat, 20 Dec 2014 13:02:43 -0500, J. Bruce Fields wrote:
>
> > On Thu, Dec 18, 2014 at 08:44:37PM +0100, Holger HoffstÃtte wrote:
> >> On 12/18/14 18:06, J. Bruce Fields wrote:
> >> > Whoops, now I see, the server-side trace has the same problem, I just
> >> > overlooked it the first time.
> >>
> >> Excellent, so we know it's the server's fault. Really would have been
> >> odd to not have it in the server trace.
> >>
> >> >> ..in order to rule out a mistake on my part with the two separate
> >> >> runs (which prevents correlated analysis) I was just about to boot
> >> >> the server back into 3.18.1 and re-run both client- and server-side
> >> >> traces simultaneously. However I have to head out for a bit first;
> >> >> will post that later today.
> >> >
> >> > So this might still be interesting, but it's not a high priority.
> >>
> >> Then I guess I'll better keep my feet still and don't muddle the waters
> >> further, looks like you found what you need. If you still need it just
> >> holler.
> >>
> >> Let me know if there's anything I can do to help/patch/test!
> >
> > Gah. Does this fix it?
> >
> > A struct xdr_stream at a page boundary might point to the end of one
> > page or the beginning of the next, and I'm guessing xdr_truncate_encode
> > wasn't prepared to handle the former.
> >
> > This happens if the readdir entry that would have exceeded the client's
> > dircount/maxcount limit would have ended exactly on a 4k page boundary,
> > and inspection of the trace shows you're hitting exactly that case.
> >
> > If this does the job then I'll go figure out how to make this logic less
> > ugly....
> >
> > --b.
> >
> > diff --git a/net/sunrpc/xdr.c b/net/sunrpc/xdr.c index
> > 1cb61242e55e..32910b91d17c 100644 --- a/net/sunrpc/xdr.c +++
> > b/net/sunrpc/xdr.c @@ -630,6 +630,9 @@ void xdr_truncate_encode(struct
> > xdr_stream *xdr, size_t len)
> >
> > new = buf->page_base + buf->page_len;
> > old = new + fraglen;
> > + /* XXX: HACK: */
> > + if (xdr->p == page_address(*xdr->page_ptr) + PAGE_SIZE)
> > + xdr->page_ptr++;
> > xdr->page_ptr -= (old >> PAGE_SHIFT) - (new >> PAGE_SHIFT);
> >
> > if (buf->page_len) {
>
> Any news on getting this upstream and into -stables? I ack'ed it on Dec.
> 20 and have been running it 24/7 since then with no problems.
>
> Just making sure it doesn't disappear into the post-holiday couch
> crack.. :)

Yeah, understood, thanks for the reminder. I took another look and
found a simpler fix and wanted to reproduce. Unfortunately the
reproducer depends on a lot of details (your git directory won't
necessarily work on somebody else's setup) so all I found was a brute
force attempt to create directories which lots of various-sized entries
(excuse the sloppy shell):

j=74
k=100
while true; do
ssh root@f20-3 '
cd /exports/xfs/DIR
rm -f 00*
for ((i=0; i<'$k'; i++)); do
touch $(printf "%0'$j'.0f" $i); done
for ((i='$k'; i<100; i++));
do touch $(printf "%0'$((j+1))'.0f" $i); done
'
if ! diff <(ssh root@f20-3 ls /exports/xfs/DIR/) <(ls DIR); then
echo "diff found at $j, $k"
break
fi
echo $j, $((k--))
if [ $k -eq 0 ]; then
echo ---
echo $((j+=4)), $((k=100))
fi
done

Now that I think of it there might be other operations (read, readlink)
that could trigger the same problem more easily.

But anyway that reproducer worked and confirmed the following which I'll
probably pass along upstream today or tomorrow....

--b.

commit 9f5b5c33b2ee
Author: J. Bruce Fields <bfields@xxxxxxxxxx>
Date: Mon Dec 22 16:14:51 2014 -0500

rpc: fix xdr_truncate_encode to handle buffer ending on page boundary

A struct xdr_stream at a page boundary might point to the end of one
page or the beginning of the next, but xdr_truncate_encode isn't
prepared to handle the former.

This can cause corruption of NFSv4 READDIR replies in the case that a
readdir entry that would have exceeded the client's dircount/maxcount
limit would have ended exactly on a 4k page boundary. You're more
likely to hit this case on large directories.

Other xdr_truncate_encode callers are probably also affected.

Reported-by: Holger HoffstÃtte <holger.hoffstaette@xxxxxxxxxxxxxx>
Tested-by: Holger HoffstÃtte <holger.hoffstaette@xxxxxxxxxxxxxx>
Fixes: 3e19ce762b53 "rpc: xdr_truncate_encode"
Cc: stable@xxxxxxxxxxxxxxx
Signed-off-by: J. Bruce Fields <bfields@xxxxxxxxxx>

diff --git a/net/sunrpc/xdr.c b/net/sunrpc/xdr.c
index 1cb61242e55e..862307ac341f 100644
--- a/net/sunrpc/xdr.c
+++ b/net/sunrpc/xdr.c
@@ -629,8 +629,8 @@ void xdr_truncate_encode(struct xdr_stream *xdr, size_t len)
buf->len -= fraglen;

new = buf->page_base + buf->page_len;
- old = new + fraglen;
- xdr->page_ptr -= (old >> PAGE_SHIFT) - (new >> PAGE_SHIFT);
+
+ xdr->page_ptr = buf->pages + (new >> PAGE_SHIFT);

if (buf->page_len) {
xdr->p = page_address(*xdr->page_ptr);
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/