[OpenAFS] OpenAFS 1.8.7 on Linux systems running Crowdstrike falcon-sensor

Jonathan Billings jsbillin@umich.edu
Tue, 9 Mar 2021 08:46:20 -0500


--0000000000002ab34f05bd1ac752
Content-Type: text/plain; charset="UTF-8"

Basically, this is what I'm running:

# git describe --abbrev=4 openafs-stable-1_8_x
openafs-stable-1_8_7-109-gb7bdd
# rxdebug localhost 7001 -version
Trying 127.0.0.1 (port 7001):
AFS version: OpenAFS 1.8.7-109-gb7bdd 2021-03-08 mockbuild@

With this kmod and the latest RHEL7 kernel, this is the kernel backtrace:


[  170.503804] BUG: unable to handle kernel NULL pointer dereference at
0000000000000004
[  170.506260] IP: [<ffffffff8238a6ec>] _raw_spin_lock+0xc/0x30
[  170.507074] PGD 0
[  170.507824] Oops: 0002 [#1] SMP
[  170.508596] Modules linked in: cts rpcsec_gss_krb5 nfsv4 dns_resolver
nfs lockd grace falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE)
falcon_kal(E) falcon_lsm_pinned_11308(E) nf_log_ipv4 nf_log_common xt_LOG
ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4
xt_conntrack ebtable_nat ebtable_broute bridge stp llc ip6table_nat
nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle
ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4
nf_nat_ipv4 nf_nat iptable_mangle iptable_security iptable_raw nf_conntrack
libcrc32c ip_set nfnetlink ebtable_filter ebtables ip6table_filter
ip6_tables iptable_filter vmw_vsock_vmci_transport vsock cachefiles fscache
sb_edac ppdev iosf_mbi crc32_pclmul ghash_clmulni_intel vmw_balloon
aesni_intel lrw gf128mul glue_helper
[  170.512708]  ablk_helper cryptd pcspkr joydev sg vmw_vmci i2c_piix4
parport_pc parport binfmt_misc openafs(POE) auth_rpcgss sunrpc ip_tables
ext4 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi sd_mod crc_t10dif
crct10dif_generic vmwgfx drm_kms_helper syscopyarea sysfillrect sysimgblt
fb_sys_fops ttm mptsas ata_piix scsi_transport_sas nfit drm
crct10dif_pclmul mptscsih crct10dif_common libata serio_raw crc32c_intel
libnvdimm mptbase vmxnet3 drm_panel_orientation_quirks floppy dm_mirror
dm_region_hash dm_log dm_mod fuse
[  170.516344] CPU: 6 PID: 2782 Comm: llvmpipe-8 Kdump: loaded Tainted: P
        OE  ------------   3.10.0-1160.15.2.el7.x86_64 #1
[  170.517353] Hardware name: VMware, Inc. VMware Virtual Platform/440BX
Desktop Reference Platform, BIOS 6.00 12/12/2018
[  170.518320] task: ffff9c0127fe0000 ti: ffff9c0556be0000 task.ti:
ffff9c0556be0000
[  170.519315] RIP: 0010:[<ffffffff8238a6ec>]  [<ffffffff8238a6ec>]
_raw_spin_lock+0xc/0x30
[  170.520311] RSP: 0018:ffff9c0556be3710  EFLAGS: 00010246
[  170.521317] RAX: 0000000000000000 RBX: 0000000000000004 RCX:
0000000000000000
[  170.522310] RDX: 0000000000000001 RSI: ffff9c013eb85d80 RDI:
0000000000000004
[  170.523301] RBP: ffff9c0556be3730 R08: 000000000001f060 R09:
ffff9c013efc67a0
[  170.524292] R10: ffff9c0073e7aa80 R11: ffff9c013c7ae440 R12:
ffff9c0556be3740
[  170.525298] R13: 0000000000000000 R14: 0000000000000000 R15:
ffff9c050c867810
[  170.526303] FS:  00007f5b1dd69700(0000) GS:ffff9c0569300000(0000)
knlGS:0000000000000000
[  170.527315] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  170.528324] CR2: 0000000000000004 CR3: 00000004da610000 CR4:
00000000001607e0
[  170.529415] Call Trace:
[  170.530459]  [<ffffffffc0af7d9d>] ? 0xffffffffc0af7d9c
[  170.531482]  [<ffffffffc0b56ab8>] _ZdlPv+0x48088/0x484f0
[falcon_lsm_serviceable]
[  170.532523]  [<ffffffffc0b5725b>]
cshook_security_file_permission+0x9b/0x8c0 [falcon_lsm_serviceable]
[  170.533579]  [<ffffffffc0b5ea9e>] cshook_security_file_open+0xe/0x10
[falcon_lsm_serviceable]
[  170.534637]  [<ffffffffc0ae4873>]
pinnedhook_security_file_open+0x43/0x70 [falcon_lsm_pinned_11308]
[  170.535719]  [<ffffffff81f08f12>] security_file_open+0x22/0x70
[  170.536789]  [<ffffffff81e4b339>] do_dentry_open+0xc9/0x2d0
[  170.537850]  [<ffffffff81e4b5da>] vfs_open+0x5a/0xb0
[  170.538876]  [<ffffffff81e4b679>] dentry_open+0x49/0xc0
[  170.540008]  [<ffffffffc06cdb0f>] afs_linux_raw_open+0x8f/0x140 [openafs]
[  170.541094]  [<ffffffffc06cdc74>] osi_UFSOpen+0xb4/0x1a0 [openafs]
[  170.542140]  [<ffffffffc06567f1>] DRead+0x341/0x520 [openafs]
[  170.543225]  [<ffffffffc0669a7e>] FindItem+0x5e/0x1f0 [openafs]
[  170.544306]  [<ffffffffc066a183>] afs_dir_Delete+0x33/0x1a0 [openafs]
[  170.545409]  [<ffffffffc06a6d17>] ? RXAFS_RemoveFile+0x67/0x120 [openafs]
[  170.546510]  [<ffffffffc068e1ad>] ? afs_LocalHero+0x11d/0x200 [openafs]
[  170.547616]  [<ffffffffc069abc9>] afsremove+0x489/0x7d0 [openafs]
[  170.548705]  [<ffffffffc069beca>] afs_remunlink+0x24a/0x2f0 [openafs]
[  170.549798]  [<ffffffffc068489d>] afs_InactiveVCache+0x7d/0x80 [openafs]
[  170.550891]  [<ffffffffc06d28e8>] afs_dentry_iput+0x58/0x140 [openafs]
[  170.551931]  [<ffffffff81e670ca>] __dentry_kill+0x13a/0x1d0
[  170.553003]  [<ffffffff81e67785>] dput+0xb5/0x1a0
[  170.554060]  [<ffffffff81e500cd>] __fput+0x18d/0x230
[  170.555118]  [<ffffffff81e5025e>] ____fput+0xe/0x10
[  170.556169]  [<ffffffff81cc294b>] task_work_run+0xbb/0xe0
[  170.557191]  [<ffffffff81ca1894>] do_exit+0x2d4/0xa30
[  170.558162]  [<ffffffff81d1317f>] ? futex_wait+0x11f/0x280
[  170.559126]  [<ffffffff81c63d03>] ? x2apic_send_IPI_mask+0x13/0x20
[  170.560048]  [<ffffffff81ca206f>] do_group_exit+0x3f/0xa0
[  170.560939]  [<ffffffff81cb323e>] get_signal_to_deliver+0x1ce/0x5e0
[  170.561802]  [<ffffffff81c2c527>] do_signal+0x57/0x6f0
[  170.562626]  [<ffffffff81d14f46>] ? do_futex+0x106/0x5a0
[  170.563420]  [<ffffffff81c2cc32>] do_notify_resume+0x72/0xc0
[  170.564184]  [<ffffffff823952ef>] int_signal+0x12/0x17
[  170.564878] Code: 5d c3 0f 1f 44 00 00 85 d2 74 e4 0f 1f 40 00 eb ed 66
0f 1f 44 00 00 b8 01 00 00 00 5d c3 90 0f 1f 44 00 00 31 c0 ba 01 00 00 00
<f0> 0f b1 17 85 c0 75 01 c3 55 89 c6 48 89 e5 e8 ea 18 ff ff 5d
[  170.566509] RIP  [<ffffffff8238a6ec>] _raw_spin_lock+0xc/0x30
[  170.567274]  RSP <ffff9c0556be3710>
[  170.568018] CR2: 0000000000000004


On Mon, Mar 8, 2021 at 8:22 PM Jeffrey E Altman <jaltman@auristor.com>
wrote:

> On 3/8/2021 7:20 PM, Benjamin Kaduk (kaduk@mit.edu) wrote:
> > On Mon, Mar 08, 2021 at 07:35:19PM +0000, Martin Kelly wrote:
> >> Below is the LKML LSM thread regarding this. Please let me know if you
> have any other questions:
> >>
> >> https://www.spinics.net/lists/linux-security-module/msg39081.html
> >> https://www.spinics.net/lists/linux-security-module/msg39083.html
> >
> > Thanks for spotting this thread and the quick follow-up.
>
> This is the same thread that Yadav discussed with the openafs-release
> team on 11 Dec 2020.
>
> > I suspect that the changes at https://gerrit.openafs.org/#/c/13751/ are
> > going to be relevant in this space, but without seeing the stack trace of
> > the crash in question it's hard to be sure.  Can you speak to whether
> this
> > is touching the "right" part of the code with respect to the crashes you
> > were investigating?
>
> The suggested change was cherry-picked to openafs-stable-1_8_x as
> https://gerrit.openafs.org/14082 and merged as
> ee578e92d9f810d93659a9805d0c12084fe2bb95.
>
> As Jonathan wrote to IRC OpenAFS:
>
>  > (4:53:15 PM) billings: I built openafs from the latest commit in
>  > 1_8_x and crowdstrike still panics, so it doesnt look like any
>  > merged commits there fix my issue.
>
> Martin's e-mail describes the call pattern:
>
>  > - A process exits, calling task_exit().
>
> I think Martin meant do_exit().
>
>  > - exit_fs() is called, setting current->fs = NULL.
>
> task_struct field struct fs_struct *fs;
>
>  > - Next, exit_task_work() is called,
>
> exit_task_work() calls task_work_run() which flushes any pending works.
>
>  > which calls fput().
>
> which must have been called by a pending work.
>
>  > - In response to the fput(), the filesystem opens a file
>
> disk cache
>
>  >   to update some metadata, calling dentry_open().
>
> dentry_open() in turn will trigger a call to any configured LSM.
> If task_struct.fs is NULL, Kaboom!!!
>
> Jeffrey Altman
>


-- 
Jonathan Billings <jsbillin@umich.edu> (he/his)
College of Engineering - CAEN - Linux Support

--0000000000002ab34f05bd1ac752
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Basically, this is what I&#39;m running:</div><div><b=
r></div><div># git describe --abbrev=3D4 openafs-stable-1_8_x <br>openafs-s=
table-1_8_7-109-gb7bdd</div><div># rxdebug localhost 7001 -version<br>Tryin=
g 127.0.0.1 (port 7001):<br>AFS version: OpenAFS 1.8.7-109-gb7bdd 2021-03-0=
8 mockbuild@</div><div><br></div><div>With this kmod and the latest RHEL7 k=
ernel, this is the kernel backtrace:</div><div><br></div><br><div><span sty=
le=3D"font-family:monospace">[ =C2=A0170.503804] BUG: unable to handle kern=
el NULL pointer dereference at 0000000000000004<br>[ =C2=A0170.506260] IP: =
[&lt;ffffffff8238a6ec&gt;] _raw_spin_lock+0xc/0x30<br>[ =C2=A0170.507074] P=
GD 0 <br>[ =C2=A0170.507824] Oops: 0002 [#1] SMP <br>[ =C2=A0170.508596] Mo=
dules linked in: cts rpcsec_gss_krb5 nfsv4 dns_resolver nfs lockd grace fal=
con_lsm_serviceable(PE) falcon_nf_netcontain(PE) falcon_kal(E) falcon_lsm_p=
inned_11308(E) nf_log_ipv4 nf_log_common xt_LOG ip6t_rpfilter ip6t_REJECT n=
f_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_br=
oute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ip=
v6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_=
ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_mangle iptable_security ipta=
ble_raw nf_conntrack libcrc32c ip_set nfnetlink ebtable_filter ebtables ip6=
table_filter ip6_tables iptable_filter vmw_vsock_vmci_transport vsock cache=
files fscache sb_edac ppdev iosf_mbi crc32_pclmul ghash_clmulni_intel vmw_b=
alloon aesni_intel lrw gf128mul glue_helper<br>[ =C2=A0170.512708] =C2=A0ab=
lk_helper cryptd pcspkr joydev sg vmw_vmci i2c_piix4 parport_pc parport bin=
fmt_misc openafs(POE) auth_rpcgss sunrpc ip_tables ext4 mbcache jbd2 sr_mod=
 cdrom ata_generic pata_acpi sd_mod crc_t10dif crct10dif_generic vmwgfx drm=
_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm mptsas ata_pi=
ix scsi_transport_sas nfit drm crct10dif_pclmul mptscsih crct10dif_common l=
ibata serio_raw crc32c_intel libnvdimm mptbase vmxnet3 drm_panel_orientatio=
n_quirks floppy dm_mirror dm_region_hash dm_log dm_mod fuse<br>[ =C2=A0170.=
516344] CPU: 6 PID: 2782 Comm: llvmpipe-8 Kdump: loaded Tainted: P =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0 OE =C2=A0------------ =C2=A0 3.10.0-1160.15.2.e=
l7.x86_64 #1<br>[ =C2=A0170.517353] Hardware name: VMware, Inc. VMware Virt=
ual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018<br>[ =
=C2=A0170.518320] task: ffff9c0127fe0000 ti: ffff9c0556be0000 task.ti: ffff=
9c0556be0000<br>[ =C2=A0170.519315] RIP: 0010:[&lt;ffffffff8238a6ec&gt;] =
=C2=A0[&lt;ffffffff8238a6ec&gt;] _raw_spin_lock+0xc/0x30<br>[ =C2=A0170.520=
311] RSP: 0018:ffff9c0556be3710 =C2=A0EFLAGS: 00010246<br>[ =C2=A0170.52131=
7] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000000000<br>[ =
=C2=A0170.522310] RDX: 0000000000000001 RSI: ffff9c013eb85d80 RDI: 00000000=
00000004<br>[ =C2=A0170.523301] RBP: ffff9c0556be3730 R08: 000000000001f060=
 R09: ffff9c013efc67a0<br>[ =C2=A0170.524292] R10: ffff9c0073e7aa80 R11: ff=
ff9c013c7ae440 R12: ffff9c0556be3740<br>[ =C2=A0170.525298] R13: 0000000000=
000000 R14: 0000000000000000 R15: ffff9c050c867810<br>[ =C2=A0170.526303] F=
S: =C2=A000007f5b1dd69700(0000) GS:ffff9c0569300000(0000) knlGS:00000000000=
00000<br>[ =C2=A0170.527315] CS: =C2=A00010 DS: 0000 ES: 0000 CR0: 00000000=
80050033<br>[ =C2=A0170.528324] CR2: 0000000000000004 CR3: 00000004da610000=
 CR4: 00000000001607e0<br>[ =C2=A0170.529415] Call Trace:<br>[ =C2=A0170.53=
0459] =C2=A0[&lt;ffffffffc0af7d9d&gt;] ? 0xffffffffc0af7d9c<br>[ =C2=A0170.=
531482] =C2=A0[&lt;ffffffffc0b56ab8&gt;] _ZdlPv+0x48088/0x484f0 [falcon_lsm=
_serviceable]<br>[ =C2=A0170.532523] =C2=A0[&lt;ffffffffc0b5725b&gt;] cshoo=
k_security_file_permission+0x9b/0x8c0 [falcon_lsm_serviceable]<br>[ =C2=A01=
70.533579] =C2=A0[&lt;ffffffffc0b5ea9e&gt;] cshook_security_file_open+0xe/0=
x10 [falcon_lsm_serviceable]<br>[ =C2=A0170.534637] =C2=A0[&lt;ffffffffc0ae=
4873&gt;] pinnedhook_security_file_open+0x43/0x70 [falcon_lsm_pinned_11308]=
<br>[ =C2=A0170.535719] =C2=A0[&lt;ffffffff81f08f12&gt;] security_file_open=
+0x22/0x70<br>[ =C2=A0170.536789] =C2=A0[&lt;ffffffff81e4b339&gt;] do_dentr=
y_open+0xc9/0x2d0<br>[ =C2=A0170.537850] =C2=A0[&lt;ffffffff81e4b5da&gt;] v=
fs_open+0x5a/0xb0<br>[ =C2=A0170.538876] =C2=A0[&lt;ffffffff81e4b679&gt;] d=
entry_open+0x49/0xc0<br>[ =C2=A0170.540008] =C2=A0[&lt;ffffffffc06cdb0f&gt;=
] afs_linux_raw_open+0x8f/0x140 [openafs]<br>[ =C2=A0170.541094] =C2=A0[&lt=
;ffffffffc06cdc74&gt;] osi_UFSOpen+0xb4/0x1a0 [openafs]<br>[ =C2=A0170.5421=
40] =C2=A0[&lt;ffffffffc06567f1&gt;] DRead+0x341/0x520 [openafs]<br>[ =C2=
=A0170.543225] =C2=A0[&lt;ffffffffc0669a7e&gt;] FindItem+0x5e/0x1f0 [openaf=
s]<br>[ =C2=A0170.544306] =C2=A0[&lt;ffffffffc066a183&gt;] afs_dir_Delete+0=
x33/0x1a0 [openafs]<br>[ =C2=A0170.545409] =C2=A0[&lt;ffffffffc06a6d17&gt;]=
 ? RXAFS_RemoveFile+0x67/0x120 [openafs]<br>[ =C2=A0170.546510] =C2=A0[&lt;=
ffffffffc068e1ad&gt;] ? afs_LocalHero+0x11d/0x200 [openafs]<br>[ =C2=A0170.=
547616] =C2=A0[&lt;ffffffffc069abc9&gt;] afsremove+0x489/0x7d0 [openafs]<br=
>[ =C2=A0170.548705] =C2=A0[&lt;ffffffffc069beca&gt;] afs_remunlink+0x24a/0=
x2f0 [openafs]<br>[ =C2=A0170.549798] =C2=A0[&lt;ffffffffc068489d&gt;] afs_=
InactiveVCache+0x7d/0x80 [openafs]<br>[ =C2=A0170.550891] =C2=A0[&lt;ffffff=
ffc06d28e8&gt;] afs_dentry_iput+0x58/0x140 [openafs]<br>[ =C2=A0170.551931]=
 =C2=A0[&lt;ffffffff81e670ca&gt;] __dentry_kill+0x13a/0x1d0<br>[ =C2=A0170.=
553003] =C2=A0[&lt;ffffffff81e67785&gt;] dput+0xb5/0x1a0<br>[ =C2=A0170.554=
060] =C2=A0[&lt;ffffffff81e500cd&gt;] __fput+0x18d/0x230<br>[ =C2=A0170.555=
118] =C2=A0[&lt;ffffffff81e5025e&gt;] ____fput+0xe/0x10<br>[ =C2=A0170.5561=
69] =C2=A0[&lt;ffffffff81cc294b&gt;] task_work_run+0xbb/0xe0<br>[ =C2=A0170=
.557191] =C2=A0[&lt;ffffffff81ca1894&gt;] do_exit+0x2d4/0xa30<br>[ =C2=A017=
0.558162] =C2=A0[&lt;ffffffff81d1317f&gt;] ? futex_wait+0x11f/0x280<br>[ =
=C2=A0170.559126] =C2=A0[&lt;ffffffff81c63d03&gt;] ? x2apic_send_IPI_mask+0=
x13/0x20<br>[ =C2=A0170.560048] =C2=A0[&lt;ffffffff81ca206f&gt;] do_group_e=
xit+0x3f/0xa0<br>[ =C2=A0170.560939] =C2=A0[&lt;ffffffff81cb323e&gt;] get_s=
ignal_to_deliver+0x1ce/0x5e0<br>[ =C2=A0170.561802] =C2=A0[&lt;ffffffff81c2=
c527&gt;] do_signal+0x57/0x6f0<br>[ =C2=A0170.562626] =C2=A0[&lt;ffffffff81=
d14f46&gt;] ? do_futex+0x106/0x5a0<br>[ =C2=A0170.563420] =C2=A0[&lt;ffffff=
ff81c2cc32&gt;] do_notify_resume+0x72/0xc0<br>[ =C2=A0170.564184] =C2=A0[&l=
t;ffffffff823952ef&gt;] int_signal+0x12/0x17<br>[ =C2=A0170.564878] Code: 5=
d c3 0f 1f 44 00 00 85 d2 74 e4 0f 1f 40 00 eb ed 66 0f 1f 44 00 00 b8 01 0=
0 00 00 5d c3 90 0f 1f 44 00 00 31 c0 ba 01 00 00 00 &lt;f0&gt; 0f b1 17 85=
 c0 75 01 c3 55 89 c6 48 89 e5 e8 ea 18 ff ff 5d <br>[ =C2=A0170.566509] RI=
P =C2=A0[&lt;ffffffff8238a6ec&gt;] _raw_spin_lock+0xc/0x30<br>[ =C2=A0170.5=
67274] =C2=A0RSP &lt;ffff9c0556be3710&gt;<br>[ =C2=A0170.568018] CR2: 00000=
00000000004</span><br></div><div><br></div></div><br><div class=3D"gmail_qu=
ote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, Mar 8, 2021 at 8:22 PM J=
effrey E Altman &lt;<a href=3D"mailto:jaltman@auristor.com">jaltman@auristo=
r.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:=
1ex">On 3/8/2021 7:20 PM, Benjamin Kaduk (<a href=3D"mailto:kaduk@mit.edu" =
target=3D"_blank">kaduk@mit.edu</a>) wrote:<br>
&gt; On Mon, Mar 08, 2021 at 07:35:19PM +0000, Martin Kelly wrote:<br>
&gt;&gt; Below is the LKML LSM thread regarding this. Please let me know if=
 you have any other questions:<br>
&gt;&gt;<br>
&gt;&gt; <a href=3D"https://www.spinics.net/lists/linux-security-module/msg=
39081.html" rel=3D"noreferrer" target=3D"_blank">https://www.spinics.net/li=
sts/linux-security-module/msg39081.html</a><br>
&gt;&gt; <a href=3D"https://www.spinics.net/lists/linux-security-module/msg=
39083.html" rel=3D"noreferrer" target=3D"_blank">https://www.spinics.net/li=
sts/linux-security-module/msg39083.html</a><br>
&gt; <br>
&gt; Thanks for spotting this thread and the quick follow-up.<br>
<br>
This is the same thread that Yadav discussed with the openafs-release <br>
team on 11 Dec 2020.<br>
<br>
&gt; I suspect that the changes at <a href=3D"https://gerrit.openafs.org/#/=
c/13751/" rel=3D"noreferrer" target=3D"_blank">https://gerrit.openafs.org/#=
/c/13751/</a> are<br>
&gt; going to be relevant in this space, but without seeing the stack trace=
 of<br>
&gt; the crash in question it&#39;s hard to be sure.=C2=A0 Can you speak to=
 whether this<br>
&gt; is touching the &quot;right&quot; part of the code with respect to the=
 crashes you<br>
&gt; were investigating?<br>
<br>
The suggested change was cherry-picked to openafs-stable-1_8_x as<br>
<a href=3D"https://gerrit.openafs.org/14082" rel=3D"noreferrer" target=3D"_=
blank">https://gerrit.openafs.org/14082</a> and merged as <br>
ee578e92d9f810d93659a9805d0c12084fe2bb95.<br>
<br>
As Jonathan wrote to IRC OpenAFS:<br>
<br>
=C2=A0&gt; (4:53:15 PM) billings: I built openafs from the latest commit in=
<br>
=C2=A0&gt; 1_8_x and crowdstrike still panics, so it doesnt look like any<b=
r>
=C2=A0&gt; merged commits there fix my issue.<br>
<br>
Martin&#39;s e-mail describes the call pattern:<br>
<br>
=C2=A0&gt; - A process exits, calling task_exit().<br>
<br>
I think Martin meant do_exit().<br>
<br>
=C2=A0&gt; - exit_fs() is called, setting current-&gt;fs =3D NULL.<br>
<br>
task_struct field struct fs_struct *fs;<br>
<br>
=C2=A0&gt; - Next, exit_task_work() is called,<br>
<br>
exit_task_work() calls task_work_run() which flushes any pending works.<br>
<br>
=C2=A0&gt; which calls fput().<br>
<br>
which must have been called by a pending work.<br>
<br>
=C2=A0&gt; - In response to the fput(), the filesystem opens a file<br>
<br>
disk cache<br>
<br>
=C2=A0&gt;=C2=A0 =C2=A0to update some metadata, calling dentry_open().<br>
<br>
dentry_open() in turn will trigger a call to any configured LSM.<br>
If task_struct.fs is NULL, Kaboom!!!<br>
<br>
Jeffrey Altman<br>
</blockquote></div><br clear=3D"all"><br>-- <br><div dir=3D"ltr" class=3D"g=
mail_signature"><div dir=3D"ltr">Jonathan Billings &lt;<a href=3D"mailto:js=
billin@umich.edu" target=3D"_blank">jsbillin@umich.edu</a>&gt; (he/his)<br>=
College of Engineering - CAEN - Linux Support<br></div></div>

--0000000000002ab34f05bd1ac752--