Received: by 10.192.165.156 with SMTP id m28csp1115506imm; Wed, 11 Apr 2018 12:43:33 -0700 (PDT) X-Google-Smtp-Source: AIpwx497/u891OsudIxYCzWnN19CexSDw3HsK3XmIm695YNQitGQC61lePsrdj1zyESdVMzgFpLu X-Received: by 2002:a17:902:b58e:: with SMTP id a14-v6mr6370244pls.175.1523475813935; Wed, 11 Apr 2018 12:43:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523475813; cv=none; d=google.com; s=arc-20160816; b=xAWYwM0dYP419n+mio6sfLSCXV4G9oCoDdPTYh+oLVtv4VNafjuUp4aGCp3vHnccqo Hrw4FzNvpp37oi/uJIgr4EvtXouExINyvTZ1fr4vgQZz+NiLDJO3yM5Eg1b5Y5rhPi6s ibS1MsqRDFJic9ixY4cUak/2oggkddf+Lz/VDsLcrBvSjZaPhUyHoIzPA0HkP1yxRDxm VoAM8TGOn2tpNwML7Kel44611LxcPX7zR+aZeYoW6r6miWfNZngtFvkzC+wcH9dSQ3Lt PGKCPtQob3Tk305IvBHRqwFiT3gCMLg+nzb4c+CzFkDkWOZe5DLlGLND8/oi4pJQDpi3 5Ulg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=kii8p+J0Olsho00xkFck7ClzlSObWXvnrTjwjlkZz0M=; b=p7ET4dby0Jzi3yEhJrpX8WJ5GeHS91RcviMDBrH45Oc7CV5ImtvA99PXG8Tg2umHGM cwX6GKltUvnjTdejQFxxNU8Ew09XsQVQIK5hh1kZCuM9bcfjlkdVyK08Z+UkyAr6RL7F akTERLkyBPgiTepCCvfexYZAI3LMo8eOIfmACxaFD1oS9Qlt7kQ2T41lDBAYnzpn9ct/ B5CfXMqXX6W62rHqH/9Zu9ZGNRVQffdEPLF6QMJtTrNFeeV+lNQrOSZPWa4RV5GP4ILl VQzN/SQvVgH8tSfuv1XHTpdfFDUYeZX2RNtvJaRn15ZRf3S0qD3cjnMu9HES5XswfYm+ toaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 33-v6si1690761ply.517.2018.04.11.12.42.57; Wed, 11 Apr 2018 12:43:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934212AbeDKTBP (ORCPT + 99 others); Wed, 11 Apr 2018 15:01:15 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38072 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932906AbeDKTBM (ORCPT ); Wed, 11 Apr 2018 15:01:12 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 0146FDCB; Wed, 11 Apr 2018 19:01:11 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christoph Hellwig , Hannes Reinecke , "Martin K. Petersen" , Dmitry Monakhov , Jens Axboe , Sasha Levin Subject: [PATCH 4.9 188/310] bio-integrity: Do not allocate integrity context for bio w/o data Date: Wed, 11 Apr 2018 20:35:27 +0200 Message-Id: <20180411183630.697344537@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180411183622.305902791@linuxfoundation.org> References: <20180411183622.305902791@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dmitry Monakhov [ Upstream commit 3116a23bb30272d74ea81baf5d0ee23f602dd15b ] If bio has no data, such as ones from blkdev_issue_flush(), then we have nothing to protect. This patch prevent bugon like follows: kfree_debugcheck: out of range ptr ac1fa1d106742a5ah kernel BUG at mm/slab.c:2773! invalid opcode: 0000 [#1] SMP Modules linked in: bcache CPU: 0 PID: 4428 Comm: xfs_io Tainted: G W 4.11.0-rc4-ext4-00041-g2ef0043-dirty #43 Hardware name: Virtuozzo KVM, BIOS seabios-1.7.5-11.vz7.4 04/01/2014 task: ffff880137786440 task.stack: ffffc90000ba8000 RIP: 0010:kfree_debugcheck+0x25/0x2a RSP: 0018:ffffc90000babde0 EFLAGS: 00010082 RAX: 0000000000000034 RBX: ac1fa1d106742a5a RCX: 0000000000000007 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88013f3ccb40 RBP: ffffc90000babde8 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000fcb76420 R11: 00000000725172ed R12: 0000000000000282 R13: ffffffff8150e766 R14: ffff88013a145e00 R15: 0000000000000001 FS: 00007fb09384bf40(0000) GS:ffff88013f200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd0172f9e40 CR3: 0000000137fa9000 CR4: 00000000000006f0 Call Trace: kfree+0xc8/0x1b3 bio_integrity_free+0xc3/0x16b bio_free+0x25/0x66 bio_put+0x14/0x26 blkdev_issue_flush+0x7a/0x85 blkdev_fsync+0x35/0x42 vfs_fsync_range+0x8e/0x9f vfs_fsync+0x1c/0x1e do_fsync+0x31/0x4a SyS_fsync+0x10/0x14 entry_SYSCALL_64_fastpath+0x1f/0xc2 Reviewed-by: Christoph Hellwig Reviewed-by: Hannes Reinecke Reviewed-by: Martin K. Petersen Signed-off-by: Dmitry Monakhov Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- block/bio-integrity.c | 3 +++ 1 file changed, 3 insertions(+) --- a/block/bio-integrity.c +++ b/block/bio-integrity.c @@ -175,6 +175,9 @@ bool bio_integrity_enabled(struct bio *b if (!bio_is_rw(bio)) return false; + if (!bio_sectors(bio)) + return false; + /* Already protected? */ if (bio_integrity(bio)) return false;