Received: by 10.192.165.156 with SMTP id m28csp1195692imm; Wed, 11 Apr 2018 14:20:12 -0700 (PDT) X-Google-Smtp-Source: AIpwx48RLnaiNyJE+oNzraNZSUybokUw4o+SxGUWDSuKPKWkPm3AryKdhWJNfjOjHO/BikuuGnCQ X-Received: by 10.101.82.197 with SMTP id z5mr1342582pgp.45.1523481612641; Wed, 11 Apr 2018 14:20:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523481612; cv=none; d=google.com; s=arc-20160816; b=V8rM4hCnO/t3++kwj8YuW+ZslFPCbDa4E1q8a+G8D2deAxkXM+UaRTK3POgCokzQVT ZBRO/TmGnW7TEIbyDbQ8bLarXsaWhZfAGFD6t4CZ+hpibpC6IJqGbR8dInFSlJlsj6Vx 6bfJZsMbLQ5gptvBeKkRaxJ1sMj24O/cL1EcaqLcXrs5YnKrmNV061Ys1XCO+aykOiGD eiEQXJvQP4OsFjPNM2N7rt2I6m7zJha+UJkRiXHEdEfgSx8NmjuUnLCgXgmDZ4N0PWWW JvG0eSM2MTaNzSO5OgjWdA6ivgQa/RPgTgKbOgzVb4A2okn4QdFIiAAZ+dO3svL/opaD Ssjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=EFs4re9wmhPJopy6hvOGv+0G3zkHUSA+TOFDcOQU4QE=; b=nx+QkYCweSb8+S+nZx/WbYVzAnZhrgfs1ebQrHKhKkgdpxrBheh6sIIXqrl+fEy9rF niFrWHIJKDSKt6gqQ+zQos7nBOJ+05Gu/MwvhBjv1qpXogAAXHF/TtpmcdHIpr0NpYBa bmJ6zyI63aqz4+1MitMg1dRqABRpHYFYc+UQcSkhv5J0DTHW0GbUjUl9kFLUW4vk41/r UBIb+/HG71tbunO6fEgWMtUyItFccu1Sd5qv/ch+p/LaJLawuixgpGdHJKxtBWvQYpWj 6kHJcvyiXx04gMfBi0rhq7l9SU0OVDD7nAgW8pDvVEH4iBrVXFQ6Y+1OwaaBu2eCeW/h ZCBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 62-v6si1668212ply.494.2018.04.11.14.19.36; Wed, 11 Apr 2018 14:20:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754699AbeDKSkn (ORCPT + 99 others); Wed, 11 Apr 2018 14:40:43 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:56522 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754623AbeDKSkk (ORCPT ); Wed, 11 Apr 2018 14:40:40 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 4E65AD9C; Wed, 11 Apr 2018 18:40:39 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christoph Hellwig , Hannes Reinecke , "Martin K. Petersen" , Dmitry Monakhov , Jens Axboe , Sasha Levin Subject: [PATCH 3.18 066/121] bio-integrity: Do not allocate integrity context for bio w/o data Date: Wed, 11 Apr 2018 20:36:09 +0200 Message-Id: <20180411183500.218573435@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180411183456.195010921@linuxfoundation.org> References: <20180411183456.195010921@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dmitry Monakhov [ Upstream commit 3116a23bb30272d74ea81baf5d0ee23f602dd15b ] If bio has no data, such as ones from blkdev_issue_flush(), then we have nothing to protect. This patch prevent bugon like follows: kfree_debugcheck: out of range ptr ac1fa1d106742a5ah kernel BUG at mm/slab.c:2773! invalid opcode: 0000 [#1] SMP Modules linked in: bcache CPU: 0 PID: 4428 Comm: xfs_io Tainted: G W 4.11.0-rc4-ext4-00041-g2ef0043-dirty #43 Hardware name: Virtuozzo KVM, BIOS seabios-1.7.5-11.vz7.4 04/01/2014 task: ffff880137786440 task.stack: ffffc90000ba8000 RIP: 0010:kfree_debugcheck+0x25/0x2a RSP: 0018:ffffc90000babde0 EFLAGS: 00010082 RAX: 0000000000000034 RBX: ac1fa1d106742a5a RCX: 0000000000000007 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88013f3ccb40 RBP: ffffc90000babde8 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000fcb76420 R11: 00000000725172ed R12: 0000000000000282 R13: ffffffff8150e766 R14: ffff88013a145e00 R15: 0000000000000001 FS: 00007fb09384bf40(0000) GS:ffff88013f200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd0172f9e40 CR3: 0000000137fa9000 CR4: 00000000000006f0 Call Trace: kfree+0xc8/0x1b3 bio_integrity_free+0xc3/0x16b bio_free+0x25/0x66 bio_put+0x14/0x26 blkdev_issue_flush+0x7a/0x85 blkdev_fsync+0x35/0x42 vfs_fsync_range+0x8e/0x9f vfs_fsync+0x1c/0x1e do_fsync+0x31/0x4a SyS_fsync+0x10/0x14 entry_SYSCALL_64_fastpath+0x1f/0xc2 Reviewed-by: Christoph Hellwig Reviewed-by: Hannes Reinecke Reviewed-by: Martin K. Petersen Signed-off-by: Dmitry Monakhov Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- block/bio-integrity.c | 3 +++ 1 file changed, 3 insertions(+) --- a/block/bio-integrity.c +++ b/block/bio-integrity.c @@ -165,6 +165,9 @@ bool bio_integrity_enabled(struct bio *b if (!bio_is_rw(bio)) return false; + if (!bio_sectors(bio)) + return false; + /* Already protected? */ if (bio_integrity(bio)) return false;