Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp3997061imm; Mon, 14 May 2018 00:41:13 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqHX6c/obR4pWmKMGLBpbfqv07ZTAemvLROz4hHAOUvC+Kgguaf9tmN00EX5kZ4xzv0D6II X-Received: by 2002:a62:6304:: with SMTP id x4-v6mr9305317pfb.94.1526283673737; Mon, 14 May 2018 00:41:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526283673; cv=none; d=google.com; s=arc-20160816; b=vT+20KYja8p6/G/NKcLhXpeU4uMKYdUBBMrm23d6uSzo0phKG2TYue60NCxBpba4iv l8EcNGKQ1kUpCvLi4XHxLz9b9NONmS0iXEd1sGJCoHhRu/+ZrRS40jKBvJmJ64DRroV+ 62FlpSzWcM4b6O9hr7TWTZdwcRlo7EMhmgTtMhzEJbxS4fWMkOpU4ULR1Mfl5y+HuU9r amLQbr08LVuXbCVKI3aGjbHj3cGdPSNLKqJm9clXX80UNpU8IFLujp3i7IywVyy3dLvh JQ5L8J4sHhIwmGcvjN8w6g3UKwb3kFCtERtN5yfDR1pHvq+TQDvAivpESZi+GonP+OK0 d5mQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=dHlcsbucE6E10TrwewBBFKoVm0/y5Q7sbHZarf4Sg50=; b=wVPUO5TbFO4dHTf0fwgCTndRW6hDzpp/vtYTsswnzC5JGmFTm9Scz6VZnzv6bzhHrq Q4ad1RZ2FuWyY532p9hPTmRnVlKYGTGeqLs1kvZ8H2yc8NHNGMPhegj5XeIxWH8ktGLq ZbvQDZzyuVc6nUOp9NUGPa0jgAPkzJCJkuGB5SEHvL7jqMUUs3lXTgh60Tfz2P1WlHZ1 gZvqC06UQi4pLExWMU3uF6xrPfPKAPFypMwB/qbS3oOa/z+lremXx18jwmzrS6O8n207 hk6u/8kecXJ+LV9+f4nPaIX4f5NlRyjnsxKwzWt2N7rLuqVWZmah9r5hIz6l7znxF1Gi yIPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TPQ4fT/e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i62-v6si9280407pfg.218.2018.05.14.00.40.59; Mon, 14 May 2018 00:41:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TPQ4fT/e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752692AbeENHke (ORCPT + 99 others); Mon, 14 May 2018 03:40:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:58882 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752656AbeENGwZ (ORCPT ); Mon, 14 May 2018 02:52:25 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EA96C21771; Mon, 14 May 2018 06:52:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526280744; bh=b8fpLBpjRW+x1AVmyr3S/JpQkHZLgsajZOIwgFZrO+c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TPQ4fT/eWckeQlHba2mxZI32cuRtlKlVXBef9YGZ52Zs4Gm/iGACjN6N0g+ICo/Zv elxtog3R/Tc3tyyLa7t3cCU5ZNWm3gCQXvhebdX8S6qvCbeWCE9d8eBD4xrb3RPvjT hlV5uNgBEbG0vpST6s9Angc/WJyNB1MQe/mapapo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tetsuo Handa , Tejun Heo , syzbot , Dave Chinner , Jan Kara , Jens Axboe Subject: [PATCH 4.4 41/56] bdi: Fix oops in wb_workfn() Date: Mon, 14 May 2018 08:48:46 +0200 Message-Id: <20180514064758.581040850@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180514064754.853201981@linuxfoundation.org> References: <20180514064754.853201981@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jan Kara commit b8b784958eccbf8f51ebeee65282ca3fd59ea391 upstream. Syzbot has reported that it can hit a NULL pointer dereference in wb_workfn() due to wb->bdi->dev being NULL. This indicates that wb_workfn() was called for an already unregistered bdi which should not happen as wb_shutdown() called from bdi_unregister() should make sure all pending writeback works are completed before bdi is unregistered. Except that wb_workfn() itself can requeue the work with: mod_delayed_work(bdi_wq, &wb->dwork, 0); and if this happens while wb_shutdown() is waiting in: flush_delayed_work(&wb->dwork); the dwork can get executed after wb_shutdown() has finished and bdi_unregister() has cleared wb->bdi->dev. Make wb_workfn() use wakeup_wb() for requeueing the work which takes all the necessary precautions against racing with bdi unregistration. CC: Tetsuo Handa CC: Tejun Heo Fixes: 839a8e8660b6777e7fe4e80af1a048aebe2b5977 Reported-by: syzbot Reviewed-by: Dave Chinner Signed-off-by: Jan Kara Signed-off-by: Jens Axboe Signed-off-by: Greg Kroah-Hartman --- fs/fs-writeback.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/fs-writeback.c +++ b/fs/fs-writeback.c @@ -1906,7 +1906,7 @@ void wb_workfn(struct work_struct *work) } if (!list_empty(&wb->work_list)) - mod_delayed_work(bdi_wq, &wb->dwork, 0); + wb_wakeup(wb); else if (wb_has_dirty_io(wb) && dirty_writeback_interval) wb_wakeup_delayed(wb);