Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp5895021imb; Fri, 8 Mar 2019 04:59:17 -0800 (PST) X-Google-Smtp-Source: APXvYqx0U3t2CPuJFq9T2KJWnblN24XCgmw88EbLPuwt9VRgISLAABRW1CK4vfaElYjVryDw1+RY X-Received: by 2002:a17:902:59c3:: with SMTP id d3mr18792202plj.214.1552049957519; Fri, 08 Mar 2019 04:59:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1552049957; cv=none; d=google.com; s=arc-20160816; b=YiN2K4HmV28eEd39kwCCeEwaChsi0CkEwpw05qNAt2V7+F1napuvrsM1uaeNa+VWt/ 5QlkWF7YTAHBlP2xWKf0msQfu+eQHKnkbEwr7XTPXVzx+V7N4B+iaoc1jb5oBkYbKLqv N5eOmsEGghhwoBHBeb2/b2ZVa36j5UMp3QGeWEFTOJTxF+4ZNmt1JqqC2xiaNuSYFi4C Ym4rB30sFDDvRecqQbZdgVpnGM8s4a7s4JB6G0SEoCOpOWsW4cRSuSPM8uTTSfZBjrF5 FLP80fgTD8gU9b/SP1oeZWdDCwB5WnoSexQ3PQB3ORNh0CpCFhV7lC5ADdn17zLMsqSN WrvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KRlFnie7sc1QfBd5XUKZJWG/pd8x382x5WzXJg22/lI=; b=ZXDmC3nUCzP6bWrQJMFp8yUOY9/bZt1ZaCN84ZYgYbi4sEDN913jUdKEXp8F9SjabI RgUjrf+0o8JIaq1ntuQ+VBYSN6E+gNNFTv6YNL2X9u3o2KHwT8OLzd4gDaEVkTSSKkvZ 3d93h6VXGw93MslyhgnAp8Z9Vxcq4ZFTeAD3x5tAxCMlRKJQrztv3ELKIf4l7YE5AuOq L+1jLjCqw/hjkW1jI8hlg1fOW+5wImTFr0XmlQaYPrlWoVQLzyoI6KT6PDYwB0Jh8MUP WzuGMdygb0nPWyJPfCV05zk8RLMxbHSRH0sFQzIMY933JSLFJk/xSK85Cjxu0qwpN3vG 8MzQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=euTFf2n9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t24si6226531pgv.141.2019.03.08.04.59.02; Fri, 08 Mar 2019 04:59:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=euTFf2n9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727913AbfCHM5x (ORCPT + 99 others); Fri, 8 Mar 2019 07:57:53 -0500 Received: from mail.kernel.org ([198.145.29.99]:34118 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727500AbfCHM5p (ORCPT ); Fri, 8 Mar 2019 07:57:45 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EBBA620449; Fri, 8 Mar 2019 12:57:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552049864; bh=HhpyA9SlxQyZzhW83zy6W0aqUiyD4EPXzT7rHqCafBo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=euTFf2n9MTLVwZIJFJ+fMuVFvbAAss8MUcX4sqpI2rt/E/rByGNbiNsNTDA1hfvzY 0u9CQB9pzK2n7noU+eWnjYVP9FrwpM+bnPPkfPd3LYnd+j/PJMgWAvJrwVueRKZwm9 E/Muj//QXq/XNnWQFvpIKm6/C9UWG98YbpSVzWuU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot , syzbot , syzbot , Tetsuo Handa , "Joel Fernandes (Google)" Subject: [PATCH 4.19 11/68] staging: android: ashmem: Dont call fallocate() with ashmem_mutex held. Date: Fri, 8 Mar 2019 13:49:41 +0100 Message-Id: <20190308124911.357363186@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190308124910.696595153@linuxfoundation.org> References: <20190308124910.696595153@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Tetsuo Handa commit fb4415a12632f0b9078a0aa80c16745d48fcfc74 upstream. syzbot is hitting lockdep warnings [1][2][3]. This patch tries to fix the warning by eliminating ashmem_shrink_scan() => {shmem|vfs}_fallocate() sequence. [1] https://syzkaller.appspot.com/bug?id=87c399f6fa6955006080b24142e2ce7680295ad4 [2] https://syzkaller.appspot.com/bug?id=7ebea492de7521048355fc84210220e1038a7908 [3] https://syzkaller.appspot.com/bug?id=e02419c12131c24e2a957ea050c2ab6dcbbc3270 Reported-by: syzbot Reported-by: syzbot Reported-by: syzbot Signed-off-by: Tetsuo Handa Cc: stable@vger.kernel.org Acked-by: Joel Fernandes (Google) Signed-off-by: Greg Kroah-Hartman --- drivers/staging/android/ashmem.c | 25 ++++++++++++++++++++----- 1 file changed, 20 insertions(+), 5 deletions(-) --- a/drivers/staging/android/ashmem.c +++ b/drivers/staging/android/ashmem.c @@ -75,6 +75,9 @@ struct ashmem_range { /* LRU list of unpinned pages, protected by ashmem_mutex */ static LIST_HEAD(ashmem_lru_list); +static atomic_t ashmem_shrink_inflight = ATOMIC_INIT(0); +static DECLARE_WAIT_QUEUE_HEAD(ashmem_shrink_wait); + /* * long lru_count - The count of pages on our LRU list. * @@ -438,7 +441,6 @@ out: static unsigned long ashmem_shrink_scan(struct shrinker *shrink, struct shrink_control *sc) { - struct ashmem_range *range, *next; unsigned long freed = 0; /* We might recurse into filesystem code, so bail out if necessary */ @@ -448,21 +450,33 @@ ashmem_shrink_scan(struct shrinker *shri if (!mutex_trylock(&ashmem_mutex)) return -1; - list_for_each_entry_safe(range, next, &ashmem_lru_list, lru) { + while (!list_empty(&ashmem_lru_list)) { + struct ashmem_range *range = + list_first_entry(&ashmem_lru_list, typeof(*range), lru); loff_t start = range->pgstart * PAGE_SIZE; loff_t end = (range->pgend + 1) * PAGE_SIZE; + struct file *f = range->asma->file; - range->asma->file->f_op->fallocate(range->asma->file, - FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, - start, end - start); + get_file(f); + atomic_inc(&ashmem_shrink_inflight); range->purged = ASHMEM_WAS_PURGED; lru_del(range); freed += range_size(range); + mutex_unlock(&ashmem_mutex); + f->f_op->fallocate(f, + FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, + start, end - start); + fput(f); + if (atomic_dec_and_test(&ashmem_shrink_inflight)) + wake_up_all(&ashmem_shrink_wait); + if (!mutex_trylock(&ashmem_mutex)) + goto out; if (--sc->nr_to_scan <= 0) break; } mutex_unlock(&ashmem_mutex); +out: return freed; } @@ -713,6 +727,7 @@ static int ashmem_pin_unpin(struct ashme return -EFAULT; mutex_lock(&ashmem_mutex); + wait_event(ashmem_shrink_wait, !atomic_read(&ashmem_shrink_inflight)); if (!asma->file) goto out_unlock;