Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp528542yba; Mon, 1 Apr 2019 11:07:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqwJJNcT96ZxSbJVqIwzav6t/MHSLWhsJUsUbIX2PZ4pJ+1x/dAaCAkKeHcSsbMcMMgwdXto X-Received: by 2002:a65:524a:: with SMTP id q10mr49988615pgp.224.1554142058203; Mon, 01 Apr 2019 11:07:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554142058; cv=none; d=google.com; s=arc-20160816; b=I0ey3PbLRbwBHdROivLulMRJXYnnvI4DBFYdfw5wq0rVh+qyEwbD6TmioxP2InIlgd cHYi616gYOvVPbWmjtLVXMH7TJ/rXosK973EZT5r6f/hBb9daqJhd05h6yFDP/UtA1Gj +cBYLU/rW2Pq1Nmbik1RWoG6wldNm4vd/gZyTcfQg8dx4A8HdL3vYYS+vyTeihabpY9U Lsfol9g/NqO/5BPVjbHic5VVmOLJqf3WSymgFzlkPeM+6jTyYAOWYXe7ZLn6smDpuOoo YTZmDMhdlwv/iK1iAUwCR4jSyRMRfI1t0+Pe+mIOsmFXJf3bVl2tj5oGg/mrubg59Me2 Mzhw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=okeDyefGdDZRrOhcepkSuEIeTGnL1idt4U9rzpB55O4=; b=YqMa640ig1IR38LLpTZdS6YkfRMFCCG1CulajrL4Kq4q0BeIAn4v42RSBI0ul9qppp DFV/ooS88hakqQxZeD5+y3U3101zaa8iwxJl2qZ2BAfrKHt/Va1rGYGWwJDk08pshc4V UG9xXE9VknIJSDY2kvV1j97BkxcoyNEtD2uIEZVb5QEMHFMyQHpnbqNHhXPrhk6rMMkV 5k8cbbbg5NdRWjalanld9V6IoPbRQRCufhXOkUxeKCxu42ERnQ4M79lzouYz7nVFMVam SK6WFhzf3/Qig60ei7yW+mV16DJAK3pMwxF+Ve2xJjW5fkL/TtzzKzXm7hsMw3+CdPmy gmRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tW7ySA+I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 76si9716141pge.555.2019.04.01.11.07.22; Mon, 01 Apr 2019 11:07:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=tW7ySA+I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729860AbfDARMJ (ORCPT + 99 others); Mon, 1 Apr 2019 13:12:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:33214 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729110AbfDARME (ORCPT ); Mon, 1 Apr 2019 13:12:04 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 601BE21925; Mon, 1 Apr 2019 17:12:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554138723; bh=0xeruuBJBUdy3uFD0FBfyGBgD4qwEx+T8UsGvLSsGaw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tW7ySA+Im+fkWj6CpaX3zuSOybPaPtMLWTuvCQAhT1uV9t1PSZhd10lD/bby67mN4 S/cz48XBOJyJiy0OWdqbEd1gTBLiYWbrKVFCli0oVBxnJBVRqSOmz24w5bCMnxuJA2 Pn66T74FXCk2iRr7tGZhP45sVSIDgQ6mx+o09+3A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oscar Salvador , Michal Hocko , Hugh Dickins , Andrew Morton , Linus Torvalds Subject: [PATCH 5.0 129/146] mm/debug.c: fix __dump_page when mapping->host is not set Date: Mon, 1 Apr 2019 19:02:21 +0200 Message-Id: <20190401170059.158292132@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170048.449559024@linuxfoundation.org> References: <20190401170048.449559024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Oscar Salvador commit 5ae2efb1dea9f537453e841714e3ee2757595aec upstream. While debugging something, I added a dump_page() into do_swap_page(), and I got the splat from below. The issue happens when dereferencing mapping->host in __dump_page(): ... else if (mapping) { pr_warn("%ps ", mapping->a_ops); if (mapping->host->i_dentry.first) { struct dentry *dentry; dentry = container_of(mapping->host->i_dentry.first, struct dentry, d_u.d_alias); pr_warn("name:\"%pd\" ", dentry); } } ... Swap address space does not contain an inode information, and so mapping->host equals NULL. Although the dump_page() call was added artificially into do_swap_page(), I am not sure if we can hit this from any other path, so it looks worth fixing it. We can easily do that by checking mapping->host first. Link: http://lkml.kernel.org/r/20190318072931.29094-1-osalvador@suse.de Fixes: 1c6fb1d89e73c ("mm: print more information about mapping in __dump_page") Signed-off-by: Oscar Salvador Acked-by: Michal Hocko Acked-by: Hugh Dickins Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- mm/debug.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/mm/debug.c +++ b/mm/debug.c @@ -79,7 +79,7 @@ void __dump_page(struct page *page, cons pr_warn("ksm "); else if (mapping) { pr_warn("%ps ", mapping->a_ops); - if (mapping->host->i_dentry.first) { + if (mapping->host && mapping->host->i_dentry.first) { struct dentry *dentry; dentry = container_of(mapping->host->i_dentry.first, struct dentry, d_u.d_alias); pr_warn("name:\"%pd\" ", dentry);