Received: by 2002:a17:90a:bc8d:0:0:0:0 with SMTP id x13csp1570355pjr; Mon, 18 May 2020 16:41:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJygErev+a8DH8ATT1vjEMvQSVomY2VZkBP/CEAHB7xn751rEDPvME+zYE3AeDlD/liYmYpX X-Received: by 2002:a05:6402:21cc:: with SMTP id bi12mr15690635edb.294.1589845281990; Mon, 18 May 2020 16:41:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589845281; cv=none; d=google.com; s=arc-20160816; b=qw7DORsPOUdhd4BVFHOO93C8Ku0kPNnlFtghE84CW1SgQsuQ7sKf9r4UKH9/I0TQ4f UzqleJb0RbUvsS/FoghDRP+RTJd/SHbJr0cYMbHihAl7Mzh1Qlz0+b/fL5Rz4c3qWZhE 1+qUESueq5ErVu3cuBLAhMfDl6AmOvE36f/RpFz2xc/rCEOVhl7rWE4TtsufMO8z7t/L 7YkrPyJOeyebNOuyDo0e0+fcIGwe18SmkgZHDaEqmj62xk0aTKiUu5+2LZ52mKGsYDpz DfbLTT/cES7EJfYZHdLe37dDkYmH2EEsELd5DEiXKXFEMWzLH6zX3aYfRPBUzpSI1Odn OKGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jh/+H52pjPDgFmkYRmVzdq4omZ24uYIEnainYJFxz9s=; b=dgffPNUknRp25xjwhkFkoXVVkRumRaOUPiu8WEYF8yrCeBs21kWwloR56t5EMO48Ug zC3Mkb0WFWKTgO2Bg0V6GfVMUUZz7++PNUDF1NQegPpGALye9pVyIDuHnqozklMazO5l Zo69HKs1MG9qdAVMwdDaO8tC/pn5WEEIwLzQzcEy1A0tj0WyNeR3iBzU/xQ7WyMMkb3+ B8oL+KG035DeTZ6P74kQgX5YQJUUXlPFnCuBDsAP7jpRrms1XuhPYO/hzO4m+S77LUBO unHZ1f6O+HqCn0N7ogUK15GEUM5g3EcGuNCeVVqeaOCipsXWliMZ+9CtxSk0lFaWBHzh uQ3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gCpy/SWl"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v13si7253608ejo.418.2020.05.18.16.40.59; Mon, 18 May 2020 16:41:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="gCpy/SWl"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729769AbgERRog (ORCPT + 99 others); Mon, 18 May 2020 13:44:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:42780 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729751AbgERRo2 (ORCPT ); Mon, 18 May 2020 13:44:28 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7EE2B20715; Mon, 18 May 2020 17:44:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589823868; bh=Lv0WdQHZZpH0+zsvuw1nREwCuf/qpR482iS0MwMpNcg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gCpy/SWl16bPPEUKkub38EPH4hru1CySi2yKEk5XmpZruo/HkDNncqYl4yQhiSfQB NAT0arNKzikww/0c5IZ/pR2EAQROVwsvdxCsmOHv5ik2QCgYAVtBaU291y2pzjsjIr WRoWFMvkQlPajH1Z+6GX0IuxWSuYfFs09yRVk3rI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jens Axboe , Ben Hutchings , Sasha Levin Subject: [PATCH 4.9 31/90] blktrace: fix trace mutex deadlock Date: Mon, 18 May 2020 19:36:09 +0200 Message-Id: <20200518173457.510063696@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200518173450.930655662@linuxfoundation.org> References: <20200518173450.930655662@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jens Axboe commit 2967acbb257a6a9bf912f4778b727e00972eac9b upstream. A previous commit changed the locking around registration/cleanup, but direct callers of blk_trace_remove() were missed. This means that if we hit the error path in setup, we will deadlock on attempting to re-acquire the queue trace mutex. Fixes: 1f2cac107c59 ("blktrace: fix unlocked access to init/start-stop/teardown") Signed-off-by: Jens Axboe Signed-off-by: Ben Hutchings Signed-off-by: Sasha Levin --- kernel/trace/blktrace.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel/trace/blktrace.c b/kernel/trace/blktrace.c index 55337d797deb1..a88e677c74f31 100644 --- a/kernel/trace/blktrace.c +++ b/kernel/trace/blktrace.c @@ -572,7 +572,7 @@ static int __blk_trace_setup(struct request_queue *q, char *name, dev_t dev, return ret; if (copy_to_user(arg, &buts, sizeof(buts))) { - blk_trace_remove(q); + __blk_trace_remove(q); return -EFAULT; } return 0; @@ -618,7 +618,7 @@ static int compat_blk_trace_setup(struct request_queue *q, char *name, return ret; if (copy_to_user(arg, &buts.name, ARRAY_SIZE(buts.name))) { - blk_trace_remove(q); + __blk_trace_remove(q); return -EFAULT; } -- 2.20.1