Received: by 2002:a05:6622:f08:0:0:0:0 with SMTP id l8csp4480767ivc; Tue, 3 Nov 2020 13:09:13 -0800 (PST) X-Google-Smtp-Source: ABdhPJz08ro4Dow+cNHPCzhb2jaj1sWdH2kXZz0t/8Q/xFaLIWgG13+ZVnJagxZi/p/bQs8PLq8L X-Received: by 2002:a17:906:647:: with SMTP id t7mr22745342ejb.428.1604437753351; Tue, 03 Nov 2020 13:09:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604437753; cv=none; d=google.com; s=arc-20160816; b=DtoYgchXkWeuKM43aHwfE3ULdDM771ZQAIwA4QU80GKDfzfExam+r96Zea6OtiAKIw lqGXaDrFkuUV5u+LLB7GyL1Lmsh4gQ6y4NEAa3duZoOliikXDWOVj+u8MiSQTgeLbOyk wLeVtdqem5umMUbMUN9XabBrwysdxzU1TXiMIg9pFKh1C86ic93MjC1dcJCnDu3/9+AJ YTQF3z5b0RqkP3VMT6XOPmJ832YtrV8XrQO/pVYz/34nfUunIBlL/WoBlTZuoTHAz/n9 NJIFhyIo9Daj25XGCK3n8GKgoBf2XXQs0p/zIM+hWKL4qNE3PxgXiv+Vm3O9To4B4gce wXng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=o/cLroZbhaSwxlaDGQ+dec6fMA+/Z87D5EdpsSwgO1w=; b=tVEucqPkYk0SSm9rW/OM7awr5XwUVihtjeR2trLnTZbjJOcyXicyVqSGrIo9E7s19Y fdb2wnoNf8DmHAeq5LM6j9zLWSpOYnKnVmBgxQIIOMxOVJO+60HBpoudD/5cQLHnRu+U UTRicn2IBNQ2f6C8HY5I0nElBcL9ki3R5R29mhRvCKq0ZPPXtTuOZZg2IogPW2a0RSo2 Zp35Th6yY4W+vsxwwFhFmaCMf9T+io6AK/2HhRhHe2Nzug3QE0+aPlbwSBd1N1g4OC3W DRoXYK4ua1pDSUM9qNqLi5TaI4IQIg+Bb9i2QdURhFYTM7iVnTf/7MyJ+ToBhT+QbTxU MZ9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="MwMxD/dS"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o12si4882838edz.429.2020.11.03.13.08.50; Tue, 03 Nov 2020 13:09:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="MwMxD/dS"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388303AbgKCVHb (ORCPT + 99 others); Tue, 3 Nov 2020 16:07:31 -0500 Received: from mail.kernel.org ([198.145.29.99]:46602 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387939AbgKCVHY (ORCPT ); Tue, 3 Nov 2020 16:07:24 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 635D0206B5; Tue, 3 Nov 2020 21:07:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604437643; bh=8xoFGuuiqs5pCe7oxvt61+EtQ2jCHbdmKs+YFeRVgIk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MwMxD/dS0Qn+fXIJwSTvf0twjsGVRIt95/y5dM2aQE6HYr0jmP58pDmxrV8X6KxwM pR3jSBGwOwrt6/0yGiRXA1LX0lHsSsTxALEVcluRLZ/sqoFo0jcWyY3std6SSSY8ta hZ1XKRHWR4+Wm3hX3ax0+BqlfHu+H5id+Xt8Hlj8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhihao Cheng , syzbot+853639d0cb16c31c7a14@syzkaller.appspotmail.com, Richard Weinberger Subject: [PATCH 4.19 163/191] ubi: check kthread_should_stop() after the setting of task state Date: Tue, 3 Nov 2020 21:37:35 +0100 Message-Id: <20201103203247.703993784@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203232.656475008@linuxfoundation.org> References: <20201103203232.656475008@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhihao Cheng commit d005f8c6588efcfbe88099b6edafc6f58c84a9c1 upstream. A detach hung is possible when a race occurs between the detach process and the ubi background thread. The following sequences outline the race: ubi thread: if (list_empty(&ubi->works)... ubi detach: set_bit(KTHREAD_SHOULD_STOP, &kthread->flags) => by kthread_stop() wake_up_process() => ubi thread is still running, so 0 is returned ubi thread: set_current_state(TASK_INTERRUPTIBLE) schedule() => ubi thread will never be scheduled again ubi detach: wait_for_completion() => hung task! To fix that, we need to check kthread_should_stop() after we set the task state, so the ubi thread will either see the stop bit and exit or the task state is reset to runnable such that it isn't scheduled out indefinitely. Signed-off-by: Zhihao Cheng Cc: Fixes: 801c135ce73d5df1ca ("UBI: Unsorted Block Images") Reported-by: syzbot+853639d0cb16c31c7a14@syzkaller.appspotmail.com Signed-off-by: Richard Weinberger Signed-off-by: Greg Kroah-Hartman --- drivers/mtd/ubi/wl.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) --- a/drivers/mtd/ubi/wl.c +++ b/drivers/mtd/ubi/wl.c @@ -1471,6 +1471,19 @@ int ubi_thread(void *u) !ubi->thread_enabled || ubi_dbg_is_bgt_disabled(ubi)) { set_current_state(TASK_INTERRUPTIBLE); spin_unlock(&ubi->wl_lock); + + /* + * Check kthread_should_stop() after we set the task + * state to guarantee that we either see the stop bit + * and exit or the task state is reset to runnable such + * that it's not scheduled out indefinitely and detects + * the stop bit at kthread_should_stop(). + */ + if (kthread_should_stop()) { + set_current_state(TASK_RUNNING); + break; + } + schedule(); continue; }