Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3210481pxb; Mon, 9 Nov 2020 05:41:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJxIMS52kLi0E8sSRRBssr1MxKfVq02c1//fuG4tunj5M9SFvzWi0JMEBRTfwPSV1wKnq+p4 X-Received: by 2002:a05:6402:1ca6:: with SMTP id cz6mr15072511edb.129.1604929267370; Mon, 09 Nov 2020 05:41:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604929267; cv=none; d=google.com; s=arc-20160816; b=xebzWdPNiod5aei5GB4gQy+3Wsb0kxGuT3lFTp+e7ptC2AutIJtyfgEJ1aae3yfmM0 YS7H+k5ze1cr4KrvZnh8UxAz+nfst+/suLZXDVAvpQVHaDx64uxuA1K1PRCMI1/0+SBs kgVFCW8qD42wEutEKaWpUfYBDyb1c0EK5S/pEJgtZDSSNND+D/KZKkYPOoBij9J0AuPI dDdwoVwzj1W9Zlm25ikHqFyfKjVYNDhomW2GfNhz4q6YaZ4ladsJVKJ7/oo7sj+jnayF CZJzYksfpHvR2gaYPqehy8PZuw5MQ62Jm5/YnYOsrNyOypk1zJWuJTWKAmcRkzpISoBJ 5Zbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yKZs7yldGlHPS0grtpSFrSRVAWpkKlAL9qb/UyAqnRo=; b=GTmZow2RualJt4jYsgqm6mJaBpXP2ZWlXHej0oeg/Zqx20v+Dj+t6kKr/FoFCoUE8e cmkn9KyOO1THmY4UnYE4fRLmMELItWCH1iJF8Zd1OuLYYUQqzaphfmbP5IkHGQ/eIcUw F0isnNFZkh+PPchW/sr7f8WPJrgvyJRzOHwPsawUphKNmwdxuF5gFi0WnBWFrpJioAqm qTmMdwh2aZ8zvPK7RDjzVmgX/LwHjd1YJyfBI7I1bXe2fGDA4yz+NmgolZpOaptKzF8L DsmFt+yCtwJWNWsyG5TIIvjFc6+ye5Re1KK0/ERhx980AsaAQJVW18WxC7IsAJ34cwXM v1bA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JpG+U7AX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cc21si7891551edb.123.2020.11.09.05.40.44; Mon, 09 Nov 2020 05:41:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JpG+U7AX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733288AbgKINjY (ORCPT + 99 others); Mon, 9 Nov 2020 08:39:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:56772 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730667AbgKINDl (ORCPT ); Mon, 9 Nov 2020 08:03:41 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0AB7422227; Mon, 9 Nov 2020 13:03:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604926988; bh=kmxyW4tp29pcFKRl5uENlNGIp7R/xM8PT2Mk2ENCEpQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JpG+U7AXyZcO6QxiNXZdGr7vO2qyIYLmh+TEF+A3G0RGZy3R77erbNKkp39GBQKsR pqNNwAIw/o3HhiuykMdqI/V59XOd+zhBI0GJp7YWeukgiCFeKTHFQc9yri2GM26zz4 nnUSC47hFeolsxTT2KtOiM7eI+RpPsJRg68VgAjE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhihao Cheng , syzbot+853639d0cb16c31c7a14@syzkaller.appspotmail.com, Richard Weinberger Subject: [PATCH 4.9 072/117] ubi: check kthread_should_stop() after the setting of task state Date: Mon, 9 Nov 2020 13:54:58 +0100 Message-Id: <20201109125029.100072726@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201109125025.630721781@linuxfoundation.org> References: <20201109125025.630721781@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zhihao Cheng commit d005f8c6588efcfbe88099b6edafc6f58c84a9c1 upstream. A detach hung is possible when a race occurs between the detach process and the ubi background thread. The following sequences outline the race: ubi thread: if (list_empty(&ubi->works)... ubi detach: set_bit(KTHREAD_SHOULD_STOP, &kthread->flags) => by kthread_stop() wake_up_process() => ubi thread is still running, so 0 is returned ubi thread: set_current_state(TASK_INTERRUPTIBLE) schedule() => ubi thread will never be scheduled again ubi detach: wait_for_completion() => hung task! To fix that, we need to check kthread_should_stop() after we set the task state, so the ubi thread will either see the stop bit and exit or the task state is reset to runnable such that it isn't scheduled out indefinitely. Signed-off-by: Zhihao Cheng Cc: Fixes: 801c135ce73d5df1ca ("UBI: Unsorted Block Images") Reported-by: syzbot+853639d0cb16c31c7a14@syzkaller.appspotmail.com Signed-off-by: Richard Weinberger Signed-off-by: Greg Kroah-Hartman --- drivers/mtd/ubi/wl.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) --- a/drivers/mtd/ubi/wl.c +++ b/drivers/mtd/ubi/wl.c @@ -1478,6 +1478,19 @@ int ubi_thread(void *u) !ubi->thread_enabled || ubi_dbg_is_bgt_disabled(ubi)) { set_current_state(TASK_INTERRUPTIBLE); spin_unlock(&ubi->wl_lock); + + /* + * Check kthread_should_stop() after we set the task + * state to guarantee that we either see the stop bit + * and exit or the task state is reset to runnable such + * that it's not scheduled out indefinitely and detects + * the stop bit at kthread_should_stop(). + */ + if (kthread_should_stop()) { + set_current_state(TASK_RUNNING); + break; + } + schedule(); continue; }