Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp262736pxj; Tue, 18 May 2021 02:49:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwkD34RXtu63KL4RptNgjmFwayz9b9VGPIOLSUaiDm0AjaYS7TQDsRjFK6T/Oo0d0sNEEPS X-Received: by 2002:a17:906:6c96:: with SMTP id s22mr5228761ejr.468.1621331362709; Tue, 18 May 2021 02:49:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621331362; cv=none; d=google.com; s=arc-20160816; b=wWyX0sX1Hc7FxXMj6D1XYkpgEHYy8nZ8HoXYaTbgIk1obwqWUNgiqo4Vq9CYhpCpkf YU+oBTPTMoYVW18JS9LbZqUg9/n9QVeZERQQesO61ZXXkLeZHYFF4dVQlZhe2x/hKYbu aXVTHA3E4CNnNsJziAfxBkWk7PWr14d+ciFnSnB4WKhxIg/i05gOlj7HYvybuJcUSGh8 3jxk9kZi5phvXuEmJ/T6RuMDVGtKzYLgFrGLSlHkNCYS9Nov28cio5kB2dGRUizZpfQg x+E2iGfmVLTV+udxoltZt5XR6SMe4NrgDI01464kFEfXkRi5AOWgNAAF6kQCPXGbeQ3m viYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=I/D62hv7rQSYSwrzJB2ugRqTW0pDDDnsqTWgP5eNsZw=; b=ZeUp7e4sS+Vzte/gxeR/Bd2fbPF3UCr7zTMgpIPttU+TFlAfHR1YbOowcW71OlYPg5 TqupCKt7uT6LLjSfDih+/I7yYlU4AziLtJyw6FfxGQdHHMvJ2TUgXVP+vWjnAPw0Wunh i054McGQiAbcW3Io7klRilrEr/YDnMy1SMho4pQWESqIzKFpc9ka9r/AoIXjqKrF2gLS wlL7+06+LWfwFQuA2FyDRsgEZZa4sM2ka7PA4uRxOASG+BNbwtINnHIvPzD9jemm/tNS ostxqJHhy4vBN+WHrFMw0aR2PppSrBScNWPTt2awkJjIkUSyjBYAxOHYMQD+eyAe7KKU Piew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=JCgAnF7k; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n26si15799154edd.370.2021.05.18.02.48.59; Tue, 18 May 2021 02:49:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=JCgAnF7k; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243431AbhEQPKG (ORCPT + 99 others); Mon, 17 May 2021 11:10:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:59928 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241332AbhEQPAe (ORCPT ); Mon, 17 May 2021 11:00:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9284D619D2; Mon, 17 May 2021 14:26:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621261612; bh=vCrC3Wl1kdxy967ft+K0SkQLfc37tQKnZBhmt/vm3hk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JCgAnF7kuWwLCKxCwJHMrX2fmyqoOGhcQsOB8rjkBqtTAtMyYDAS4QjWUmH28ztPp XVgezemRokR94pAlok4+r/W85EZB/LwOaC2szDqiqUHtgzVatE1473a5dqzmBwS0to c5bdbX//oVbRAwgm5NJiB7eOr84wrN2tov7Fg1t8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chao Yu , Jaegeuk Kim , Sasha Levin Subject: [PATCH 5.11 135/329] f2fs: fix to avoid accessing invalid fio in f2fs_allocate_data_block() Date: Mon, 17 May 2021 16:00:46 +0200 Message-Id: <20210517140306.679437320@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210517140302.043055203@linuxfoundation.org> References: <20210517140302.043055203@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chao Yu [ Upstream commit 25ae837e61dee712b4b1df36602ebfe724b2a0b6 ] Callers may pass fio parameter with NULL value to f2fs_allocate_data_block(), so we should make sure accessing fio's field after fio's validation check. Fixes: f608c38c59c6 ("f2fs: clean up parameter of f2fs_allocate_data_block()") Signed-off-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Sasha Levin --- fs/f2fs/segment.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/fs/f2fs/segment.c b/fs/f2fs/segment.c index af765d60351f..b053e3c32e1f 100644 --- a/fs/f2fs/segment.c +++ b/fs/f2fs/segment.c @@ -3414,12 +3414,12 @@ void f2fs_allocate_data_block(struct f2fs_sb_info *sbi, struct page *page, f2fs_inode_chksum_set(sbi, page); } - if (F2FS_IO_ALIGNED(sbi)) - fio->retry = false; - if (fio) { struct f2fs_bio_info *io; + if (F2FS_IO_ALIGNED(sbi)) + fio->retry = false; + INIT_LIST_HEAD(&fio->list); fio->in_list = true; io = sbi->write_io[fio->type] + fio->temp; -- 2.30.2