Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp681551pxb; Tue, 5 Apr 2022 18:33:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy+/eDctpGx6kMrJhyPLlQDetrsN0hFOJoCHn2+KDcyMSXhkwAE86cyJpkepNrW3G/xoyqg X-Received: by 2002:a17:902:f542:b0:156:b46e:2403 with SMTP id h2-20020a170902f54200b00156b46e2403mr6334434plf.62.1649208837267; Tue, 05 Apr 2022 18:33:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649208837; cv=none; d=google.com; s=arc-20160816; b=s7kV39FED47H7lkT8wcQ+jvNKLX2pSwQWWxJTAuQhe9Yeds0nmVzKr8lfMTQRRImbA FJ7V0SyerRwW/FkBwWpZXkT25IfPSDyuqid7cEof2kArH8Oo4hgVLsp7zel+nur/d5Z9 +jvfy3EFQU6ilXhoYq2XOPRcVLAnO96v0ox/J7u8tkPk7Q1S3+dBDrAMjO290us7Uuln bfLNaYhQG6Y5ngkqDe1tiGpqyFC3Bia6JvpD3P4mEXDx1+XMx1hlHSjDu810iMCaQ5jD eBRHG32sh+Da3FjzbNRtYsoEzxY6vHuge0hr9dqsTsD66590inCTNNlSSachrlbjeCkk CeqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=foCMJUYHeR+OyEfdvK7KvTvjD5tlzPc2yBwBLpSqTuA=; b=VQUfgWutWViZ3RyoqfqEz9ZodleqzXtouErtY1oOaQyBYwXGAb1KWwDT7ZNniUkMzG iUQryxKybiI9vHWJgcH46RBcGt7ImVs9KsIPV+a4QJgbkSBgrZtKdQBCMrJC4mSgVBrh 6zQXoThP/xJszxbxBgKrUZ5ojyQAQe2NX9hnMViB9AptBfz3slqRkMYtbeEWQ9xNG+GB WAEjMHcGac4M8fvRhEp/oTSG8MyrJGosR73myFlHgsEO1++vo8i3X58g4zwyw0tmgqJn 9O4wPlNPc5NFEOqD1u9l1pzAovITsJthtWGJvNKdc/TaSR5XSy3z/f+gM4ew7avysbol +zSg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=NUPrTL4G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v7-20020a634807000000b0038639161a37si15208511pga.510.2022.04.05.18.33.42; Tue, 05 Apr 2022 18:33:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=NUPrTL4G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344231AbiDENRA (ORCPT + 99 others); Tue, 5 Apr 2022 09:17:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60616 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344274AbiDEJTD (ORCPT ); Tue, 5 Apr 2022 05:19:03 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A395022B17; Tue, 5 Apr 2022 02:06:50 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 52A3EB81BBF; Tue, 5 Apr 2022 09:06:49 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9EF2AC385A0; Tue, 5 Apr 2022 09:06:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649149608; bh=HmgySWAgI7lbWNhdt5YYN+F4pSLogygYEPz8K+p7vu8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NUPrTL4GujOB/eKeVlOrNM/rpklQVH3AdMA4CCBvNO4nNaGw3SXNw0462MSqmMLad KCrtuEKHzkumfQTXc7bkfnahw2IbniGlb1e1Zr7jmscqrLtD/TTvliq76gRq/GPtqZ a69t9HZGTQ6eMS/gMpEjzAgpUvVrKhzUv2W6Y/JU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Holger=20Hoffst=C3=A4tte?= , Paolo Valente , Jens Axboe , Sasha Levin Subject: [PATCH 5.16 0776/1017] Revert "Revert "block, bfq: honor already-setup queue merges"" Date: Tue, 5 Apr 2022 09:28:09 +0200 Message-Id: <20220405070417.293216641@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070354.155796697@linuxfoundation.org> References: <20220405070354.155796697@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Paolo Valente [ Upstream commit 15729ff8143f8135b03988a100a19e66d7cb7ecd ] A crash [1] happened to be triggered in conjunction with commit 2d52c58b9c9b ("block, bfq: honor already-setup queue merges"). The latter was then reverted by commit ebc69e897e17 ("Revert "block, bfq: honor already-setup queue merges""). Yet, the reverted commit was not the one introducing the bug. In fact, it actually triggered a UAF introduced by a different commit, and now fixed by commit d29bd41428cf ("block, bfq: reset last_bfqq_created on group change"). So, there is no point in keeping commit 2d52c58b9c9b ("block, bfq: honor already-setup queue merges") out. This commit restores it. [1] https://bugzilla.kernel.org/show_bug.cgi?id=214503 Reported-by: Holger Hoffstätte Signed-off-by: Paolo Valente Link: https://lore.kernel.org/r/20211125181510.15004-1-paolo.valente@linaro.org Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- block/bfq-iosched.c | 16 +++++++++++++--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/block/bfq-iosched.c b/block/bfq-iosched.c index 7eecd3200d83..342e927f213b 100644 --- a/block/bfq-iosched.c +++ b/block/bfq-iosched.c @@ -2662,6 +2662,15 @@ bfq_setup_merge(struct bfq_queue *bfqq, struct bfq_queue *new_bfqq) * are likely to increase the throughput. */ bfqq->new_bfqq = new_bfqq; + /* + * The above assignment schedules the following redirections: + * each time some I/O for bfqq arrives, the process that + * generated that I/O is disassociated from bfqq and + * associated with new_bfqq. Here we increases new_bfqq->ref + * in advance, adding the number of processes that are + * expected to be associated with new_bfqq as they happen to + * issue I/O. + */ new_bfqq->ref += process_refs; return new_bfqq; } @@ -2724,6 +2733,10 @@ bfq_setup_cooperator(struct bfq_data *bfqd, struct bfq_queue *bfqq, { struct bfq_queue *in_service_bfqq, *new_bfqq; + /* if a merge has already been setup, then proceed with that first */ + if (bfqq->new_bfqq) + return bfqq->new_bfqq; + /* * Check delayed stable merge for rotational or non-queueing * devs. For this branch to be executed, bfqq must not be @@ -2825,9 +2838,6 @@ bfq_setup_cooperator(struct bfq_data *bfqd, struct bfq_queue *bfqq, if (bfq_too_late_for_merging(bfqq)) return NULL; - if (bfqq->new_bfqq) - return bfqq->new_bfqq; - if (!io_struct || unlikely(bfqq == &bfqd->oom_bfqq)) return NULL; -- 2.34.1