Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp431925iob; Wed, 18 May 2022 05:29:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyRvPpglWBvdu/XCgnx/aTWkdiFJucYbt+WEsV42xJQaS+LP/mAcUZ5eiB/4YQbRwLmaimY X-Received: by 2002:a17:90a:4b0c:b0:1df:112:fe49 with SMTP id g12-20020a17090a4b0c00b001df0112fe49mr25732666pjh.155.1652876974147; Wed, 18 May 2022 05:29:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652876974; cv=none; d=google.com; s=arc-20160816; b=Fkhpi1YDoMP0s29UpxOscRKGUx+162EXAL/vcemIm4xa+C1N8hnKVt+InHBLBW+Hb1 GakbM6ikZkJhDfM1RDZM2PNOfii8CUKkT1a/zXyA3CKL6aMQplfkWk+TS8N2lLZtWvOZ 5EXQt5/w8qtlgGraRIHYbl8uqyv2hroMCNkRjYYHRlg5E8ep1mL2wSBC0wrYDEW+KVb4 No/ecCx22WlkUipYB9z3ElOSmE53azNgd5N0H3UvuVc0B9RBV7oZfa/ZOVSr3/GFBtR+ sMbKsuQTk8/MDCpa3dBTCqV7Dcukdf/EWMArYMn7xjiOiy6Vv6Wtl4dcZATCr0VR0vME emJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Rkg+KYDUs4Zjz3dgqDuyTzsOcXp959H1OzAXMj0tb6I=; b=Z7kGGHjrbeMAhLEnup3A6YJSqkecX0Qg16p6rbeBGwcnBih8Gf3u5SEMTnyzvvATrh E6LWdmiwpnJKajSlcDAerFNbMYvHjTu5wHBMY7fn23mSLI6f95vjuW5cN+9fLsdj17E8 3fg8pCJvbIIURX5OKc/c4+IpoZOu8KLF9dXd7yEZ20NkBD6O7oC5HzzACsqic4WEYk8o wfRoN/GbhKca5PfiBqYHbm02X6aADf/0ly+yqH8U7beuL7SHvlFkpyN72WzMEpklTmrh 6kdij4wzaj5pz1ha2WS94mFsOhtS0/hQDqQpnSMgOYKHVERb2VX5HTPaijdly3xCsN9r T0Ug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YEtTQDy1; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id lw13-20020a17090b180d00b001dbc6208771si2830673pjb.45.2022.05.18.05.29.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 May 2022 05:29:34 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YEtTQDy1; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id CD437129EFC; Wed, 18 May 2022 05:27:41 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236549AbiERM12 (ORCPT + 99 others); Wed, 18 May 2022 08:27:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46994 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236438AbiERM1D (ORCPT ); Wed, 18 May 2022 08:27:03 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D56056FD38; Wed, 18 May 2022 05:27:02 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 7E83AB81F40; Wed, 18 May 2022 12:27:01 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5BC80C385AA; Wed, 18 May 2022 12:26:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1652876820; bh=Y3HnaIdwRzgm8ZRIpbxNDktGkEgObnYgq8LHzhYZ0eI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YEtTQDy1ls12EXMY2VUAn9vTOABUghXAcdTppGrVNbRG5+Rm4O66odduxQLaBRZSs +esDo8m2vLki+p17KcHqhMRgL7nJFbtZx124q324AU4XBZSck+K4EiPZZZbLJnCq3E JICw+/G9IXDHw+vE7JwBlgiQScbbhFS3uOcegWFmOlI0M1JELornrmpywxATyUIipI AlxaKkPR4yE1UG0V/A2aTKTDprNQvSew6kwhRq2s35x05duin4RT0EZoISSHYAXb9A DXG2R9tVcgG4c89rZGo6Bb6X+21bzBK19sSQwMb8qyXSH+waGX/w3x97OEeJGe2xeJ mrUjZgW2hzEww== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Javier Martinez Canillas , Daniel Vetter , Sasha Levin , daniel@ffwll.ch, deller@gmx.de, sam@ravnborg.org, tzimmermann@suse.de, thunder.leizhen@huawei.com, xiyuyang19@fudan.edu.cn, willy@infradead.org, alexander.deucher@amd.com, penguin-kernel@i-love.sakura.ne.jp, deng.changcheng@zte.com.cn, linux-fbdev@vger.kernel.org, dri-devel@lists.freedesktop.org Subject: [PATCH AUTOSEL 5.17 07/23] Revert "fbdev: Make fb_release() return -ENODEV if fbdev was unregistered" Date: Wed, 18 May 2022 08:26:20 -0400 Message-Id: <20220518122641.342120-7-sashal@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220518122641.342120-1-sashal@kernel.org> References: <20220518122641.342120-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Javier Martinez Canillas [ Upstream commit 135332f34ba2662bc1e32b5c612e06a8cc41a053 ] This reverts commit aafa025c76dcc7d1a8c8f0bdefcbe4eb480b2f6a. That commit attempted to fix a NULL pointer dereference, caused by the struct fb_info associated with a framebuffer device to not longer be valid when the file descriptor was closed. The issue was exposed by commit 27599aacbaef ("fbdev: Hot-unplug firmware fb devices on forced removal"), which added a new path that goes through the struct device removal instead of directly unregistering the fb. Most fbdev drivers have issues with the fb_info lifetime, because call to framebuffer_release() from their driver's .remove callback, rather than doing from fbops.fb_destroy callback. This meant that due to this switch, the fb_info was now destroyed too early, while references still existed, while before it was simply leaked. The patch we're reverting here reinstated that leak, hence "fixed" the regression. But the proper solution is to fix the drivers to not release the fb_info too soon. Suggested-by: Daniel Vetter Signed-off-by: Javier Martinez Canillas Reviewed-by: Daniel Vetter Link: https://patchwork.freedesktop.org/patch/msgid/20220504115917.758787-1-javierm@redhat.com Signed-off-by: Sasha Levin --- drivers/video/fbdev/core/fbmem.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/drivers/video/fbdev/core/fbmem.c b/drivers/video/fbdev/core/fbmem.c index 10a9369c9dea..00f0f282e7a1 100644 --- a/drivers/video/fbdev/core/fbmem.c +++ b/drivers/video/fbdev/core/fbmem.c @@ -1438,10 +1438,7 @@ fb_release(struct inode *inode, struct file *file) __acquires(&info->lock) __releases(&info->lock) { - struct fb_info * const info = file_fb_info(file); - - if (!info) - return -ENODEV; + struct fb_info * const info = file->private_data; lock_fb_info(info); if (info->fbops->fb_release) -- 2.35.1