Received: by 2002:ac2:464d:0:0:0:0:0 with SMTP id s13csp3689195lfo; Mon, 23 May 2022 11:30:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzMQpcelqjT4t2Dk3vauva4roIKzQD4fKANXWXvyC25LlnRhndgwwB5aMaZ2xjcq4D0ZLQ/ X-Received: by 2002:a17:90b:1d12:b0:1df:b3dc:513b with SMTP id on18-20020a17090b1d1200b001dfb3dc513bmr321485pjb.238.1653330655990; Mon, 23 May 2022 11:30:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653330655; cv=none; d=google.com; s=arc-20160816; b=WUP7hGgCK3hGdTooVZExk/hzEtystA09Pt9hUJt2H7QKizzz/FZFvtgpMTi1Xfu0vW oLPer7h0ks5EJFax7stzDNmohnWGqKbLZwCr1C3qXtHowdcTpAmTcnIYddOAjFFgfXcg vhkhzis8pjMPto6lGbtM0AhSOPL9qd/Btqw1VesrWEIi+R/Ww92GbXkQtUS5N8RtCyjN +3G7b2YYNHLTS0i3wm0wrLcmPEKBiviM1HpDMuSbrphWJQYo8Z7QD1ti6vAejGWgNJKX 9xBQ73jado0/VSQ0N1zPTzRECuSgE7zlb3HZccCmZNvGoBZtlv1BtRt5Y3BoLeT+L16O 9jlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Rkg+KYDUs4Zjz3dgqDuyTzsOcXp959H1OzAXMj0tb6I=; b=X6NzdvxKd30wFg09MQfkZeHDezdHEVElqIOj2ROXoexdEj5dyl3Pwob/Fq2OKxTbdt DZHrOuXXVDS7wUb8nl4YiBV1sBqKMFnZeRE86but3qHSNq/yIxPGEDLfAjHZbN5pJx5d ypXPPmbQgsods4tQZZDyH6g8SaKEemkwodMpwF92MgABHH8qpWJkVjTU6qGNF1Khtmvc lTK2HM/RCjvXeeqv9ZrqURsPEy1O/tnljHy4R0u2aDSrTLE3Ax5jWWznr8umpkKdtqMt bX+EQkzvtEFrnrMyr/8Ngrm9TCf4UbqSnWIAu6ThNGiCZAMENJe+wkzYSuMdoRGDmY+/ gPtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=NOaXnKwA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id d185-20020a6368c2000000b003fa9370e5basi1540022pgc.758.2022.05.23.11.30.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 May 2022 11:30:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=NOaXnKwA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 03D7E13F93C; Mon, 23 May 2022 11:30:39 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243597AbiEWSFv (ORCPT + 99 others); Mon, 23 May 2022 14:05:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37618 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243101AbiEWRhy (ORCPT ); Mon, 23 May 2022 13:37:54 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B837E6A016; Mon, 23 May 2022 10:32:05 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 28D7D6127D; Mon, 23 May 2022 17:32:05 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3233FC385A9; Mon, 23 May 2022 17:32:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1653327124; bh=Y3HnaIdwRzgm8ZRIpbxNDktGkEgObnYgq8LHzhYZ0eI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NOaXnKwAItDo/wJ+BzJbriqsoo8ruZUAKG02YL90VMqMAqJbenUNkDwx+/GDvZY9V UyJyZ1jmt+wbsTmoDxQpvKZhF7lalv+TwdIAdXd0Yfm9A0cxRRaZCwSdWtGAGNZbTd rzQnNo4FBYk28uTbDoNktM1DPT6HF7gb/Gkh+tww= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Daniel Vetter , Javier Martinez Canillas , Sasha Levin Subject: [PATCH 5.17 139/158] Revert "fbdev: Make fb_release() return -ENODEV if fbdev was unregistered" Date: Mon, 23 May 2022 19:04:56 +0200 Message-Id: <20220523165853.351893106@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220523165830.581652127@linuxfoundation.org> References: <20220523165830.581652127@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Javier Martinez Canillas [ Upstream commit 135332f34ba2662bc1e32b5c612e06a8cc41a053 ] This reverts commit aafa025c76dcc7d1a8c8f0bdefcbe4eb480b2f6a. That commit attempted to fix a NULL pointer dereference, caused by the struct fb_info associated with a framebuffer device to not longer be valid when the file descriptor was closed. The issue was exposed by commit 27599aacbaef ("fbdev: Hot-unplug firmware fb devices on forced removal"), which added a new path that goes through the struct device removal instead of directly unregistering the fb. Most fbdev drivers have issues with the fb_info lifetime, because call to framebuffer_release() from their driver's .remove callback, rather than doing from fbops.fb_destroy callback. This meant that due to this switch, the fb_info was now destroyed too early, while references still existed, while before it was simply leaked. The patch we're reverting here reinstated that leak, hence "fixed" the regression. But the proper solution is to fix the drivers to not release the fb_info too soon. Suggested-by: Daniel Vetter Signed-off-by: Javier Martinez Canillas Reviewed-by: Daniel Vetter Link: https://patchwork.freedesktop.org/patch/msgid/20220504115917.758787-1-javierm@redhat.com Signed-off-by: Sasha Levin --- drivers/video/fbdev/core/fbmem.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/drivers/video/fbdev/core/fbmem.c b/drivers/video/fbdev/core/fbmem.c index 10a9369c9dea..00f0f282e7a1 100644 --- a/drivers/video/fbdev/core/fbmem.c +++ b/drivers/video/fbdev/core/fbmem.c @@ -1438,10 +1438,7 @@ fb_release(struct inode *inode, struct file *file) __acquires(&info->lock) __releases(&info->lock) { - struct fb_info * const info = file_fb_info(file); - - if (!info) - return -ENODEV; + struct fb_info * const info = file->private_data; lock_fb_info(info); if (info->fbops->fb_release) -- 2.35.1