]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
4.14-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 17 May 2018 09:38:37 +0000 (11:38 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 17 May 2018 09:38:37 +0000 (11:38 +0200)
added patches:
btrfs-take-trans-lock-before-access-running-trans-in-check_delayed_ref.patch
xfrm-use-__skb_queue_tail-in-xfrm_trans_queue.patch

queue-4.14/btrfs-take-trans-lock-before-access-running-trans-in-check_delayed_ref.patch [new file with mode: 0644]
queue-4.14/series
queue-4.14/xfrm-use-__skb_queue_tail-in-xfrm_trans_queue.patch [new file with mode: 0644]

diff --git a/queue-4.14/btrfs-take-trans-lock-before-access-running-trans-in-check_delayed_ref.patch b/queue-4.14/btrfs-take-trans-lock-before-access-running-trans-in-check_delayed_ref.patch
new file mode 100644 (file)
index 0000000..4315247
--- /dev/null
@@ -0,0 +1,71 @@
+From 998ac6d21cfd6efd58f5edf420bae8839dda9f2a Mon Sep 17 00:00:00 2001
+From: ethanwu <ethanwu@synology.com>
+Date: Sun, 29 Apr 2018 15:59:42 +0800
+Subject: btrfs: Take trans lock before access running trans in check_delayed_ref
+
+From: ethanwu <ethanwu@synology.com>
+
+commit 998ac6d21cfd6efd58f5edf420bae8839dda9f2a upstream.
+
+In preivous patch:
+Btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist
+We avoid starting btrfs transaction and get this information from
+fs_info->running_transaction directly.
+
+When accessing running_transaction in check_delayed_ref, there's a
+chance that current transaction will be freed by commit transaction
+after the NULL pointer check of running_transaction is passed.
+
+After looking all the other places using fs_info->running_transaction,
+they are either protected by trans_lock or holding the transactions.
+
+Fix this by using trans_lock and increasing the use_count.
+
+Fixes: e4c3b2dcd144 ("Btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist")
+CC: stable@vger.kernel.org # 4.14+
+Signed-off-by: ethanwu <ethanwu@synology.com>
+Signed-off-by: David Sterba <dsterba@suse.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ fs/btrfs/extent-tree.c |    7 +++++++
+ 1 file changed, 7 insertions(+)
+
+--- a/fs/btrfs/extent-tree.c
++++ b/fs/btrfs/extent-tree.c
+@@ -3171,7 +3171,11 @@ static noinline int check_delayed_ref(st
+       struct btrfs_transaction *cur_trans;
+       int ret = 0;
++      spin_lock(&root->fs_info->trans_lock);
+       cur_trans = root->fs_info->running_transaction;
++      if (cur_trans)
++              refcount_inc(&cur_trans->use_count);
++      spin_unlock(&root->fs_info->trans_lock);
+       if (!cur_trans)
+               return 0;
+@@ -3180,6 +3184,7 @@ static noinline int check_delayed_ref(st
+       head = btrfs_find_delayed_ref_head(delayed_refs, bytenr);
+       if (!head) {
+               spin_unlock(&delayed_refs->lock);
++              btrfs_put_transaction(cur_trans);
+               return 0;
+       }
+@@ -3196,6 +3201,7 @@ static noinline int check_delayed_ref(st
+               mutex_lock(&head->mutex);
+               mutex_unlock(&head->mutex);
+               btrfs_put_delayed_ref(&head->node);
++              btrfs_put_transaction(cur_trans);
+               return -EAGAIN;
+       }
+       spin_unlock(&delayed_refs->lock);
+@@ -3223,6 +3229,7 @@ static noinline int check_delayed_ref(st
+       }
+       spin_unlock(&head->lock);
+       mutex_unlock(&head->mutex);
++      btrfs_put_transaction(cur_trans);
+       return ret;
+ }
index 4d958a7246c40e69728627fed21f0baf39984279..dfd51be8bca834a5732bc36c856b7170686471ee 100644 (file)
@@ -38,3 +38,5 @@ net-mlx5e-allow-offloading-ipv4-header-re-write-for-icmp.patch
 nsh-fix-infinite-loop.patch
 udp-fix-so_bindtodevice.patch
 scsi-aacraid-correct-hba_send-to-include-iu_type.patch
+xfrm-use-__skb_queue_tail-in-xfrm_trans_queue.patch
+btrfs-take-trans-lock-before-access-running-trans-in-check_delayed_ref.patch
diff --git a/queue-4.14/xfrm-use-__skb_queue_tail-in-xfrm_trans_queue.patch b/queue-4.14/xfrm-use-__skb_queue_tail-in-xfrm_trans_queue.patch
new file mode 100644 (file)
index 0000000..a5085cc
--- /dev/null
@@ -0,0 +1,36 @@
+From d16b46e4fd8bc6063624605f25b8c0835bb1fbe3 Mon Sep 17 00:00:00 2001
+From: Herbert Xu <herbert@gondor.apana.org.au>
+Date: Thu, 4 Jan 2018 22:25:07 +1100
+Subject: xfrm: Use __skb_queue_tail in xfrm_trans_queue
+
+From: Herbert Xu <herbert@gondor.apana.org.au>
+
+commit d16b46e4fd8bc6063624605f25b8c0835bb1fbe3 upstream.
+
+We do not need locking in xfrm_trans_queue because it is designed
+to use per-CPU buffers.  However, the original code incorrectly
+used skb_queue_tail which takes the lock.  This patch switches
+it to __skb_queue_tail instead.
+
+Reported-and-tested-by: Artem Savkov <asavkov@redhat.com>
+Fixes: acf568ee859f ("xfrm: Reinject transport-mode packets...")
+Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
+Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
+Signed-off-by: Alistair Strachan <astrachan@google.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+
+---
+ net/xfrm/xfrm_input.c |    2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/net/xfrm/xfrm_input.c
++++ b/net/xfrm/xfrm_input.c
+@@ -518,7 +518,7 @@ int xfrm_trans_queue(struct sk_buff *skb
+               return -ENOBUFS;
+       XFRM_TRANS_SKB_CB(skb)->finish = finish;
+-      skb_queue_tail(&trans->queue, skb);
++      __skb_queue_tail(&trans->queue, skb);
+       tasklet_schedule(&trans->tasklet);
+       return 0;
+ }