Zhihao Cheng
3afaaf6f58
ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed
...
[ Upstream commit 4d57a7333e26040f2b583983e1970d9d460e56b0 ]
Following process will trigger an infinite loop in ubi_wl_put_peb():
ubifs_bgt ubi_bgt
ubifs_leb_unmap
ubi_leb_unmap
ubi_eba_unmap_leb
ubi_wl_put_peb wear_leveling_worker
e1 = rb_entry(rb_first(&ubi->used)
e2 = get_peb_for_wl(ubi)
ubi_io_read_vid_hdr // return err (flash fault)
out_error:
ubi->move_from = ubi->move_to = NULL
wl_entry_destroy(ubi, e1)
ubi->lookuptbl[e->pnum] = NULL
retry:
e = ubi->lookuptbl[pnum]; // return NULL
if (e == ubi->move_from) { // NULL == NULL gets true
goto retry; // infinite loop !!!
$ top
PID USER PR NI VIRT RES SHR S %CPU %MEM COMMAND
7676 root 20 0 0 0 0 R 100.0 0.0 ubifs_bgt0_0
Fix it by:
1) Letting ubi_wl_put_peb() returns directly if wearl leveling entry has
been removed from 'ubi->lookuptbl'.
2) Using 'ubi->wl_lock' protecting wl entry deletion to preventing an
use-after-free problem for wl entry in ubi_wl_put_peb().
Fetch a reproducer in [Link].
Fixes: 43f9b25a9cdd7b1 ("UBI: bugfix: protect from volume removal")
Fixes: ee59ba8b064f692 ("UBI: Fix stale pointers in ubi->lookuptbl")
Link: https://bugzilla.kernel.org/show_bug.cgi?id=216111
Signed-off-by: Zhihao Cheng <chengzhihao1@huawei.com>
Signed-off-by: Richard Weinberger <richard@nod.at>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2023-03-11 13:57:26 +01:00
..
2022-06-09 10:23:25 +02:00
2022-10-26 12:35:09 +02:00
2022-01-27 11:03:15 +01:00
2022-12-31 13:14:10 +01:00
2022-12-31 13:14:12 +01:00
2022-11-03 23:59:15 +09:00
2022-11-10 18:15:32 +01:00
2023-03-10 09:40:05 +01:00
2023-03-11 13:57:26 +01:00
2021-08-23 10:01:04 +02:00
2021-08-06 22:05:13 +02:00
2021-09-05 10:50:12 -07:00
2021-08-17 18:41:59 +02:00
2022-06-09 10:22:49 +02:00
2021-08-17 18:43:33 +02:00
2022-12-31 13:14:09 +01:00
2022-01-27 11:02:48 +01:00
2021-08-23 10:01:06 +02:00
2022-08-17 14:23:40 +02:00