On Mon, Feb 27, 2017 at 06:11:11PM +0100, Dmitry Vyukov wrote: > Hello, > > The following program triggers GPF in bdi_put: > https://gist.githubusercontent.com/dvyukov/15b3e211f937ff6abc558724369066ce/raw/cc017edf57963e30175a6a6fe2b8d917f6e92899/gistfile1.txt What happens is * attempt of, essentially, mount -t bdev ..., calls mount_pseudo() and then promptly destroys the new instance it has created. * the only inode created on that sucker (root directory, that is) gets evicted. * most of ->evict_inode() is harmless, until it gets to if (bdev->bd_bdi != &noop_backing_dev_info) bdi_put(bdev->bd_bdi); added there by "block: Make blk_get_backing_dev_info() safe without open bdev". Since ->bd_bdi hadn't been initialized for that sucker (the same patch has placed initialization into bdget()), we step into shit of varying nastiness, depending on phase of moon, etc. Could somebody explain WTF do we have those two lines in bdev_evict_inode(), anyway? We set ->bd_bdi to something other than noop_backing_dev_info only in __blkdev_get() when ->bd_openers goes from zero to positive, so why is the matching bdi_put() not in __blkdev_put()? Jan? -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>