Received: by 10.192.165.148 with SMTP id m20csp2462949imm; Sun, 22 Apr 2018 07:33:35 -0700 (PDT) X-Google-Smtp-Source: AIpwx49RcnIYEWdNAV5of+wEBSEELU5fxf7MXmMfHDVOIfRNI5n030BKGgmsPbOTS5F/sHA+07mS X-Received: by 10.98.156.7 with SMTP id f7mr16839552pfe.104.1524407615178; Sun, 22 Apr 2018 07:33:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524407615; cv=none; d=google.com; s=arc-20160816; b=K3q6OKTmITdZYIFetyJPWe9CAxrTygzaXUnz7mT9T7QQua+QRX+YG5M1fI1wuHsgeJ B7moaVAq3KzuIcz6GnKOjTLHv8UDB56LpziW3uOpoob+3pV+P4eZ0Lu3OQem7jTsRWSb jV8aJyGhBdroTpqUfbxUEFjjY9tKSOY7+Y3TiqSmobBjND6TbTyrocdDMeh4y7iI3e1e TUldS38JOKPXNahTEOtDSCdS4ghTLv/yjPi2bKYiGVKDBoj3q+/Ah4VI5lJnRHe7vivL XLQAe0mkpNIQj0HPfbPh3GBAzxQGrjtCQ/MgJMXwMa163oX9pQG4LhuCNYwEuFFtUZi9 Ou4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=CLGi49+Imztu6ms2k6XUqnhAvRV1IMsrei5vcDUO/IA=; b=0fmg/tEIJBZQ4gKyjqx0SKhYZEcssPacewwuUQTH+Zp4hfdFHCMfhc/kkykg//jck4 7dWId++7VBMgcMISjXJfewv5umCtf60CrJ0gR6pYmhNmqMuqazsc1pdSE1OQknj2BJvg kcl13sz//Zzrs4u60dYT8LxuaADLplAA2O06JXvPF/eRR2Sxcst5f4d1zEjgtqrIm/yh 1/uYBQRlpxn4JHQsvZ9DQs6yUgKCaR3xRJjY4y9UFVoSP4mJBQfelEaFz7EnZqXiuBik qZWPTa157VNI5nvO2HcvQALV7nrVPHHe39qICo2v+/i/vN1NlRgSpREpTNTEDVuFIf3r W7Ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i190si7940681pge.408.2018.04.22.07.33.21; Sun, 22 Apr 2018 07:33:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932292AbeDVOcG (ORCPT + 99 others); Sun, 22 Apr 2018 10:32:06 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:60266 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757254AbeDVOUN (ORCPT ); Sun, 22 Apr 2018 10:20:13 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 85905CB0; Sun, 22 Apr 2018 14:20:12 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jason Andryuk , Eduardo Otubo , Boris Ostrovsky , Juergen Gross Subject: [PATCH 3.18 14/52] xen-netfront: Fix hang on device removal Date: Sun, 22 Apr 2018 15:53:47 +0200 Message-Id: <20180422135315.926366135@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180422135315.254787616@linuxfoundation.org> References: <20180422135315.254787616@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jason Andryuk commit c2d2e6738a209f0f9dffa2dc8e7292fc45360d61 upstream. A toolstack may delete the vif frontend and backend xenstore entries while xen-netfront is in the removal code path. In that case, the checks for xenbus_read_driver_state would return XenbusStateUnknown, and xennet_remove would hang indefinitely. This hang prevents system shutdown. xennet_remove must be able to handle XenbusStateUnknown, and netback_changed must also wake up the wake_queue for that state as well. Fixes: 5b5971df3bc2 ("xen-netfront: remove warning when unloading module") Signed-off-by: Jason Andryuk Cc: Eduardo Otubo Reviewed-by: Boris Ostrovsky Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- drivers/net/xen-netfront.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/drivers/net/xen-netfront.c +++ b/drivers/net/xen-netfront.c @@ -2067,7 +2067,10 @@ static void netback_changed(struct xenbu case XenbusStateInitialised: case XenbusStateReconfiguring: case XenbusStateReconfigured: + break; + case XenbusStateUnknown: + wake_up_all(&module_unload_q); break; case XenbusStateInitWait: @@ -2314,7 +2317,9 @@ static int xennet_remove(struct xenbus_d xenbus_switch_state(dev, XenbusStateClosing); wait_event(module_unload_q, xenbus_read_driver_state(dev->otherend) == - XenbusStateClosing); + XenbusStateClosing || + xenbus_read_driver_state(dev->otherend) == + XenbusStateUnknown); xenbus_switch_state(dev, XenbusStateClosed); wait_event(module_unload_q,