Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp130321ybc; Mon, 18 Nov 2019 21:50:19 -0800 (PST) X-Google-Smtp-Source: APXvYqwAvhdvCphhpJtCqO1WVpZxCJycFKUfuGS9bBQnzCX4lWQQ1o+29YHwA5tPv6PWLvHTXhfM X-Received: by 2002:a17:906:301a:: with SMTP id 26mr32215834ejz.201.1574142619128; Mon, 18 Nov 2019 21:50:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574142619; cv=none; d=google.com; s=arc-20160816; b=UXweaVWm4qnzDIuXwOThWmyP8tEzcx4HFabMH5h7ujJNFoAR+RCqlB2pK0ZXSB5HWO ZAtHe6ikueO1BC/cym3AtXKtT7OaG0UHX1/WX0jNdJK2jYFtje2NfS+r07ap5vRKkE98 0Siq4g0XjB6Hax0S6TT1HYVnkZpl0LnrxUOsECIGlaJwWPTpO0qWQDF24MxOjYuhGOO3 uqQqdEc++K8FY+NEEsJTunKWUbnvMsJIuw15qOkbZNP5kdw8VjqN/8Spe0lFjrexiPei urqlz85SLfATGq0T5YI7KicdypmYR1C6y22g0V0F88+7fDQ3Yuna0YpPTUbNU6m8NdpO NCbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=W2MubjmGPn2cJHQ/S9Jn2hOsfVFkf1NNqxEeNbjTOLQ=; b=hHp2CY5bMReAhT8eGGn6xlfYzBFHn3pM8jRMVuhO5BH6wey973eUs6K037+Xyz7RyP sGYu8S248nmaGj8v0/R5YaDo9ARDD0FjPwpuKSEYD2VaiDzgOSy1f6WWOvE3I0gQPB3D l/+miMbTVC66lfgwzjKzDH6lZ5X9yeShf2J0Lgq04eWAVaar7HtcIiQF2iSO7dSvsyux mJ7uCbnAQktbNTtnis9ofrVBOReEMoF1K6K8a3ksz8l9yzZFkUNRIHBIpU3NiSkiwLr1 rCYwPhkz+MoY/T/uXHpf1zifh6A6oILhv3R0DcvPTDBLHKknE5mU1IB2XhSSKQf+MN0p HJag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gDK1oibr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v3si8600560edq.359.2019.11.18.21.49.55; Mon, 18 Nov 2019 21:50:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gDK1oibr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731419AbfKSFsy (ORCPT + 99 others); Tue, 19 Nov 2019 00:48:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:45488 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731414AbfKSFsw (ORCPT ); Tue, 19 Nov 2019 00:48:52 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 98DD020721; Tue, 19 Nov 2019 05:48:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574142532; bh=J6ZEfStz5DT4isXE9ce7olgvh3mbHLrQijoXZCL5OSk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gDK1oibrS2sxO3gEh9Gm36slPM8G8U7SzwY/V7c9iiJ88EtgugGC9iETdrvtvqEnr coxngEL8+UWd5U5PpMj3fbzoOP3aurk7Q0guXEA3AijjJUXc64XBViREEVSTcvq2nd vxvAx/ft6b3u8EIyVUzNwe948HQQll6Sp9m7Tnso= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Cong Wang , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 112/239] llc: avoid blocking in llc_sap_close() Date: Tue, 19 Nov 2019 06:18:32 +0100 Message-Id: <20191119051328.074556262@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191119051255.850204959@linuxfoundation.org> References: <20191119051255.850204959@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Cong Wang [ Upstream commit 9708d2b5b7c648e8e0a40d11e8cea12f6277f33c ] llc_sap_close() is called by llc_sap_put() which could be called in BH context in llc_rcv(). We can't block in BH. There is no reason to block it here, kfree_rcu() should be sufficient. Signed-off-by: Cong Wang Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- include/net/llc.h | 1 + net/llc/llc_core.c | 4 +--- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/include/net/llc.h b/include/net/llc.h index 890a87318014d..df282d9b40170 100644 --- a/include/net/llc.h +++ b/include/net/llc.h @@ -66,6 +66,7 @@ struct llc_sap { int sk_count; struct hlist_nulls_head sk_laddr_hash[LLC_SK_LADDR_HASH_ENTRIES]; struct hlist_head sk_dev_hash[LLC_SK_DEV_HASH_ENTRIES]; + struct rcu_head rcu; }; static inline diff --git a/net/llc/llc_core.c b/net/llc/llc_core.c index 260b3dc1b4a2a..64d4bef04e730 100644 --- a/net/llc/llc_core.c +++ b/net/llc/llc_core.c @@ -127,9 +127,7 @@ void llc_sap_close(struct llc_sap *sap) list_del_rcu(&sap->node); spin_unlock_bh(&llc_sap_list_lock); - synchronize_rcu(); - - kfree(sap); + kfree_rcu(sap, rcu); } static struct packet_type llc_packet_type __read_mostly = { -- 2.20.1