Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp9056pja; Fri, 22 Nov 2019 02:44:28 -0800 (PST) X-Google-Smtp-Source: APXvYqzGGMrLa10W1mAhNazuF1EKbjG5mwa/pSTLxC7XdzyZOToUTxCd8QIt03vnBEoVLjHn5h+w X-Received: by 2002:aa7:d2cf:: with SMTP id k15mr224565edr.267.1574419468273; Fri, 22 Nov 2019 02:44:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574419468; cv=none; d=google.com; s=arc-20160816; b=qt0Yz3DRoHdiEO4KD15BVlWb+tP1ue403roWAfVWzkyu2jeUQGhWT7VuZOkfjGh7VT 05MInxUeYb04zojYXlyXH35VmBC0HOAX95TjIW5poX1t6fA3tVevBaIW+cbKzRSZrIC5 Xa+DIdspigRpEtkhoxzw0ccrQYvGrb1sEw/luR922sneGSWkzHNV9z2uDJGowPZkt1sH SGEP1NvfzYbYmbVsPewbYSsvR8ZoQFGarnbRpi0Cdu1KAbPvry/GscPKE/bruBbiJ9BG 6raklVP5aK/OBacHzcOgF99Xbwra+kU2jXpz5ivp1m/OWe1uWRjrBWtQIzHmfK1f+YF3 vkWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iQuChSV6h8Ss3dHxL6qJMXYX6xWGXOVhZuMAhTESupY=; b=pysOPlUrgTAiIyszMHpyNK5zy7hg+OFFxJsRgSDDip91Ksum5jEd/ges1Dniph5gT8 NFtxMqMUUG94ZV5cpSw9g4Wtn5Kwcg7G2yKV82reM7hFy7vxhj0hkT0Ce63Wzyksm9rX 9O0bAcLxZdGGH1Xpk5baVt2QDIZmhQOm4jYFCvrFSuxOJPEaJ8SuLwbQIR8gYpd7Eps8 wTB1gJR5XRupCwsFCyCL9g9ZgxENEDr/r4nekh48vXfEamwZcEdD3UwgBwzfrsCpwPnT 7LkXtEm8fguBprcK+i5urkl4O2vj0d9l9YWTQgIYE7y+k+ehAjQEZs6AHwFU4F+N0Re3 +VOg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vX0ZjvSt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a47si4354835edc.145.2019.11.22.02.44.04; Fri, 22 Nov 2019 02:44:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vX0ZjvSt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728642AbfKVKlx (ORCPT + 99 others); Fri, 22 Nov 2019 05:41:53 -0500 Received: from mail.kernel.org ([198.145.29.99]:46592 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728378AbfKVKlu (ORCPT ); Fri, 22 Nov 2019 05:41:50 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B53E520715; Fri, 22 Nov 2019 10:41:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574419309; bh=ON1L6FHRZCSgyfc+YX7cNsYgDakQmYbouwjMn0KnQBE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vX0ZjvSt65jx3rb8aH4oMSDJdoK+/TdrDvUQfeKN2lX02bkd45oroRjdv/U4JpZ4+ rxciKmYt53OGk2/My7eovi9okbs1KJsLBqWOzyG1RtukxQyg20SwKeGNYY/P7SJSEo f7/VPkMiXzDQV0hf/lzYzej/k7pTXNuq3yE749BY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Cong Wang , "David S. Miller" , Sasha Levin Subject: [PATCH 4.9 066/222] llc: avoid blocking in llc_sap_close() Date: Fri, 22 Nov 2019 11:26:46 +0100 Message-Id: <20191122100904.314181638@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191122100830.874290814@linuxfoundation.org> References: <20191122100830.874290814@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Cong Wang [ Upstream commit 9708d2b5b7c648e8e0a40d11e8cea12f6277f33c ] llc_sap_close() is called by llc_sap_put() which could be called in BH context in llc_rcv(). We can't block in BH. There is no reason to block it here, kfree_rcu() should be sufficient. Signed-off-by: Cong Wang Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- include/net/llc.h | 1 + net/llc/llc_core.c | 4 +--- 2 files changed, 2 insertions(+), 3 deletions(-) diff --git a/include/net/llc.h b/include/net/llc.h index 82d989995d18a..95e5ced4c1339 100644 --- a/include/net/llc.h +++ b/include/net/llc.h @@ -66,6 +66,7 @@ struct llc_sap { int sk_count; struct hlist_nulls_head sk_laddr_hash[LLC_SK_LADDR_HASH_ENTRIES]; struct hlist_head sk_dev_hash[LLC_SK_DEV_HASH_ENTRIES]; + struct rcu_head rcu; }; static inline diff --git a/net/llc/llc_core.c b/net/llc/llc_core.c index e896a2c53b120..f1e442a39db8d 100644 --- a/net/llc/llc_core.c +++ b/net/llc/llc_core.c @@ -127,9 +127,7 @@ void llc_sap_close(struct llc_sap *sap) list_del_rcu(&sap->node); spin_unlock_bh(&llc_sap_list_lock); - synchronize_rcu(); - - kfree(sap); + kfree_rcu(sap, rcu); } static struct packet_type llc_packet_type __read_mostly = { -- 2.20.1