Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2704983pxv; Sun, 11 Jul 2021 23:16:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzR+rwcfhcyBYyhwOy2v3rvQ5snTrUxOfUySmmxXSodrZphw4bQqllpWNsdgjXaYDDMRr6Z X-Received: by 2002:a6b:7e42:: with SMTP id k2mr26465481ioq.184.1626070616875; Sun, 11 Jul 2021 23:16:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626070616; cv=none; d=google.com; s=arc-20160816; b=IWhJgyoW4BNX6kyUG8n7HHFkbNntUMz7rqYOGjBQ1wSRrj9R2UssIuy656XxZ1UJZ4 A901XQK6Dcr6la/Yfhuxd9lHEeVlWkBj8nROsXOENRPd1p19vXmZGy/LiY9joAyuDR6g Ne4CqjW250I3VQRTehxQJh5URpwU3rkZ8a/ecs1PUUprd33mKdWrhst88eFDhrD+whZR 4e30SduRFphmwoNLb6JO+Kx5kcKY+oC9wiSGUD2kfaKnzhl/Z2M+c39Vs4ncfQI+iQUv HpTLywE8vAnkQfVXcDYnmOPsXVcF/QIef679zPTYoaojS3oJ/1JD9r5zpL8CHYVis1Kf xMCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kaCwWPQNnk6fAivl0As1fhxSFVXAsNPDuUcU0SnLVCo=; b=Uv4p9U6FufUIUZgkh6Mf/vXgVa+g70uRxPIQ6u3uwZ5tg+ezUOCklpLxHeCLbDknlT OP+j/57ebYFhDsTIML4YlIL/80G3FvUEeS3VAPp8YtgA62kwDiU4EoEQLF8X5NLj5Mte j+kWMgCzZoQ9jNBr7JWh/qqTPOY1s8aEeg+gqh5xHQOARErtbBoEjfjFfVC8ga5z5HeK 35KDCPV/VxywRbHM9pi0tfdUcZiAADxhfG2sjjJGTPfm7u9PtcpECHQjLSvJIxUrRHQl HYhXL/WtxfKa5q2+tGa5x9zV5kAe0EouS72RjpH7c8nK0V0L8JcElRGo3lirXbZ06yjn Q4LQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Omso5qXH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p18si12334584jam.27.2021.07.11.23.16.44; Sun, 11 Jul 2021 23:16:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Omso5qXH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233465AbhGLGSk (ORCPT + 99 others); Mon, 12 Jul 2021 02:18:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:36666 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233598AbhGLGSY (ORCPT ); Mon, 12 Jul 2021 02:18:24 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 98255610CD; Mon, 12 Jul 2021 06:15:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626070537; bh=olzKqJDoXQW6XcEzjbAgamXKpMz+0dELovJoN8l7BH0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Omso5qXHsl1LS5nYMCHY6FwF9k6Hc7+SdB3C52Igfi1daRJd0JvcYxMBmakE8je8K Ij19rQ1SzYJh+Ijw3ShmvMNtZqCHzk+sbb+kM9Oa7f4g/z3T/Cv2MA2BeQsU5un1a5 MP+ru0ucLNq8kquTsFiqbCdDX78PVu0HO/nYA3IA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oliver Hartkopp , Marc Kleine-Budde Subject: [PATCH 5.4 033/348] can: gw: synchronize rcu operations before removing gw job entry Date: Mon, 12 Jul 2021 08:06:57 +0200 Message-Id: <20210712060705.417695724@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060659.886176320@linuxfoundation.org> References: <20210712060659.886176320@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oliver Hartkopp commit fb8696ab14adadb2e3f6c17c18ed26b3ecd96691 upstream. can_can_gw_rcv() is called under RCU protection, so after calling can_rx_unregister(), we have to call synchronize_rcu in order to wait for any RCU read-side critical sections to finish before removing the kmem_cache entry with the referenced gw job entry. Link: https://lore.kernel.org/r/20210618173645.2238-1-socketcan@hartkopp.net Fixes: c1aabdf379bc ("can-gw: add netlink based CAN routing") Cc: linux-stable Signed-off-by: Oliver Hartkopp Signed-off-by: Marc Kleine-Budde Signed-off-by: Greg Kroah-Hartman --- net/can/gw.c | 3 +++ 1 file changed, 3 insertions(+) --- a/net/can/gw.c +++ b/net/can/gw.c @@ -535,6 +535,7 @@ static int cgw_notifier(struct notifier_ if (gwj->src.dev == dev || gwj->dst.dev == dev) { hlist_del(&gwj->list); cgw_unregister_filter(net, gwj); + synchronize_rcu(); kmem_cache_free(cgw_cache, gwj); } } @@ -1093,6 +1094,7 @@ static void cgw_remove_all_jobs(struct n hlist_for_each_entry_safe(gwj, nx, &net->can.cgw_list, list) { hlist_del(&gwj->list); cgw_unregister_filter(net, gwj); + synchronize_rcu(); kmem_cache_free(cgw_cache, gwj); } } @@ -1161,6 +1163,7 @@ static int cgw_remove_job(struct sk_buff hlist_del(&gwj->list); cgw_unregister_filter(net, gwj); + synchronize_rcu(); kmem_cache_free(cgw_cache, gwj); err = 0; break;