Message ID | 20171027012443.3306-14-xiyou.wangcong@gmail.com |
---|---|
State | Accepted, archived |
Delegated to: | David Miller |
Headers | show
Return-Path: <netdev-owner@vger.kernel.org> X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=<UNKNOWN>) Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="ZKlSg81f"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3yNR694jfbz9t2h for <patchwork-incoming@ozlabs.org>; Fri, 27 Oct 2017 12:26:09 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932514AbdJ0B0I (ORCPT <rfc822;patchwork-incoming@ozlabs.org>); Thu, 26 Oct 2017 21:26:08 -0400 Received: from mail-pf0-f195.google.com ([209.85.192.195]:45039 "EHLO mail-pf0-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932414AbdJ0BZP (ORCPT <rfc822;netdev@vger.kernel.org>); Thu, 26 Oct 2017 21:25:15 -0400 Received: by mail-pf0-f195.google.com with SMTP id x7so3784466pfa.1 for <netdev@vger.kernel.org>; Thu, 26 Oct 2017 18:25:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=uIn0A9T4QwIHgukC6WokQCAn/Js464c+zFUmVIVaTF0=; b=ZKlSg81fAHiqjpxa7BW1C2+P55U9pJ41EKOkehJPj2fubUQ5huCv71+B1z64n0R+AI bdiYgsW4H8WaPyhhbjWbugQJm+fSARk5Zx0DP7QDNxIWc9BtZaqwnRRlIjg2rd7dtmwG +WVqmYpJC50NV06xpnP0drjwnXWaNuwNEYAzKru1IkDoq1uOlA7qkQ9+IMzse+MQGPAV xaZR/kLDFkw5TjV2QST21OJIvh+VghwqDnEFjiSGum1RGLOmQU9kT5kgI2Rjm2eoDLoe dzHLo/J3DMntEoyptB8pNwwWO27j+EkbeOt7d7/lYHadK92vw7u+CM1tCSIIAP1yYe7P WPkg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=uIn0A9T4QwIHgukC6WokQCAn/Js464c+zFUmVIVaTF0=; b=Av+3Mbi+MrwVjH7+VME/CxJPfm1+6FG12AdKakC6lj2kuggvfEG+a2Y/xLyfFnvLID /4LiKhspHO0slyQxgENX+4M5JhreeLeJMsk415tstfsIO7aOEs7rbsmRhM86BgaPBh9r DbIds5ySeHGLbE/ErtI4SDKlENXb4CPXCrMHD9SZgIVP3AFEnjjIkgxox6OF4rb/gSdT h5hU/ByyaJ1WTbJQH/Pt9wSoRy0TWPdKSJ6OPsILWP56Z8OWbN7JXCm9qs8Ej7PBS0jT h4SB6FwUCWijIsCtYTDyg0vHpfCy1oiKd628cyAG1vMjkUYoGFljqMHfzGi3cbe99Utx NIgQ== X-Gm-Message-State: AMCzsaVwsXNLTGLIuFbKFx0cGTo4PnoVX8I71Nm/SN7sZwSmCzLrI4YR uW54l1a9Bcc1XGthq0sdLB/m831S X-Google-Smtp-Source: ABhQp+QEtL0ntoolKnbbr/GBFoJ0Z0i8xm4CqUn4m75Gs1bsoLHGKdiN+yXq6USLun/BAV2HcHrxxw== X-Received: by 10.101.75.7 with SMTP id r7mr6608699pgq.133.1509067513945; Thu, 26 Oct 2017 18:25:13 -0700 (PDT) Received: from tw-172-25-30-113.office.twttr.net ([8.25.197.25]) by smtp.gmail.com with ESMTPSA id b16sm13211973pfe.58.2017.10.26.18.25.12 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 26 Oct 2017 18:25:13 -0700 (PDT) From: Cong Wang <xiyou.wangcong@gmail.com> To: netdev@vger.kernel.org Cc: Chris Mi <chrism@mellanox.com>, Cong Wang <xiyou.wangcong@gmail.com>, Daniel Borkmann <daniel@iogearbox.net>, Jiri Pirko <jiri@resnulli.us>, John Fastabend <john.fastabend@gmail.com>, Jamal Hadi Salim <jhs@mojatatu.com>, "Paul E. McKenney" <paulmck@linux.vnet.ibm.com> Subject: [Patch net 13/16] net_sched: add rtnl assertion to tcf_exts_destroy() Date: Thu, 26 Oct 2017 18:24:40 -0700 Message-Id: <20171027012443.3306-14-xiyou.wangcong@gmail.com> X-Mailer: git-send-email 2.9.4 In-Reply-To: <20171027012443.3306-1-xiyou.wangcong@gmail.com> References: <20171027012443.3306-1-xiyou.wangcong@gmail.com> Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: <netdev.vger.kernel.org> X-Mailing-List: netdev@vger.kernel.org |
Series |
net_sched: fix races with RCU callbacks
|
expand
|
diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c index 045d13679ad6..231181c602ed 100644 --- a/net/sched/cls_api.c +++ b/net/sched/cls_api.c @@ -909,6 +909,7 @@ void tcf_exts_destroy(struct tcf_exts *exts) #ifdef CONFIG_NET_CLS_ACT LIST_HEAD(actions); + ASSERT_RTNL(); tcf_exts_to_list(exts, &actions); tcf_action_destroy(&actions, TCA_ACT_UNBIND); kfree(exts->actions);
After previous patches, it is now safe to claim that tcf_exts_destroy() is always called with RTNL lock. Cc: Daniel Borkmann <daniel@iogearbox.net> Cc: Jiri Pirko <jiri@resnulli.us> Cc: John Fastabend <john.fastabend@gmail.com> Cc: Jamal Hadi Salim <jhs@mojatatu.com> Cc: "Paul E. McKenney" <paulmck@linux.vnet.ibm.com> Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com> --- net/sched/cls_api.c | 1 + 1 file changed, 1 insertion(+)