From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751139AbdAaPqG (ORCPT ); Tue, 31 Jan 2017 10:46:06 -0500 Received: from mail-pf0-f193.google.com ([209.85.192.193]:35261 "EHLO mail-pf0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750740AbdAaPp7 (ORCPT ); Tue, 31 Jan 2017 10:45:59 -0500 Message-ID: <1485877498.6360.115.camel@edumazet-glaptop3.roam.corp.google.com> Subject: Re: net: suspicious RCU usage in nf_hook From: Eric Dumazet To: Cong Wang Cc: Dmitry Vyukov , David Miller , Alexey Kuznetsov , Eric Dumazet , James Morris , Hideaki YOSHIFUJI , Patrick McHardy , netdev , LKML , Pablo Neira Ayuso , netfilter-devel@vger.kernel.org, syzkaller Date: Tue, 31 Jan 2017 07:44:58 -0800 In-Reply-To: References: <1485560124.6360.74.camel@edumazet-glaptop3.roam.corp.google.com> <1485567090.6360.92.camel@edumazet-glaptop3.roam.corp.google.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.10.4-0ubuntu2 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2017-01-30 at 22:19 -0800, Cong Wang wrote: > > The context is process context (TX path before hitting qdisc), and > BH is not disabled, so in_interrupt() doesn't catch it. Hmm, this > makes me thinking maybe we really need to disable BH in this > case for nf_hook()? But it is called in RX path too, and BH is > already disabled there. ipt_do_table() and similar netfilter entry points disable BH. Maybe it is done too late.