Commit f91ff5b9 authored by Eric Dumazet's avatar Eric Dumazet Committed by David S. Miller

net: sk_{detach|attach}_filter() rcu fixes

sk_attach_filter() and sk_detach_filter() are run with socket locked.

Use the appropriate rcu_dereference_protected() instead of blocking BH,
and rcu_dereference_bh().
There is no point adding BH prevention and memory barrier.
Signed-off-by: default avatarEric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 7fa7cb71
...@@ -638,10 +638,9 @@ int sk_attach_filter(struct sock_fprog *fprog, struct sock *sk) ...@@ -638,10 +638,9 @@ int sk_attach_filter(struct sock_fprog *fprog, struct sock *sk)
return err; return err;
} }
rcu_read_lock_bh(); old_fp = rcu_dereference_protected(sk->sk_filter,
old_fp = rcu_dereference_bh(sk->sk_filter); sock_owned_by_user(sk));
rcu_assign_pointer(sk->sk_filter, fp); rcu_assign_pointer(sk->sk_filter, fp);
rcu_read_unlock_bh();
if (old_fp) if (old_fp)
sk_filter_delayed_uncharge(sk, old_fp); sk_filter_delayed_uncharge(sk, old_fp);
...@@ -654,14 +653,13 @@ int sk_detach_filter(struct sock *sk) ...@@ -654,14 +653,13 @@ int sk_detach_filter(struct sock *sk)
int ret = -ENOENT; int ret = -ENOENT;
struct sk_filter *filter; struct sk_filter *filter;
rcu_read_lock_bh(); filter = rcu_dereference_protected(sk->sk_filter,
filter = rcu_dereference_bh(sk->sk_filter); sock_owned_by_user(sk));
if (filter) { if (filter) {
rcu_assign_pointer(sk->sk_filter, NULL); rcu_assign_pointer(sk->sk_filter, NULL);
sk_filter_delayed_uncharge(sk, filter); sk_filter_delayed_uncharge(sk, filter);
ret = 0; ret = 0;
} }
rcu_read_unlock_bh();
return ret; return ret;
} }
EXPORT_SYMBOL_GPL(sk_detach_filter); EXPORT_SYMBOL_GPL(sk_detach_filter);
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment