From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-12.0 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SIGNED_OFF_BY,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 88C9CC10F13 for ; Tue, 16 Apr 2019 18:29:03 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 566922064B for ; Tue, 16 Apr 2019 18:29:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555439343; bh=ywAEAdHU45uwQmtqLVDWOvnqvdb6p7gLG/9+CUl/BEg=; h=Subject:To:From:Date:List-ID:From; b=O5zlkZ/6qj83ThK4lUqctCw9H0jZ9j1mpB8mRoDLcuFcPTaq/nW/lpui/T8ZVwcBx yB/gUSiM04KvsBSIY8ifhF+9aQGMLS88JiyK+rfOXIa5yB361ishEqdaqS8i4hVjgj UrTVKqxBJypblqAF0rD32QzAts9T+KsHCTm6SQGU= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728405AbfDPS3C (ORCPT ); Tue, 16 Apr 2019 14:29:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:34602 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727136AbfDPS3C (ORCPT ); Tue, 16 Apr 2019 14:29:02 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5D99A2087C; Tue, 16 Apr 2019 18:29:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555439341; bh=ywAEAdHU45uwQmtqLVDWOvnqvdb6p7gLG/9+CUl/BEg=; h=Subject:To:From:Date:From; b=eFWgFdIzEHzWREl1xV3BykvhksOc1K7hqmkRwrhk6iG18+lH8pVsn+pK8TzAJlp/8 cf7Bps/n5JSVt3f7dXxD2zKtufdUK8bO/0LxZNWZVYFxePve+ofGWrH4auawv3fC8G VK1nTkQ6D5z52WdSfJKy8gb3dX8J+5DrW5L2cZSk= Subject: patch "staging: wilc1000: Avoid GFP_KERNEL allocation from atomic context." added to staging-next To: penguin-kernel@I-love.SAKURA.ne.jp, adham.abozaeid@microchip.com, ajay.kathat@microchip.com, gregkh@linuxfoundation.org, stable@vger.kernel.org From: Date: Tue, 16 Apr 2019 20:28:51 +0200 Message-ID: <1555439331213113@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ANSI_X3.4-1968 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org This is a note to let you know that I've just added the patch titled staging: wilc1000: Avoid GFP_KERNEL allocation from atomic context. to my staging git tree which can be found at git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging.git in the staging-next branch. The patch will show up in the next release of the linux-next tree (usually sometime within the next 24 hours during the week.) The patch will also be merged in the next major kernel release during the merge window. If you have any questions about this process, please let me know. >From ae26aa844679cdf660e12c7055f958cb90889eb6 Mon Sep 17 00:00:00 2001 From: Tetsuo Handa Date: Sun, 7 Apr 2019 21:58:43 +0900 Subject: staging: wilc1000: Avoid GFP_KERNEL allocation from atomic context. Since wilc_set_multicast_list() is called with dev->addr_list_lock spinlock held, we can't use GFP_KERNEL memory allocation. Signed-off-by: Tetsuo Handa Fixes: e624c58cf8eb ("staging: wilc1000: refactor code to avoid use of wilc_set_multicast_list global") Cc: Ajay Singh Reviewed-by: Adham Abozaeid Cc: stable Signed-off-by: Greg Kroah-Hartman --- drivers/staging/wilc1000/wilc_netdev.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/staging/wilc1000/wilc_netdev.c b/drivers/staging/wilc1000/wilc_netdev.c index 1787154ee088..ba78c08a17f1 100644 --- a/drivers/staging/wilc1000/wilc_netdev.c +++ b/drivers/staging/wilc1000/wilc_netdev.c @@ -708,7 +708,7 @@ static void wilc_set_multicast_list(struct net_device *dev) return; } - mc_list = kmalloc_array(dev->mc.count, ETH_ALEN, GFP_KERNEL); + mc_list = kmalloc_array(dev->mc.count, ETH_ALEN, GFP_ATOMIC); if (!mc_list) return; -- 2.21.0