Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2252417imm; Thu, 18 Oct 2018 11:26:11 -0700 (PDT) X-Google-Smtp-Source: ACcGV62e7FSnid4FR8vVGqdEn98GKvRNF4vQD8SEuv9ZHZ2VjLDDlzkQMomKFhFHveIx/z9AbhFa X-Received: by 2002:a17:902:708a:: with SMTP id z10-v6mr2316839plk.330.1539887171893; Thu, 18 Oct 2018 11:26:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539887171; cv=none; d=google.com; s=arc-20160816; b=FOWtihQBsDyu0mjPGoh4A2eZEbz8YR9hYraDHxEry2otFfA8viO4KaGkdIpXMEN8/6 ODDQ4kXn8ef6V+IPUuge/CDPJQufnHj9aBSmT2RMPiEAYgVqVPAZRO0hmNkRn0KwlEHP Fkf9gxWze8pstwypLOQF1VikcTIxPOwWvfpuYBnAw9QG86uQ/8VQ8DSWicYScQiZgnYx DInEvJMpOycYEocvXI8aTzexX10ejeu/e9c2EKbT65JxZVAr4hkL9VczTEN4oDjc+4l8 r7r3R+DDo6bUDwEyzVN0QfTFpRx9UkfexjrFotAkHyVNKv4ak6G301U5oJahPYGeOG8n N84g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fselocMBx+Rf4T4m75hNP53VR72y7vA9NTAISUCpDvw=; b=R6F3aPb9IKeh+WhspLf4OMpIf0Onfk+G06k3bjaY5J1/Tx1ZecfTRhXtj7Jbqpx5vj Lm9ed3i4jKAnLCC0BAo5PNe2SyU053q/fCoXynOhtZeUyh8BnEXSLP4HRf1qN+GHY2c2 s87xLzwjS35YG2GWQcX/LQ8oewW9W+n3z243JplSGN4VJE/rmHeyBD747YG5XOLf7goR VnjKEx+E2gPm/NjSw0OQDgUa/DENKcl+Fmt448Qnxf7QYuXcCWK6LLZ3j17mZ6jD/+Qs r/KcdAtrYlKCg/UmaRr3BaLsTl6hTdXuwr9WjSJPLb9O32/IrQXSZx9Sj0DON840HEYV Ve7g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CeWVZxoE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h71-v6si14310935pge.174.2018.10.18.11.25.56; Thu, 18 Oct 2018 11:26:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CeWVZxoE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729273AbeJSCBs (ORCPT + 99 others); Thu, 18 Oct 2018 22:01:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:49538 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728410AbeJSCBr (ORCPT ); Thu, 18 Oct 2018 22:01:47 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BC1D821476; Thu, 18 Oct 2018 17:59:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539885582; bh=0fZ7koo4hdQRjXtMVQiJSNFdx7zq8HI/gZCIsvJJnoA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CeWVZxoEwoAQRKI56z9iE+LNdlv5F9izuCY4GbudCTnK8uo0XdDc//5Z608TmFYdG mXw21+t4oYxkFApr+cFH46Tdym5dP3lINo34M5Mpb2YgEsLz/xLBm6+AQGyS1n640g piTZ6Z9/2ghpRHd25+SyMvXFWvJcDbPU6KLaFzYw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marek Lindner , Sven Eckelmann , Simon Wunderlich , Sasha Levin Subject: [PATCH 4.14 11/41] batman-adv: fix hardif_neigh refcount on queue_work() failure Date: Thu, 18 Oct 2018 19:54:26 +0200 Message-Id: <20181018175418.862296113@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181018175416.718399607@linuxfoundation.org> References: <20181018175416.718399607@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Marek Lindner [ Upstream commit 4c4af6900844ab04c9434c972021d7b48610e06a ] The hardif_neigh refcounter is to be decreased by the queued work and currently is never decreased if the queue_work() call fails. Fix by checking the queue_work() return value and decrease refcount if necessary. Signed-off-by: Marek Lindner Signed-off-by: Sven Eckelmann Signed-off-by: Simon Wunderlich Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- net/batman-adv/bat_v_elp.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/net/batman-adv/bat_v_elp.c +++ b/net/batman-adv/bat_v_elp.c @@ -254,6 +254,7 @@ static void batadv_v_elp_periodic_work(s struct batadv_priv *bat_priv; struct sk_buff *skb; u32 elp_interval; + bool ret; bat_v = container_of(work, struct batadv_hard_iface_bat_v, elp_wq.work); hard_iface = container_of(bat_v, struct batadv_hard_iface, bat_v); @@ -315,8 +316,11 @@ static void batadv_v_elp_periodic_work(s * may sleep and that is not allowed in an rcu protected * context. Therefore schedule a task for that. */ - queue_work(batadv_event_workqueue, - &hardif_neigh->bat_v.metric_work); + ret = queue_work(batadv_event_workqueue, + &hardif_neigh->bat_v.metric_work); + + if (!ret) + batadv_hardif_neigh_put(hardif_neigh); } rcu_read_unlock();