Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2983651imu; Sun, 9 Dec 2018 14:16:31 -0800 (PST) X-Google-Smtp-Source: AFSGD/XQMdYEZkLAnd8K62B3H0eIrT9npBqlDM9PfZcvIb+odo/vOWxBxO8p0cfkOgOxr+KtFdvv X-Received: by 2002:a65:6491:: with SMTP id e17mr8745789pgv.418.1544393791444; Sun, 09 Dec 2018 14:16:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544393791; cv=none; d=google.com; s=arc-20160816; b=S1azXF/eYhURAfSVj3G/ycnVXdChwXTLBdqwfPOroJgBIXV31X5RTTZNlPm53llbUp NBtpTl+ZNDjhkxa2Ou/7htkH9Bn7EMb1GDei1cexJDgahb4z98nn1b6epfPzKi0QeQQx L23ItwZqumX91fm2icuqALSha7vgQVLLVjAsw2cMhtKslGksJ5RWq2mC0mA/9hy6Oia6 9x2uzQsnyikICndD0/YzfqEy6HpLenP0VkL3uZQJF38KPur2Zn56vqhiuDyr/ZWU/jzg he2hlWGKtxl2Y7519s5eZKtpNww3pI2989xE4z16f7J/JcMAOL/CT4POmkfDeGjilVaA /9hA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=yHvFuI2yM8aFJeOXIvyDK+EiYlhGzgTTUBAQ0XxfLGw=; b=MOFg+EHOm46dbcIlH1tO7ETsrgaE/V6NIV9SX34M4WxykInpW2a+LFiEsGtxVNdxrx goLUqGIDFB9TxV/117Ffgb7fJx/dqU+5m70Ln7q/IvJ1sKXlKcpSyDfkB8kMd4vEDGsR uqPRSTgmYTLKivTTkIzSqReZPJv09mmPhZ5vsMK7fBcSTB18H1bBX0OFkCgNEoGg8oYs Jss8uKcxn9yCLq/q6Sp1FelmirjEkJINNAd07u4UsenN9cfFU2/fIBsf0ljmtNV8My55 EArMrgqx1JtBV/MUUl3yMyoVDJeHJfRDqFtQVJ4m5I+L7+GCqq3b+JbyFMU2yLth4Cfy Qnqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m142si9485183pfd.171.2018.12.09.14.16.16; Sun, 09 Dec 2018 14:16:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728434AbeLIWNp (ORCPT + 99 others); Sun, 9 Dec 2018 17:13:45 -0500 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:37944 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728414AbeLIWNl (ORCPT ); Sun, 9 Dec 2018 17:13:41 -0500 Received: from pub.yeoldevic.com ([81.174.156.145] helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1gW734-0002ib-GP; Sun, 09 Dec 2018 21:55:38 +0000 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1gW72g-0003WI-PU; Sun, 09 Dec 2018 21:55:14 +0000 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Sven Eckelmann" , "Antonio Quartulli" , "Marek Lindner" Date: Sun, 09 Dec 2018 21:50:33 +0000 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 214/328] batman-adv: Use kref_get for batadv_nc_get_nc_node In-Reply-To: X-SA-Exim-Connect-IP: 81.174.156.145 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.62-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Sven Eckelmann commit 0de32ceee156787429035c974316f4e5098cf722 upstream. batadv_nc_get_nc_node requires that the caller already has a valid reference for orig_neigh_node. It is therefore not possible that it has an reference counter of 0 and was still given to this function The kref_get function instead WARNs (with debug information) when the reference counter would still be 0. This makes a bug in batman-adv better visible because kref_get_unless_zero would have ignored this problem. Signed-off-by: Sven Eckelmann Signed-off-by: Marek Lindner Signed-off-by: Antonio Quartulli [bwh: Backported to 3.16: Reference counts are not krefs here, so open- code the equivalent of kref_get()] Signed-off-by: Ben Hutchings --- net/batman-adv/network-coding.c | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) --- a/net/batman-adv/network-coding.c +++ b/net/batman-adv/network-coding.c @@ -813,8 +813,7 @@ static struct batadv_nc_node if (!nc_node) return NULL; - if (!atomic_inc_not_zero(&orig_neigh_node->refcount)) - goto free; + WARN_ON_ONCE(atomic_inc_return(&orig_neigh_node->refcount) < 2); /* Initialize nc_node */ INIT_LIST_HEAD(&nc_node->list); @@ -840,10 +839,6 @@ static struct batadv_nc_node spin_unlock_bh(lock); return nc_node; - -free: - kfree(nc_node); - return NULL; } /**