Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1003704yba; Wed, 24 Apr 2019 13:17:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqylBHabjwcVbpTn39ooylQ/XoP4mwAXDPbZ+qcr6k/RqlURQvzoaDlO53S/VM0hnx3JVS/H X-Received: by 2002:a65:6688:: with SMTP id b8mr10654780pgw.81.1556137022709; Wed, 24 Apr 2019 13:17:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556137022; cv=none; d=google.com; s=arc-20160816; b=gEh56cBJ2Mejp7/7130Q84if0fVqTKic1eehxBqoClVuldhGYLOMa9FQ7Lx0Pv6/tp GN6F1il+D51G1TV2blWwXZpy0zrV9a4svKGNA1Ip19uf8AjVbYiwIcahwk9TWqByc+ol KPfxgPOqvMnciaWr4D/7/9qYEp/yamumJF4ageXjqvkhm+Dp5Hc5Y4q59FWuxPz7yZg0 IvMkFPb0niIlxWaKcF/j2WKyyIEt0l99U6/Sqlgnc0NVXl5CFeVEo8iacp8qo4htBidH IpSH7JbQ8Q2DOS34KEkSR9B/9ZIQgGoFIcO6qgB4hO+GRRlYlKVbbmsy0wNLJJ7QJ7A5 tVvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=BeXKu17dXN8KpRVzv4YkIL+/SoN7BiMUgmk2enWUbbA=; b=dFWjiqqVMGjV7EftsamPSsIvYf+43cYI6lCgpkdZoQqNI/lScRbYWhwYelfhJMpg+S SaQTgS7T/etNY5wWPJOPgKu414btRLisB9018dlNOb1Hff0GWyQstRTux23HsvpSHicQ nwAJSUiJlHzPg5zJpkHAQjkTJeF6P4I07upS209UUfXveyMlrnGBPhZmWXzRoDbFRP+o OXQqJM2R3LbpyYhFGKYvXuEJzCgNeMQGMpg6kHbMr0aCe1zEqtus7tFNX0BSY52KvUBN Qwx6t0T3HcaPebT0Ao52miZdZ9WqH86AQXjJ6fZL537vq7EmBftUF23gijjjVlO39NW1 R65w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Vjj7AQNt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x2si18520964pgh.231.2019.04.24.13.16.47; Wed, 24 Apr 2019 13:17:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Vjj7AQNt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730877AbfDXOeH (ORCPT + 99 others); Wed, 24 Apr 2019 10:34:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:37994 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730836AbfDXOeE (ORCPT ); Wed, 24 Apr 2019 10:34:04 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B59782089F; Wed, 24 Apr 2019 14:34:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556116443; bh=CeJthMdWJ1xZPs0Ejhp+/4PFyTcwG0OBONf24FKkRG4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Vjj7AQNty7gQ9H17hgG7rQA/Tml06bQ9oTZ+Skm/rxtBZCSPEf2ulVa7fAFgvpZnI RCyulCxJWDZ/oeUm/Tyntz6ZRj91tNBUi38ZjGpANcvew39ulH4SUFUyBCGsIwsOwm VZPUODUx+DXChIkSI+dySyy1Vq55UFuqJsiPlogw= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Sven Eckelmann , Simon Wunderlich , Sasha Levin , netdev@vger.kernel.org Subject: [PATCH AUTOSEL 5.0 09/66] batman-adv: Reduce tt_local hash refcnt only for removed entry Date: Wed, 24 Apr 2019 10:32:43 -0400 Message-Id: <20190424143341.27665-9-sashal@kernel.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190424143341.27665-1-sashal@kernel.org> References: <20190424143341.27665-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sven Eckelmann [ Upstream commit 3d65b9accab4a7ed5038f6df403fbd5e298398c7 ] The batadv_hash_remove is a function which searches the hashtable for an entry using a needle, a hashtable bucket selection function and a compare function. It will lock the bucket list and delete an entry when the compare function matches it with the needle. It returns the pointer to the hlist_node which matches or NULL when no entry matches the needle. The batadv_tt_local_remove is not itself protected in anyway to avoid that any other function is modifying the hashtable between the search for the entry and the call to batadv_hash_remove. It can therefore happen that the entry either doesn't exist anymore or an entry was deleted which is not the same object as the needle. In such an situation, the reference counter (for the reference stored in the hashtable) must not be reduced for the needle. Instead the reference counter of the actually removed entry has to be reduced. Otherwise the reference counter will underflow and the object might be freed before all its references were dropped. The kref helpers reported this problem as: refcount_t: underflow; use-after-free. Fixes: ef72706a0543 ("batman-adv: protect tt_local_entry from concurrent delete events") Signed-off-by: Sven Eckelmann Signed-off-by: Simon Wunderlich Signed-off-by: Sasha Levin (Microsoft) --- net/batman-adv/translation-table.c | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) diff --git a/net/batman-adv/translation-table.c b/net/batman-adv/translation-table.c index 8dcd4968cde7..2ee87d3ca6d0 100644 --- a/net/batman-adv/translation-table.c +++ b/net/batman-adv/translation-table.c @@ -1337,9 +1337,10 @@ u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr, unsigned short vid, const char *message, bool roaming) { + struct batadv_tt_local_entry *tt_removed_entry; struct batadv_tt_local_entry *tt_local_entry; u16 flags, curr_flags = BATADV_NO_FLAGS; - void *tt_entry_exists; + struct hlist_node *tt_removed_node; tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid); if (!tt_local_entry) @@ -1368,15 +1369,18 @@ u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr, */ batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL); - tt_entry_exists = batadv_hash_remove(bat_priv->tt.local_hash, + tt_removed_node = batadv_hash_remove(bat_priv->tt.local_hash, batadv_compare_tt, batadv_choose_tt, &tt_local_entry->common); - if (!tt_entry_exists) + if (!tt_removed_node) goto out; - /* extra call to free the local tt entry */ - batadv_tt_local_entry_put(tt_local_entry); + /* drop reference of remove hash entry */ + tt_removed_entry = hlist_entry(tt_removed_node, + struct batadv_tt_local_entry, + common.hash_entry); + batadv_tt_local_entry_put(tt_removed_entry); out: if (tt_local_entry) -- 2.19.1