Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp849838ybi; Fri, 12 Jul 2019 05:41:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqywwHn4FJBwYmO47BKI50dAfUfwCush6ig17ytRzfnHBkvQFWcr3zYxtCj/EfMZ2hUqqxsv X-Received: by 2002:a17:90a:2343:: with SMTP id f61mr11703148pje.130.1562935265709; Fri, 12 Jul 2019 05:41:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562935265; cv=none; d=google.com; s=arc-20160816; b=BeVh3bz4UAawW7P3JUiPzgv2x6aMR/ZjCADiydbhaWHNLKywnWOjBmiZBxrz6mJ4oV oOc8dCPwySNvVIpZcyVd1pHrW20+kjvP7SSZe0iOtX4M+GNjLeGvcvm+fH2VEEmRv7Oc BgyY5KBTlZAgzs87E2H7+MJCbQGkV7FHcEvjKIZp67h2YjN/OS/ZhVx8XRrS8BMkYpfW wSVbM5TIZzG+i23jc07kTQyg0cGE+i6AyfdIB0Udu4MWPtq0NFDoAx1JvJXeCuQ8Kjqi QV0SjvkzVbKFlFiPxhdSA/IYXN1kbjbIEpulm62AFBCgdUFRrY98jrayDgoRJGg1Nrvk RC6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bKyZLO88uWmA/i9fn8lYnZss3RiaQN9gG5gWq9EJaik=; b=frs3rjAWgZdPE4D0XKyLjZlK/nxTmpWZ5haiekj4wo8J99aA4g66/szAz0P4lRPFVa dfGdSChTB4fS+a7shJe4UzVWOS/hCvFItw39gd44L8UMdfg5KUQuf9+JChCKwsNO10F+ MUTFySzLUknUmW1NArh8qpXtjf4ALmNFPhDQi5jvSIT7yU0zZEmGF+MyYFbfKjtbvzDf ohX+F36AKuVPfXQQEWk6EIrknxdmwmuZSn3XCdjdSe4KClMG4ul2Z/s9Ts5JrbRu/FdT b1+kZSMjVwZq/HsdEtshYmD1eoLw+6uQOI9OngYENd1ly/FtG2zi8laHNp1m3OW5iU2U Sa2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qyZWZjRw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h18si7577517pjt.9.2019.07.12.05.40.50; Fri, 12 Jul 2019 05:41:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qyZWZjRw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728221AbfGLM1l (ORCPT + 99 others); Fri, 12 Jul 2019 08:27:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:40384 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728629AbfGLM1h (ORCPT ); Fri, 12 Jul 2019 08:27:37 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 646B82084B; Fri, 12 Jul 2019 12:27:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562934456; bh=WlUI2zBQ37TDeNkfKHsamyvVlp/7aovcYPTzZDhUYwQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qyZWZjRwClSGHrSrxXliiJd4b4AWBbwRu/2pBRGRHOiirAIxF/9cfP/1w9ZnsBfQh aXCkjXZprqFUMgNEwRV7P481hCepgu+JjZOIU669hKJ2i95+8hXF30nHZp4WtraHu0 rnszobMS9BYKJBt98fbzegdqFL5CWAvD1JjBHrEw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhi Chen , Yibo Zhao , Johannes Berg , Sasha Levin Subject: [PATCH 5.1 060/138] mac80211: only warn once on chanctx_conf being NULL Date: Fri, 12 Jul 2019 14:18:44 +0200 Message-Id: <20190712121630.981021750@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190712121628.731888964@linuxfoundation.org> References: <20190712121628.731888964@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 563572340173865a9a356e6bb02579e6998a876d ] In multiple SSID cases, it takes time to prepare every AP interface to be ready in initializing phase. If a sta already knows everything it needs to join one of the APs and sends authentication to the AP which is not fully prepared at this point of time, AP's channel context could be NULL. As a result, warning message occurs. Even worse, if the AP is under attack via tools such as MDK3 and massive authentication requests are received in a very short time, console will be hung due to kernel warning messages. WARN_ON_ONCE() could be a better way for indicating warning messages without duplicate messages to flood the console. Johannes: We still need to address the underlying problem, but we don't really have a good handle on it yet. Suppress the worst side-effects for now. Signed-off-by: Zhi Chen Signed-off-by: Yibo Zhao [johannes: add note, change subject] Signed-off-by: Johannes Berg Signed-off-by: Sasha Levin --- net/mac80211/ieee80211_i.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/mac80211/ieee80211_i.h b/net/mac80211/ieee80211_i.h index c875d45f1e1d..4118704cb0e7 100644 --- a/net/mac80211/ieee80211_i.h +++ b/net/mac80211/ieee80211_i.h @@ -1434,7 +1434,7 @@ ieee80211_get_sband(struct ieee80211_sub_if_data *sdata) rcu_read_lock(); chanctx_conf = rcu_dereference(sdata->vif.chanctx_conf); - if (WARN_ON(!chanctx_conf)) { + if (WARN_ON_ONCE(!chanctx_conf)) { rcu_read_unlock(); return NULL; } -- 2.20.1