All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Reshetova, Elena" <elena.reshetova@intel.com>
To: Trond Myklebust <trondmy@primarydata.com>,
	"netdev@vger.kernel.org" <netdev@vger.kernel.org>,
	"jlayton@poochiereds.net" <jlayton@poochiereds.net>
Cc: "herbert@gondor.apana.org.au" <herbert@gondor.apana.org.au>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"peterz@infradead.org" <peterz@infradead.org>,
	"ralf@linux-mips.org" <ralf@linux-mips.org>,
	"linux-rdma@vger.kernel.org" <linux-rdma@vger.kernel.org>,
	"ishkamiel@gmail.com" <ishkamiel@gmail.com>,
	"bfields@fieldses.org" <bfields@fieldses.org>,
	"steffen.klassert@secunet.com" <steffen.klassert@secunet.com>,
	"nhorman@tuxdriver.com" <nhorman@tuxdriver.com>,
	"linux-nfs@vger.kernel.org" <linux-nfs@vger.kernel.org>,
	"jreuter@yaina.de" <jreuter@yaina.de>,
	"keescook@chromium.org" <keescook@chromium.org>,
	"linux-hams@vger.kernel.org" <linux-hams@vger.kernel.org>,
	"dwindsor@gmail.com" <dwindsor@gmail.com>,
	"zyan@redhat.com" <zyan@redhat.com>, sage@redhat.
Subject: RE: [PATCH 01/23] net, sunrpc: convert rpc_cred.cr_count from atomic_t to refcount_t
Date: Mon, 20 Mar 2017 16:15:37 +0000	[thread overview]
Message-ID: <2236FBA76BA1254E88B949DDB74E612B41C5B3C5@IRSMSX102.ger.corp.intel.com> (raw)
In-Reply-To: <1489760913.8441.1.camel@primarydata.com>

> On Fri, 2017-03-17 at 09:02 -0400, Jeff Layton wrote:
> > On Fri, 2017-03-17 at 12:50 +0000, Trond Myklebust wrote:
> > > On Fri, 2017-03-17 at 14:10 +0200, Elena Reshetova wrote:
> > > > refcount_t type and corresponding API should be
> > > > used instead of atomic_t when the variable is used as
> > > > a reference counter. This allows to avoid accidental
> > > > refcounter overflows that might lead to use-after-free
> > > > situations.
> > > >
> > > > Signed-off-by: Elena Reshetova <elena.reshetova@intel.com>
> > > > Signed-off-by: Hans Liljestrand <ishkamiel@gmail.com>
> > > > Signed-off-by: Kees Cook <keescook@chromium.org>
> > > > Signed-off-by: David Windsor <dwindsor@gmail.com>
> > > > ---
> > > >  include/linux/sunrpc/auth.h |  8 ++++----
> > > >  net/sunrpc/auth.c           | 12 ++++++------
> > > >  2 files changed, 10 insertions(+), 10 deletions(-)
> > > >
> > > > diff --git a/include/linux/sunrpc/auth.h
> > > > b/include/linux/sunrpc/auth.h
> > > > index b1bc62b..bd36e0b 100644
> > > > --- a/include/linux/sunrpc/auth.h
> > > > +++ b/include/linux/sunrpc/auth.h
> > > > @@ -15,7 +15,7 @@
> > > >  #include <linux/sunrpc/msg_prot.h>
> > > >  #include <linux/sunrpc/xdr.h>
> > > >
> > > > -#include <linux/atomic.h>
> > > > +#include <linux/refcount.h>
> > > >  #include <linux/rcupdate.h>
> > > >  #include <linux/uidgid.h>
> > > >  #include <linux/utsname.h>
> > > > @@ -68,7 +68,7 @@ struct rpc_cred {
> > > >  #endif
> > > >  	unsigned long		cr_expire;	/* when
> > > > to gc
> > > > */
> > > >  	unsigned long		cr_flags;	/* various
> > > > flags */
> > > > -	atomic_t		cr_count;	/* ref count */
> > > > +	refcount_t		cr_count;	/* ref count
> > > > */
> > > >
> > >
> > > NACK. That's going to be hitting
> > > WARN_ONCE(!refcount_inc_not_zero(r),
> > > "refcount_t: increment on 0; use-after-free.\n") like there's no
> > > tomorrow...
> > >
> > > Please stop with these automated conversions. They are going to
> > > cause a
> > > lot more bugs than they fix.
> > >
> >
> > Agreed. These patchsets are touching places where we've already
> > banged
> > out most of the refcounting bugs. I'm against doing large scale
> > conversions like this without a damned good reason.
> >
> > I think it may be best to do this sort of thing in a more piecemeal
> > fashion. Pick a subsystem or two and do the conversions there to
> > prove
> > that they're better than what we have. If the subsystem already has
> > problems with its refcounting, then so much the better. Point to bugs
> > that this new infrastructure helped find.
> >
> > Encourage people to adopt your new infrastructure as new refcounted
> > objects are introduced into the kernel. You might even consider a LWN
> > article about this.
> >
> > Eventually we'll get around to changing existing code to use it, once
> > there is a sufficient advantage to doing so. Most likely when we're
> > reworking the code for other reasons, or when we're chasing some
> > horrid
> > refcounting bug and think that this might help find it.
> 
> The main issue is that this "refcount_t" implementation appears to be
> assuming that there is one and only one model for refcounts (the one
> where a value of "0" means "free me immediately").
> 
> The kernel has a plethora of object caching implementations where this
> is simply not the case; the dcache is a prime example, and this cache
> is another. In both these implementation, the atomic_t variable is
> being used more as a semaphore-style lock that prevents freeing of the
> object while it is in active use as opposed to being freeable, but
> cached. This is why these automated conversions are a nuisance and a
> source of bugs.

Ok, in this particular patch I agree that we missed that object is being reused 
(and yes there are many parts in kernel where similar thing happens as we learned from this exercise). 
Note that refcount_t implementation is fine with you "correctly" reusing your object:
i.e. when counter reaches zero, you take the object away from active use, but it might still stay in cache. 
BUT when you get a new object from cache you should initialize refcounter properly: set it to one vs. just do a "inc" on it. 
Problem really comes from this "increment me from zero". 

And the goal with these conversions is to take a look broadly on the kernel source and determine (with the feedback from maintainers who know code best, like your feedback now) what can be converted already now. 
Maintainers know their code and their usage of counters, so if it doesn't make sense to do it in a particular place (because of errors or other reasons), then it doesn't. 
But more we cover with new refcount_t, less chances we have with ever hitting refcounter bugs anywhere in the future. 

Best Regards,
Elena.

> 
> --
> Trond Myklebust
> Linux NFS client maintainer, PrimaryData
> trond.myklebust@primarydata.com

WARNING: multiple messages have this Message-ID (diff)
From: "Reshetova, Elena" <elena.reshetova@intel.com>
To: Trond Myklebust <trondmy@primarydata.com>,
	"netdev@vger.kernel.org" <netdev@vger.kernel.org>,
	"jlayton@poochiereds.net" <jlayton@poochiereds.net>
Cc: "herbert@gondor.apana.org.au" <herbert@gondor.apana.org.au>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"peterz@infradead.org" <peterz@infradead.org>,
	"ralf@linux-mips.org" <ralf@linux-mips.org>,
	"linux-rdma@vger.kernel.org" <linux-rdma@vger.kernel.org>,
	"ishkamiel@gmail.com" <ishkamiel@gmail.com>,
	"bfields@fieldses.org" <bfields@fieldses.org>,
	"steffen.klassert@secunet.com" <steffen.klassert@secunet.com>,
	"nhorman@tuxdriver.com" <nhorman@tuxdriver.com>,
	"linux-nfs@vger.kernel.org" <linux-nfs@vger.kernel.org>,
	"jreuter@yaina.de" <jreuter@yaina.de>,
	"keescook@chromium.org" <keescook@chromium.org>,
	"linux-hams@vger.kernel.org" <linux-hams@vger.kernel.org>,
	"dwindsor@gmail.com" <dwindsor@gmail.com>,
	"zyan@redhat.com" <zyan@redhat.com>,
	"sage@redhat.com" <sage@redhat.com>,
	"davem@davemloft.net" <davem@davemloft.net>,
	"linux-sctp@vger.kernel.org" <linux-sctp@vger.kernel.org>,
	"vyasevich@gmail.com" <vyasevich@gmail.com>,
	"linux-x25@vger.kernel.org" <linux-x25@vger.kernel.org>,
	"santosh.shilimkar@oracle.com" <santosh.shilimkar@oracle.com>,
	"ceph-devel@vger.kernel.org" <ceph-devel@vger.kernel.org>
Subject: RE: [PATCH 01/23] net, sunrpc: convert rpc_cred.cr_count from atomic_t to refcount_t
Date: Mon, 20 Mar 2017 16:15:37 +0000	[thread overview]
Message-ID: <2236FBA76BA1254E88B949DDB74E612B41C5B3C5@IRSMSX102.ger.corp.intel.com> (raw)
In-Reply-To: <1489760913.8441.1.camel@primarydata.com>

> On Fri, 2017-03-17 at 09:02 -0400, Jeff Layton wrote:
> > On Fri, 2017-03-17 at 12:50 +0000, Trond Myklebust wrote:
> > > On Fri, 2017-03-17 at 14:10 +0200, Elena Reshetova wrote:
> > > > refcount_t type and corresponding API should be
> > > > used instead of atomic_t when the variable is used as
> > > > a reference counter. This allows to avoid accidental
> > > > refcounter overflows that might lead to use-after-free
> > > > situations.
> > > >
> > > > Signed-off-by: Elena Reshetova <elena.reshetova@intel.com>
> > > > Signed-off-by: Hans Liljestrand <ishkamiel@gmail.com>
> > > > Signed-off-by: Kees Cook <keescook@chromium.org>
> > > > Signed-off-by: David Windsor <dwindsor@gmail.com>
> > > > ---
> > > >  include/linux/sunrpc/auth.h |  8 ++++----
> > > >  net/sunrpc/auth.c           | 12 ++++++------
> > > >  2 files changed, 10 insertions(+), 10 deletions(-)
> > > >
> > > > diff --git a/include/linux/sunrpc/auth.h
> > > > b/include/linux/sunrpc/auth.h
> > > > index b1bc62b..bd36e0b 100644
> > > > --- a/include/linux/sunrpc/auth.h
> > > > +++ b/include/linux/sunrpc/auth.h
> > > > @@ -15,7 +15,7 @@
> > > >  #include <linux/sunrpc/msg_prot.h>
> > > >  #include <linux/sunrpc/xdr.h>
> > > >
> > > > -#include <linux/atomic.h>
> > > > +#include <linux/refcount.h>
> > > >  #include <linux/rcupdate.h>
> > > >  #include <linux/uidgid.h>
> > > >  #include <linux/utsname.h>
> > > > @@ -68,7 +68,7 @@ struct rpc_cred {
> > > >  #endif
> > > >  	unsigned long		cr_expire;	/* when
> > > > to gc
> > > > */
> > > >  	unsigned long		cr_flags;	/* various
> > > > flags */
> > > > -	atomic_t		cr_count;	/* ref count */
> > > > +	refcount_t		cr_count;	/* ref count
> > > > */
> > > >
> > >
> > > NACK. That's going to be hitting
> > > WARN_ONCE(!refcount_inc_not_zero(r),
> > > "refcount_t: increment on 0; use-after-free.\n") like there's no
> > > tomorrow...
> > >
> > > Please stop with these automated conversions. They are going to
> > > cause a
> > > lot more bugs than they fix.
> > >
> >
> > Agreed. These patchsets are touching places where we've already
> > banged
> > out most of the refcounting bugs. I'm against doing large scale
> > conversions like this without a damned good reason.
> >
> > I think it may be best to do this sort of thing in a more piecemeal
> > fashion. Pick a subsystem or two and do the conversions there to
> > prove
> > that they're better than what we have. If the subsystem already has
> > problems with its refcounting, then so much the better. Point to bugs
> > that this new infrastructure helped find.
> >
> > Encourage people to adopt your new infrastructure as new refcounted
> > objects are introduced into the kernel. You might even consider a LWN
> > article about this.
> >
> > Eventually we'll get around to changing existing code to use it, once
> > there is a sufficient advantage to doing so. Most likely when we're
> > reworking the code for other reasons, or when we're chasing some
> > horrid
> > refcounting bug and think that this might help find it.
> 
> The main issue is that this "refcount_t" implementation appears to be
> assuming that there is one and only one model for refcounts (the one
> where a value of "0" means "free me immediately").
> 
> The kernel has a plethora of object caching implementations where this
> is simply not the case; the dcache is a prime example, and this cache
> is another. In both these implementation, the atomic_t variable is
> being used more as a semaphore-style lock that prevents freeing of the
> object while it is in active use as opposed to being freeable, but
> cached. This is why these automated conversions are a nuisance and a
> source of bugs.

Ok, in this particular patch I agree that we missed that object is being reused 
(and yes there are many parts in kernel where similar thing happens as we learned from this exercise). 
Note that refcount_t implementation is fine with you "correctly" reusing your object:
i.e. when counter reaches zero, you take the object away from active use, but it might still stay in cache. 
BUT when you get a new object from cache you should initialize refcounter properly: set it to one vs. just do a "inc" on it. 
Problem really comes from this "increment me from zero". 

And the goal with these conversions is to take a look broadly on the kernel source and determine (with the feedback from maintainers who know code best, like your feedback now) what can be converted already now. 
Maintainers know their code and their usage of counters, so if it doesn't make sense to do it in a particular place (because of errors or other reasons), then it doesn't. 
But more we cover with new refcount_t, less chances we have with ever hitting refcounter bugs anywhere in the future. 

Best Regards,
Elena.

> 
> --
> Trond Myklebust
> Linux NFS client maintainer, PrimaryData
> trond.myklebust@primarydata.com

WARNING: multiple messages have this Message-ID (diff)
From: "Reshetova, Elena" <elena.reshetova@intel.com>
To: Trond Myklebust <trondmy@primarydata.com>,
	"netdev@vger.kernel.org" <netdev@vger.kernel.org>,
	"jlayton@poochiereds.net" <jlayton@poochiereds.net>
Cc: "herbert@gondor.apana.org.au" <herbert@gondor.apana.org.au>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"peterz@infradead.org" <peterz@infradead.org>,
	"ralf@linux-mips.org" <ralf@linux-mips.org>,
	"linux-rdma@vger.kernel.org" <linux-rdma@vger.kernel.org>,
	"ishkamiel@gmail.com" <ishkamiel@gmail.com>,
	"bfields@fieldses.org" <bfields@fieldses.org>,
	"steffen.klassert@secunet.com" <steffen.klassert@secunet.com>,
	"nhorman@tuxdriver.com" <nhorman@tuxdriver.com>,
	"linux-nfs@vger.kernel.org" <linux-nfs@vger.kernel.org>,
	"jreuter@yaina.de" <jreuter@yaina.de>,
	"keescook@chromium.org" <keescook@chromium.org>,
	"linux-hams@vger.kernel.org" <linux-hams@vger.kernel.org>,
	"dwindsor@gmail.com" <dwindsor@gmail.com>,
	"zyan@redhat.com" <zyan@redhat.com>, sage@redhat.
Subject: RE: [PATCH 01/23] net, sunrpc: convert rpc_cred.cr_count from atomic_t to refcount_t
Date: Mon, 20 Mar 2017 16:15:37 +0000	[thread overview]
Message-ID: <2236FBA76BA1254E88B949DDB74E612B41C5B3C5@IRSMSX102.ger.corp.intel.com> (raw)
In-Reply-To: <1489760913.8441.1.camel@primarydata.com>
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WARNING: multiple messages have this Message-ID (diff)
From: "Reshetova, Elena" <elena.reshetova@intel.com>
To: Trond Myklebust <trondmy@primarydata.com>,
	"netdev@vger.kernel.org" <netdev@vger.kernel.org>,
	"jlayton@poochiereds.net" <jlayton@poochiereds.net>
Cc: "herbert@gondor.apana.org.au" <herbert@gondor.apana.org.au>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"peterz@infradead.org" <peterz@infradead.org>,
	"ralf@linux-mips.org" <ralf@linux-mips.org>,
	"linux-rdma@vger.kernel.org" <linux-rdma@vger.kernel.org>,
	"ishkamiel@gmail.com" <ishkamiel@gmail.com>,
	"bfields@fieldses.org" <bfields@fieldses.org>,
	"steffen.klassert@secunet.com" <steffen.klassert@secunet.com>,
	"nhorman@tuxdriver.com" <nhorman@tuxdriver.com>,
	"linux-nfs@vger.kernel.org" <linux-nfs@vger.kernel.org>,
	"jreuter@yaina.de" <jreuter@yaina.de>,
	"keescook@chromium.org" <keescook@chromium.org>,
	"linux-hams@vger.kernel.org" <linux-hams@vger.kernel.org>,
	"dwindsor@gmail.com" <dwindsor@gmail.com>,
	"zyan@redhat.com" <zyan@redhat.com>,
	"sage@redhat.com" <sage@redhat.com>,
	"davem@davemloft.net" <davem@davemloft.net>,
	"linux-sctp@vger.kernel.org" <linux-sctp@vger.kernel.org>,
	"vyasevich@gmail.com" <vyasevich@gmail.com>,
	"linux-x25@vger.kernel.org" <linux-x25@vger.kernel.org>,
	"santosh.shilimkar@oracle.com" <santosh.shilimkar@oracle.com>,
	"ceph-devel@vger.kernel.org" <ceph-devel@vger.kernel.org>
Subject: RE: [PATCH 01/23] net, sunrpc: convert rpc_cred.cr_count from atomic_t to refcount_t
Date: Mon, 20 Mar 2017 16:15:37 +0000	[thread overview]
Message-ID: <2236FBA76BA1254E88B949DDB74E612B41C5B3C5@IRSMSX102.ger.corp.intel.com> (raw)
In-Reply-To: <1489760913.8441.1.camel@primarydata.com>
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  reply	other threads:[~2017-03-20 16:15 UTC|newest]

Thread overview: 80+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-03-17 12:10 [PATCH 00/23] various networking refcount conversions, part 2 Elena Reshetova
2017-03-17 12:10 ` Elena Reshetova
2017-03-17 12:10 ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 01/23] net, sunrpc: convert rpc_cred.cr_count from atomic_t to refcount_t Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
     [not found]   ` <1489752646-8749-2-git-send-email-elena.reshetova-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2017-03-17 12:50     ` Trond Myklebust
2017-03-17 12:50       ` Trond Myklebust
2017-03-17 12:50       ` Trond Myklebust
2017-03-17 12:50       ` Trond Myklebust
2017-03-17 12:50       ` Trond Myklebust
2017-03-17 13:02       ` Jeff Layton
2017-03-17 13:02         ` Jeff Layton
2017-03-17 13:02         ` Jeff Layton
     [not found]         ` <1489755736.2810.10.camel-vpEMnDpepFuMZCB2o+C8xQ@public.gmane.org>
2017-03-17 14:28           ` Trond Myklebust
2017-03-17 14:28             ` Trond Myklebust
2017-03-17 14:28             ` Trond Myklebust
2017-03-17 14:28             ` Trond Myklebust
2017-03-20 16:15             ` Reshetova, Elena [this message]
2017-03-20 16:15               ` Reshetova, Elena
2017-03-20 16:15               ` Reshetova, Elena
2017-03-20 16:15               ` Reshetova, Elena
2017-03-17 12:10 ` [PATCH 02/23] net, sunrpc: convert gss_cl_ctx.count " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 03/23] net, sunrpc: convert gss_upcall_msg.count " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 04/23] net, ceph: convert ceph_snap_context.nref " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-24 13:20   ` Ilya Dryomov
2017-03-24 13:20     ` Ilya Dryomov
2017-03-17 12:10 ` [PATCH 05/23] net, ceph: convert ceph_osd.o_ref " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
     [not found]   ` <1489752646-8749-6-git-send-email-elena.reshetova-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2017-03-24 13:49     ` Ilya Dryomov
2017-03-24 13:49       ` Ilya Dryomov
2017-03-24 13:49       ` Ilya Dryomov
2017-03-17 12:10 ` [PATCH 06/23] net, ceph: convert ceph_pagelist.refcnt " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
     [not found]   ` <1489752646-8749-7-git-send-email-elena.reshetova-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2017-03-24 13:49     ` Ilya Dryomov
2017-03-24 13:49       ` Ilya Dryomov
2017-03-24 13:49       ` Ilya Dryomov
2017-03-17 12:10 ` [PATCH 07/23] net, rds: convert rds_ib_device.refcount " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 08/23] net, rds: convert rds_incoming.i_refcount " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 09/23] net, rds: convert rds_mr.r_refcount " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 11/23] net, x25: convert x25_route.refcnt " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 12/23] net, x25: convert x25_neigh.refcnt " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 15/23] net, xfrm: convert sec_path.refcnt " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 16/23] net, sctp: convert sctp_auth_bytes.refcnt " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 17/23] net, sctp: convert sctp_datamsg.refcnt " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 20/23] net, sctp: convert sctp_ep_common.refcnt " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova
     [not found] ` <1489752646-8749-1-git-send-email-elena.reshetova-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2017-03-17 12:10   ` [PATCH 10/23] net, rds: convert rds_message.m_refcount " Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10   ` [PATCH 13/23] net, xfrm: convert xfrm_state.refcnt " Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10   ` [PATCH 14/23] net, xfrm: convert xfrm_policy.refcnt " Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10   ` [PATCH 18/23] net, sctp: convert sctp_chunk.refcnt " Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10   ` [PATCH 19/23] net, sctp: convert sctp_transport.refcnt " Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10   ` [PATCH 21/23] net, ax25: convert ax25_uid_assoc.refcount " Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10   ` [PATCH 22/23] net, ax25: convert ax25_route.refcount " Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10     ` Elena Reshetova
2017-03-17 12:10 ` [PATCH 23/23] net, ax25: convert ax25_cb.refcount " Elena Reshetova
2017-03-17 12:10   ` Elena Reshetova

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2236FBA76BA1254E88B949DDB74E612B41C5B3C5@IRSMSX102.ger.corp.intel.com \
    --to=elena.reshetova@intel.com \
    --cc=bfields@fieldses.org \
    --cc=dwindsor@gmail.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=ishkamiel@gmail.com \
    --cc=jlayton@poochiereds.net \
    --cc=jreuter@yaina.de \
    --cc=keescook@chromium.org \
    --cc=linux-hams@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-nfs@vger.kernel.org \
    --cc=linux-rdma@vger.kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=nhorman@tuxdriver.com \
    --cc=peterz@infradead.org \
    --cc=ralf@linux-mips.org \
    --cc=sage@redhat. \
    --cc=steffen.klassert@secunet.com \
    --cc=trondmy@primarydata.com \
    --cc=zyan@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.