forked from luck/tmp_suning_uos_patched
net: convert (struct ubuf_info)->refcnt to refcount_t
refcount_t type and corresponding API should be used instead of atomic_t when the variable is used as a reference counter. This allows to avoid accidental refcounter overflows that might lead to use-after-free situations. v2: added the change in drivers/vhost/net.c as spotted by Willem. Signed-off-by: Eric Dumazet <edumazet@google.com> Acked-by: Willem de Bruijn <willemb@google.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
db5bce32fb
commit
c1d1b43781
|
@ -533,7 +533,7 @@ static void handle_tx(struct vhost_net *net)
|
|||
ubuf->callback = vhost_zerocopy_callback;
|
||||
ubuf->ctx = nvq->ubufs;
|
||||
ubuf->desc = nvq->upend_idx;
|
||||
atomic_set(&ubuf->refcnt, 1);
|
||||
refcount_set(&ubuf->refcnt, 1);
|
||||
msg.msg_control = ubuf;
|
||||
msg.msg_controllen = sizeof(ubuf);
|
||||
ubufs = nvq->ubufs;
|
||||
|
|
|
@ -22,6 +22,7 @@
|
|||
#include <linux/cache.h>
|
||||
#include <linux/rbtree.h>
|
||||
#include <linux/socket.h>
|
||||
#include <linux/refcount.h>
|
||||
|
||||
#include <linux/atomic.h>
|
||||
#include <asm/types.h>
|
||||
|
@ -456,7 +457,7 @@ struct ubuf_info {
|
|||
u32 bytelen;
|
||||
};
|
||||
};
|
||||
atomic_t refcnt;
|
||||
refcount_t refcnt;
|
||||
|
||||
struct mmpin {
|
||||
struct user_struct *user;
|
||||
|
@ -472,7 +473,7 @@ struct ubuf_info *sock_zerocopy_realloc(struct sock *sk, size_t size,
|
|||
|
||||
static inline void sock_zerocopy_get(struct ubuf_info *uarg)
|
||||
{
|
||||
atomic_inc(&uarg->refcnt);
|
||||
refcount_inc(&uarg->refcnt);
|
||||
}
|
||||
|
||||
void sock_zerocopy_put(struct ubuf_info *uarg);
|
||||
|
|
|
@ -963,7 +963,7 @@ struct ubuf_info *sock_zerocopy_alloc(struct sock *sk, size_t size)
|
|||
uarg->len = 1;
|
||||
uarg->bytelen = size;
|
||||
uarg->zerocopy = 1;
|
||||
atomic_set(&uarg->refcnt, 1);
|
||||
refcount_set(&uarg->refcnt, 1);
|
||||
sock_hold(sk);
|
||||
|
||||
return uarg;
|
||||
|
@ -1086,7 +1086,7 @@ EXPORT_SYMBOL_GPL(sock_zerocopy_callback);
|
|||
|
||||
void sock_zerocopy_put(struct ubuf_info *uarg)
|
||||
{
|
||||
if (uarg && atomic_dec_and_test(&uarg->refcnt)) {
|
||||
if (uarg && refcount_dec_and_test(&uarg->refcnt)) {
|
||||
if (uarg->callback)
|
||||
uarg->callback(uarg, uarg->zerocopy);
|
||||
else
|
||||
|
@ -1483,7 +1483,7 @@ int pskb_expand_head(struct sk_buff *skb, int nhead, int ntail,
|
|||
if (skb_orphan_frags(skb, gfp_mask))
|
||||
goto nofrags;
|
||||
if (skb_zcopy(skb))
|
||||
atomic_inc(&skb_uarg(skb)->refcnt);
|
||||
refcount_inc(&skb_uarg(skb)->refcnt);
|
||||
for (i = 0; i < skb_shinfo(skb)->nr_frags; i++)
|
||||
skb_frag_ref(skb, i);
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user