net: convert (struct ubuf_info)->refcnt to refcount_t
authorEric Dumazet <edumazet@google.com>
Thu, 31 Aug 2017 23:48:22 +0000 (16:48 -0700)
committerDavid S. Miller <davem@davemloft.net>
Sat, 2 Sep 2017 03:22:03 +0000 (20:22 -0700)
refcount_t type and corresponding API should be
used instead of atomic_t when the variable is used as
a reference counter. This allows to avoid accidental
refcounter overflows that might lead to use-after-free
situations.

v2: added the change in drivers/vhost/net.c as spotted
by Willem.

Signed-off-by: Eric Dumazet <edumazet@google.com>
Acked-by: Willem de Bruijn <willemb@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
drivers/vhost/net.c
include/linux/skbuff.h
net/core/skbuff.c

index ba08b78..8d2bcae 100644 (file)
@@ -533,7 +533,7 @@ static void handle_tx(struct vhost_net *net)
                        ubuf->callback = vhost_zerocopy_callback;
                        ubuf->ctx = nvq->ubufs;
                        ubuf->desc = nvq->upend_idx;
-                       atomic_set(&ubuf->refcnt, 1);
+                       refcount_set(&ubuf->refcnt, 1);
                        msg.msg_control = ubuf;
                        msg.msg_controllen = sizeof(ubuf);
                        ubufs = nvq->ubufs;
index f93cc01..f751f3b 100644 (file)
@@ -22,6 +22,7 @@
 #include <linux/cache.h>
 #include <linux/rbtree.h>
 #include <linux/socket.h>
+#include <linux/refcount.h>
 
 #include <linux/atomic.h>
 #include <asm/types.h>
@@ -456,7 +457,7 @@ struct ubuf_info {
                        u32 bytelen;
                };
        };
-       atomic_t refcnt;
+       refcount_t refcnt;
 
        struct mmpin {
                struct user_struct *user;
@@ -472,7 +473,7 @@ struct ubuf_info *sock_zerocopy_realloc(struct sock *sk, size_t size,
 
 static inline void sock_zerocopy_get(struct ubuf_info *uarg)
 {
-       atomic_inc(&uarg->refcnt);
+       refcount_inc(&uarg->refcnt);
 }
 
 void sock_zerocopy_put(struct ubuf_info *uarg);
index a003f95..68065d7 100644 (file)
@@ -963,7 +963,7 @@ struct ubuf_info *sock_zerocopy_alloc(struct sock *sk, size_t size)
        uarg->len = 1;
        uarg->bytelen = size;
        uarg->zerocopy = 1;
-       atomic_set(&uarg->refcnt, 1);
+       refcount_set(&uarg->refcnt, 1);
        sock_hold(sk);
 
        return uarg;
@@ -1086,7 +1086,7 @@ EXPORT_SYMBOL_GPL(sock_zerocopy_callback);
 
 void sock_zerocopy_put(struct ubuf_info *uarg)
 {
-       if (uarg && atomic_dec_and_test(&uarg->refcnt)) {
+       if (uarg && refcount_dec_and_test(&uarg->refcnt)) {
                if (uarg->callback)
                        uarg->callback(uarg, uarg->zerocopy);
                else
@@ -1483,7 +1483,7 @@ int pskb_expand_head(struct sk_buff *skb, int nhead, int ntail,
                if (skb_orphan_frags(skb, gfp_mask))
                        goto nofrags;
                if (skb_zcopy(skb))
-                       atomic_inc(&skb_uarg(skb)->refcnt);
+                       refcount_inc(&skb_uarg(skb)->refcnt);
                for (i = 0; i < skb_shinfo(skb)->nr_frags; i++)
                        skb_frag_ref(skb, i);