Searched hist:"1 cc9a98b59ba92fece1277f76aa43e05f34936a6" (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/include/net/ |
H A D | inetpeer.h | diff 1cc9a98b59ba92fece1277f76aa43e05f34936a6 Fri Jun 30 05:07:54 CDT 2017 Reshetova, Elena <elena.reshetova@intel.com> net: convert inet_peer.refcnt from atomic_t to refcount_t
refcount_t type and corresponding API should be used instead of atomic_t when the variable is used as a reference counter. This allows to avoid accidental refcounter overflows that might lead to use-after-free situations. This conversion requires overall +1 on the whole refcounting scheme.
Signed-off-by: Elena Reshetova <elena.reshetova@intel.com> Signed-off-by: Hans Liljestrand <ishkamiel@gmail.com> Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: David Windsor <dwindsor@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/ipv4/ |
H A D | inetpeer.c | diff 1cc9a98b59ba92fece1277f76aa43e05f34936a6 Fri Jun 30 05:07:54 CDT 2017 Reshetova, Elena <elena.reshetova@intel.com> net: convert inet_peer.refcnt from atomic_t to refcount_t
refcount_t type and corresponding API should be used instead of atomic_t when the variable is used as a reference counter. This allows to avoid accidental refcounter overflows that might lead to use-after-free situations. This conversion requires overall +1 on the whole refcounting scheme.
Signed-off-by: Elena Reshetova <elena.reshetova@intel.com> Signed-off-by: Hans Liljestrand <ishkamiel@gmail.com> Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: David Windsor <dwindsor@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|