Searched hist:"8 c9814b97002f61846ebf3048e8df5aae52f7828" (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/include/net/ |
H A D | af_unix.h | diff 8c9814b97002f61846ebf3048e8df5aae52f7828 Fri Jun 30 05:08:05 CDT 2017 Reshetova, Elena <elena.reshetova@intel.com> net: convert unix_address.refcnt from atomic_t to refcount_t
refcount_t type and corresponding API should be used instead of atomic_t when the variable is used as a reference counter. This allows to avoid accidental refcounter overflows that might lead to use-after-free situations.
Signed-off-by: Elena Reshetova <elena.reshetova@intel.com> Signed-off-by: Hans Liljestrand <ishkamiel@gmail.com> Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: David Windsor <dwindsor@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/unix/ |
H A D | af_unix.c | diff 8c9814b97002f61846ebf3048e8df5aae52f7828 Fri Jun 30 05:08:05 CDT 2017 Reshetova, Elena <elena.reshetova@intel.com> net: convert unix_address.refcnt from atomic_t to refcount_t
refcount_t type and corresponding API should be used instead of atomic_t when the variable is used as a reference counter. This allows to avoid accidental refcounter overflows that might lead to use-after-free situations.
Signed-off-by: Elena Reshetova <elena.reshetova@intel.com> Signed-off-by: Hans Liljestrand <ishkamiel@gmail.com> Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: David Windsor <dwindsor@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|