net: convert sock.sk_wmem_alloc from atomic_t to refcount_t
refcount_t type and corresponding API should be used instead of atomic_t when the variable is used as a reference counter. This allows to avoid accidental refcounter overflows that might lead to use-after-free situations. Signed-off-by: Elena Reshetova <elena.reshetova@intel.com> Signed-off-by: Hans Liljestrand <ishkamiel@gmail.com> Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: David Windsor <dwindsor@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:

committed by
David S. Miller

parent
2638595afc
commit
14afee4b60
@@ -53,7 +53,7 @@ static void rxrpc_sock_destructor(struct sock *);
|
||||
*/
|
||||
static inline int rxrpc_writable(struct sock *sk)
|
||||
{
|
||||
return atomic_read(&sk->sk_wmem_alloc) < (size_t) sk->sk_sndbuf;
|
||||
return refcount_read(&sk->sk_wmem_alloc) < (size_t) sk->sk_sndbuf;
|
||||
}
|
||||
|
||||
/*
|
||||
@@ -730,7 +730,7 @@ static void rxrpc_sock_destructor(struct sock *sk)
|
||||
|
||||
rxrpc_purge_queue(&sk->sk_receive_queue);
|
||||
|
||||
WARN_ON(atomic_read(&sk->sk_wmem_alloc));
|
||||
WARN_ON(refcount_read(&sk->sk_wmem_alloc));
|
||||
WARN_ON(!sk_unhashed(sk));
|
||||
WARN_ON(sk->sk_socket);
|
||||
|
||||
|
Reference in New Issue
Block a user