[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190306110549.7628-1-elena.reshetova@intel.com>
Date: Wed, 6 Mar 2019 13:05:46 +0200
From: Elena Reshetova <elena.reshetova@...el.com>
To: ebiederm@...ssion.com
Cc: serue@...ibm.com, keescook@...omium.org, peterz@...radead.org,
linux-kernel@...r.kernel.org,
Elena Reshetova <elena.reshetova@...el.com>
Subject: [PATCH 0/3] creds/cgroups/ns_proxy refcount_t conversions
I would like to reopen ages-old discussion on these conversions now.
Eric had objections against them in past, namely on not providing enough
security for reference counters (but we still argue it is better
than overflowing atomic_t and resulting use-after-free).
However now, refcount_t has been successfully used in kernel in many places,
helped to detect bugs and mistakes in logic of refcounters.
We have converted most of core kernel reference counters by now and these
3 are pretty core ones, so it would be really great to have them covered
also.
The patches are fully independent and can be cherry-picked and
discussed separately. More information about each conversion in each patch
separately.
Elena Reshetova (3):
nsproxy: convert nsproxy.count to refcount_t
groups: convert group_info.usage to refcount_t
creds: convert cred.usage to refcount_t
include/linux/cred.h | 15 +++++++-------
include/linux/nsproxy.h | 6 +++---
kernel/cred.c | 44 ++++++++++++++++++++---------------------
kernel/groups.c | 2 +-
kernel/nsproxy.c | 6 +++---
net/sunrpc/auth.c | 2 +-
6 files changed, 38 insertions(+), 37 deletions(-)
--
2.17.1
Powered by blists - more mailing lists