Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp4659939pxv; Tue, 20 Jul 2021 08:45:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwiJuxUNKSa6L5bt2NYOk60j5Q3wcACUDjudumsSFptQ0hluaXBGnfmAnK6gHvtUPCcHKbk X-Received: by 2002:a6b:e504:: with SMTP id y4mr18850995ioc.102.1626795941154; Tue, 20 Jul 2021 08:45:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626795941; cv=none; d=google.com; s=arc-20160816; b=Nr8i6kiZcsAf9AWU8Y96yFioRl1ZZuo/9CjZYZk3jp80GlTFfCjH2KQLJgGc9IYEoJ 6+IwYADA5t3EttGkCh9qNCHplnRdcrPCHXxnJ1kAaGp1Nr6AMpv8obToMZLps2fITNKR XuZ4xckmZ22772KZkdyhLbkSyiqOKgXiv2dzVaLugnl9a0CCHD3NrqMafp9dOK42OptA PNxlEqq1XH1bWRjqo3iTe3KZYQDQi4Sl6c8EQ3VY/qKbO4FEFsaR4Ss9gPyzq86T6830 UbRqtFCrkAu4NSlOh/TMMlug+66irf4xGnBzOIMKy/xTTsgMYtY9wKu5rcjU4NS6kKfm 2SnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:mail-followup-to:message-id:subject:cc:to:from:date; bh=RDxFE0e82CKk51xZoJDzPzKcFMF9Wi4D0NQUutXT+14=; b=u0XC0EhQQMGiSEQUvCKPy+grNTLMkC8dsTIaqiHi+BwJYYc3RZwSYcHUhZ1cG9bpvL 0ZrlZNIhUcSKKgOOmGcakzrHpy41HEMh8OZr1bb1w+k0tj/6i0QzwXVSKLAUhF1Z9syB OCJiVwPV0kqMzHHUv5WESoWsurwcW0LAjcIyCQbBket4g3DhgfGn1VJn2gRS3bLH7e2c A0YvkYD8Q2jiptVEqO09d2rpd/1o8NN4jc7uODrZWGb4zKgHN1k7TRpFAeF5+Qol2eFc BLJtsOvBWE3s2ZLghZq4Br2JwQTaX57UNf/tKWM3xkmVLDexx9jKhMpo0XzqEMBlJGjw IgRg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z15si13539216ilh.22.2021.07.20.08.45.28; Tue, 20 Jul 2021 08:45:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242262AbhGTPA2 (ORCPT + 99 others); Tue, 20 Jul 2021 11:00:28 -0400 Received: from mga12.intel.com ([192.55.52.136]:15550 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241911AbhGTO5G (ORCPT ); Tue, 20 Jul 2021 10:57:06 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10050"; a="190846215" X-IronPort-AV: E=Sophos;i="5.84,255,1620716400"; d="scan'208";a="190846215" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Jul 2021 08:37:05 -0700 X-IronPort-AV: E=Sophos;i="5.84,255,1620716400"; d="scan'208";a="469799017" Received: from lesliemu-mobl1.amr.corp.intel.com (HELO intel.com) ([10.252.136.56]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Jul 2021 08:37:04 -0700 Date: Tue, 20 Jul 2021 08:37:00 -0700 From: Ben Widawsky To: Xiyu Yang Cc: Andrew Morton , Feng Tang , Mike Kravetz , Muchun Song , Yanfei Xu , linux-kernel@vger.kernel.org, linux-mm@kvack.org, yuanxzhang@fudan.edu.cn, Xin Tan Subject: Re: [PATCH] mm/mempolicy: Convert from atomic_t to refcount_t on mempolicy->refcnt Message-ID: <20210720153700.tqq4d7fronda42ro@intel.com> Mail-Followup-To: Xiyu Yang , Andrew Morton , Feng Tang , Mike Kravetz , Muchun Song , Yanfei Xu , linux-kernel@vger.kernel.org, linux-mm@kvack.org, yuanxzhang@fudan.edu.cn, Xin Tan References: <1626683671-64407-1-git-send-email-xiyuyang19@fudan.edu.cn> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1626683671-64407-1-git-send-email-xiyuyang19@fudan.edu.cn> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 21-07-19 16:34:28, Xiyu Yang wrote: > refcount_t type and corresponding API can protect refcounters from > accidental underflow and overflow and further use-after-free situations. > > Signed-off-by: Xiyu Yang > Signed-off-by: Xin Tan lgtm Acked-by: Ben Widawsky > --- > include/linux/mempolicy.h | 5 +++-- > mm/mempolicy.c | 8 ++++---- > 2 files changed, 7 insertions(+), 6 deletions(-) > > diff --git a/include/linux/mempolicy.h b/include/linux/mempolicy.h > index 0aaf91b496e2..faec94994eb7 100644 > --- a/include/linux/mempolicy.h > +++ b/include/linux/mempolicy.h > @@ -6,6 +6,7 @@ > #ifndef _LINUX_MEMPOLICY_H > #define _LINUX_MEMPOLICY_H 1 > > +#include > #include > #include > #include > @@ -43,7 +44,7 @@ struct mm_struct; > * to 1, representing the caller of mpol_dup(). > */ > struct mempolicy { > - atomic_t refcnt; > + refcount_t refcnt; > unsigned short mode; /* See MPOL_* above */ > unsigned short flags; /* See set_mempolicy() MPOL_F_* above */ > nodemask_t nodes; /* interleave/bind/perfer */ > @@ -94,7 +95,7 @@ static inline struct mempolicy *mpol_dup(struct mempolicy *pol) > static inline void mpol_get(struct mempolicy *pol) > { > if (pol) > - atomic_inc(&pol->refcnt); > + refcount_inc(&pol->refcnt); > } > > extern bool __mpol_equal(struct mempolicy *a, struct mempolicy *b); > diff --git a/mm/mempolicy.c b/mm/mempolicy.c > index e32360e90274..829a14f34b43 100644 > --- a/mm/mempolicy.c > +++ b/mm/mempolicy.c > @@ -298,7 +298,7 @@ static struct mempolicy *mpol_new(unsigned short mode, unsigned short flags, > policy = kmem_cache_alloc(policy_cache, GFP_KERNEL); > if (!policy) > return ERR_PTR(-ENOMEM); > - atomic_set(&policy->refcnt, 1); > + refcount_set(&policy->refcnt, 1); > policy->mode = mode; > policy->flags = flags; > > @@ -308,7 +308,7 @@ static struct mempolicy *mpol_new(unsigned short mode, unsigned short flags, > /* Slow path of a mpol destructor. */ > void __mpol_put(struct mempolicy *p) > { > - if (!atomic_dec_and_test(&p->refcnt)) > + if (!refcount_dec_and_test(&p->refcnt)) > return; > kmem_cache_free(policy_cache, p); > } > @@ -2290,7 +2290,7 @@ struct mempolicy *__mpol_dup(struct mempolicy *old) > nodemask_t mems = cpuset_mems_allowed(current); > mpol_rebind_policy(new, &mems); > } > - atomic_set(&new->refcnt, 1); > + refcount_set(&new->refcnt, 1); > return new; > } > > @@ -2581,7 +2581,7 @@ static int shared_policy_replace(struct shared_policy *sp, unsigned long start, > goto alloc_new; > > *mpol_new = *n->policy; > - atomic_set(&mpol_new->refcnt, 1); > + refcount_set(&mpol_new->refcnt, 1); > sp_node_init(n_new, end, n->end, mpol_new); > n->end = start; > sp_insert(sp, n_new); > -- > 2.7.4 >