diff options
author | 2025-06-01 14:23:52 -0400 | |
---|---|---|
committer | 2025-06-07 00:37:38 -0400 | |
commit | 1f282cdc1d219c4a557f7009e81bc792820d9d9a (patch) | |
tree | 06c228aaf056a1e93d2fb6f353bc780c8a06cbbe /tools/perf/scripts/python/export-to-postgresql.py | |
parent | Merge tag 'pull-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs (diff) | |
download | linux-rng-1f282cdc1d219c4a557f7009e81bc792820d9d9a.tar.xz linux-rng-1f282cdc1d219c4a557f7009e81bc792820d9d9a.zip |
fs/fhandle.c: fix a race in call of has_locked_children()
may_decode_fh() is calling has_locked_children() while holding no locks.
That's an oopsable race...
The rest of the callers are safe since they are holding namespace_sem and
are guaranteed a positive refcount on the mount in question.
Rename the current has_locked_children() to __has_locked_children(), make
it static and switch the fs/namespace.c users to it.
Make has_locked_children() a wrapper for __has_locked_children(), calling
the latter under read_seqlock_excl(&mount_lock).
Reviewed-by: Christian Brauner <brauner@kernel.org>
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Fixes: 620c266f3949 ("fhandle: relax open_by_handle_at() permission checks")
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to '')
0 files changed, 0 insertions, 0 deletions