diff options
author | 2025-07-15 12:49:00 -0700 | |
---|---|---|
committer | 2025-08-05 16:45:40 -0700 | |
commit | fdd015de767977f21892329af5e12276eb80375f (patch) | |
tree | ad69d55fe185710272fad4dd21142d12aaa1abd5 /tools/perf/scripts/python | |
parent | NFS/localio: nfs_close_local_fh() fix check for file closed (diff) | |
download | wireguard-linux-fdd015de767977f21892329af5e12276eb80375f.tar.xz wireguard-linux-fdd015de767977f21892329af5e12276eb80375f.zip |
NFS/localio: nfs_uuid_put() fix races with nfs_open/close_local_fh()
In order for the wait in nfs_uuid_put() to be safe, it is necessary to
ensure that nfs_uuid_add_file() doesn't add a new entry once the
nfs_uuid->net has been NULLed out.
Also fix up the wake_up_var_locked() / wait_var_event_spinlock() to both
use the nfs_uuid address, since nfl, and &nfl->uuid could be used elsewhere.
Acked-by: Mike Snitzer <snitzer@kernel.org>
Tested-by: Mike Snitzer <snitzer@kernel.org>
Link: https://lore.kernel.org/all/175262893035.2234665.1735173020338594784@noble.neil.brown.name/
Fixes: 21fb44034695 ("nfs_localio: protect race between nfs_uuid_put() and nfs_close_local_fh()")
Signed-off-by: Trond Myklebust <trond.myklebust@hammerspace.com>
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions