summaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/exported-sql-viewer.py
diff options
context:
space:
mode:
authorAl Viro <viro@zeniv.linux.org.uk>2025-06-01 21:23:52 +0300
committerAl Viro <viro@zeniv.linux.org.uk>2025-06-07 07:37:38 +0300
commit1f282cdc1d219c4a557f7009e81bc792820d9d9a (patch)
tree06c228aaf056a1e93d2fb6f353bc780c8a06cbbe /tools/perf/scripts/python/exported-sql-viewer.py
parenta82ba839915926f8713183fd023c6d9357bae26c (diff)
downloadlinux-1f282cdc1d219c4a557f7009e81bc792820d9d9a.tar.xz
fs/fhandle.c: fix a race in call of has_locked_children()
may_decode_fh() is calling has_locked_children() while holding no locks. That's an oopsable race... The rest of the callers are safe since they are holding namespace_sem and are guaranteed a positive refcount on the mount in question. Rename the current has_locked_children() to __has_locked_children(), make it static and switch the fs/namespace.c users to it. Make has_locked_children() a wrapper for __has_locked_children(), calling the latter under read_seqlock_excl(&mount_lock). Reviewed-by: Christian Brauner <brauner@kernel.org> Reviewed-by: Jeff Layton <jlayton@kernel.org> Fixes: 620c266f3949 ("fhandle: relax open_by_handle_at() permission checks") Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'tools/perf/scripts/python/exported-sql-viewer.py')
0 files changed, 0 insertions, 0 deletions