diff options
| author | Trond Myklebust <[email protected]> | 2025-07-15 19:49:00 +0000 |
|---|---|---|
| committer | Trond Myklebust <[email protected]> | 2025-08-05 23:45:40 +0000 |
| commit | fdd015de767977f21892329af5e12276eb80375f (patch) | |
| tree | ad69d55fe185710272fad4dd21142d12aaa1abd5 /net/unix/af_unix.c | |
| parent | NFS/localio: nfs_close_local_fh() fix check for file closed (diff) | |
| download | kernel-fdd015de767977f21892329af5e12276eb80375f.tar.gz kernel-fdd015de767977f21892329af5e12276eb80375f.zip | |
NFS/localio: nfs_uuid_put() fix races with nfs_open/close_local_fh()
In order for the wait in nfs_uuid_put() to be safe, it is necessary to
ensure that nfs_uuid_add_file() doesn't add a new entry once the
nfs_uuid->net has been NULLed out.
Also fix up the wake_up_var_locked() / wait_var_event_spinlock() to both
use the nfs_uuid address, since nfl, and &nfl->uuid could be used elsewhere.
Acked-by: Mike Snitzer <[email protected]>
Tested-by: Mike Snitzer <[email protected]>
Link: https://lore.kernel.org/all/[email protected]/
Fixes: 21fb44034695 ("nfs_localio: protect race between nfs_uuid_put() and nfs_close_local_fh()")
Signed-off-by: Trond Myklebust <[email protected]>
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions
