diff options
author | Masami Hiramatsu (Google) <mhiramat@kernel.org> | 2023-12-01 14:53:56 +0900 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2023-12-13 18:45:19 +0100 |
commit | 29b9ebc89106dbb6ffd0004b9a50f21874a540af (patch) | |
tree | 7f98e2d7c036cff0f9a70563fb362bc069e6c6f0 /sound | |
parent | af448bb2eaba0d069f66b069a15440fcd36a21ca (diff) | |
download | linux-stable-29b9ebc89106dbb6ffd0004b9a50f21874a540af.tar.gz linux-stable-29b9ebc89106dbb6ffd0004b9a50f21874a540af.tar.bz2 linux-stable-29b9ebc89106dbb6ffd0004b9a50f21874a540af.zip |
rethook: Use __rcu pointer for rethook::handler
commit a1461f1fd6cfdc4b8917c9d4a91e92605d1f28dc upstream.
Since the rethook::handler is an RCU-maganged pointer so that it will
notice readers the rethook is stopped (unregistered) or not, it should
be an __rcu pointer and use appropriate functions to be accessed. This
will use appropriate memory barrier when accessing it. OTOH,
rethook::data is never changed, so we don't need to check it in
get_kretprobe().
NOTE: To avoid sparse warning, rethook::handler is defined by a raw
function pointer type with __rcu instead of rethook_handler_t.
Link: https://lore.kernel.org/all/170126066201.398836.837498688669005979.stgit@devnote2/
Fixes: 54ecbe6f1ed5 ("rethook: Add a generic return hook")
Cc: stable@vger.kernel.org
Reported-by: kernel test robot <lkp@intel.com>
Closes: https://lore.kernel.org/oe-kbuild-all/202311241808.rv9ceuAh-lkp@intel.com/
Tested-by: JP Kobryn <inwardvessel@gmail.com>
Signed-off-by: Masami Hiramatsu (Google) <mhiramat@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'sound')
0 files changed, 0 insertions, 0 deletions