diff options
author | NeilBrown <neilb@suse.de> | 2024-01-31 11:17:40 +1100 |
---|---|---|
committer | Chuck Lever <chuck.lever@oracle.com> | 2024-03-01 09:12:23 -0500 |
commit | 05eda6e75773592760285e10ac86c56d683be17f (patch) | |
tree | 8e0da4430a4eab25ff252b9ea975602a347e42cc /mm/hwpoison-inject.c | |
parent | 1e33e1414bec54a4feafa9e67e2617031be0afe2 (diff) | |
download | linux-05eda6e75773592760285e10ac86c56d683be17f.tar.gz linux-05eda6e75773592760285e10ac86c56d683be17f.tar.bz2 linux-05eda6e75773592760285e10ac86c56d683be17f.zip |
nfsd: don't call locks_release_private() twice concurrently
It is possible for free_blocked_lock() to be called twice concurrently,
once from nfsd4_lock() and once from nfsd4_release_lockowner() calling
remove_blocked_locks(). This is why a kref was added.
It is perfectly safe for locks_delete_block() and kref_put() to be
called in parallel as they use locking or atomicity respectively as
protection. However locks_release_private() has no locking. It is
safe for it to be called twice sequentially, but not concurrently.
This patch moves that call from free_blocked_lock() where it could race
with itself, to free_nbl() where it cannot. This will slightly delay
the freeing of private info or release of the owner - but not by much.
It is arguably more natural for this freeing to happen in free_nbl()
where the structure itself is freed.
This bug was found by code inspection - it has not been seen in practice.
Fixes: 47446d74f170 ("nfsd4: add refcount for nfsd4_blocked_lock")
Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Diffstat (limited to 'mm/hwpoison-inject.c')
0 files changed, 0 insertions, 0 deletions