diff options
author | David Rientjes <rientjes@google.com> | 2012-09-21 02:16:29 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2012-09-21 10:28:17 -0700 |
commit | 36048853c5257a7b6df346b83758ffa776a59e9f (patch) | |
tree | c8167eb505d2f8af213faa15acf27c6554783294 /crypto/shash.c | |
parent | c46de2263f42fb4bbde411b9126f471e9343cb22 (diff) | |
download | linux-36048853c5257a7b6df346b83758ffa776a59e9f.tar.bz2 |
debugfs: fix race in u32_array_read and allocate array at open
u32_array_open() is racy when multiple threads read from a file with a
seek position of zero, i.e. when two or more simultaneous reads are
occurring after the non-seekable files are created. It is possible that
file->private_data is double-freed because the threads races between
kfree(file->private-data);
and
file->private_data = NULL;
The fix is to only do format_array_alloc() when the file is opened and
free it when it is closed.
Note that because the file has always been non-seekable, you can't open
it and read it multiple times anyway, so the data has always been
generated just once. The difference is that now it is generated at open
time rather than at the time of the first read, and that avoids the
race.
Reported-by: Dave Jones <davej@redhat.com>
Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Tested-by: Raghavendra <raghavendra.kt@linux.vnet.ibm.com>
Signed-off-by: David Rientjes <rientjes@google.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'crypto/shash.c')
0 files changed, 0 insertions, 0 deletions