diff options
author | Peter Zijlstra <peterz@infradead.org> | 2015-02-25 15:56:04 +0100 |
---|---|---|
committer | Ingo Molnar <mingo@kernel.org> | 2015-03-27 09:49:45 +0100 |
commit | ccd41c86ad4d464d0ed4e48d80759ff85c2115b0 (patch) | |
tree | b53b1e7507761a9144f900eff6f97cd4bb6d15c5 /arch/arm64/kernel | |
parent | 9332d250b4b4f67c633894b311e022e3cf943bd5 (diff) |
perf: Fix racy group access
While looking at some fuzzer output I noticed that we do not hold any
locks on leader->ctx and therefore the sibling_list iteration is
unsafe.
Acquire the relevant ctx->mutex before calling into the pmu specific
code.
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Cc: Vince Weaver <vincent.weaver@maine.edu>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Sasha Levin <sasha.levin@oracle.com>
Link: http://lkml.kernel.org/r/20150225151639.GL5029@twins.programming.kicks-ass.net
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Diffstat (limited to 'arch/arm64/kernel')
0 files changed, 0 insertions, 0 deletions