You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fs/fhandle.c: fix a race in call of has_locked_children()
JIRA: https://issues.redhat.com/browse/RHEL-113598
CVE: CVE-2025-38306
Conflicts:
1) A context diff with the has_locked_children() hunk and a merge
conflict with clone_private_mount() hunk due to missing
upstream commit db04662 ("fs: allow detached mounts in
clone_private_mount()").
2) A merge conflict with the __do_loopback() hunk due to missing
upstream commit 9ed72af ("fs: add may_copy_tree()").
commit 1f282cd
Author: Al Viro <viro@zeniv.linux.org.uk>
Date: Sun, 1 Jun 2025 14:23:52 -0400
fs/fhandle.c: fix a race in call of has_locked_children()
may_decode_fh() is calling has_locked_children() while holding no locks.
That's an oopsable race...
The rest of the callers are safe since they are holding namespace_sem and
are guaranteed a positive refcount on the mount in question.
Rename the current has_locked_children() to __has_locked_children(), make
it static and switch the fs/namespace.c users to it.
Make has_locked_children() a wrapper for __has_locked_children(), calling
the latter under read_seqlock_excl(&mount_lock).
Reviewed-by: Christian Brauner <brauner@kernel.org>
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Fixes: 620c266 ("fhandle: relax open_by_handle_at() permission checks")
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Signed-off-by: Waiman Long <longman@redhat.com>
0 commit comments