linux-ext4.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Locking rules for fscrypt_operations->set_context()
@ 2016-09-20 14:30 Richard Weinberger
  2016-09-22  0:14 ` Eric Biggers
  0 siblings, 1 reply; 2+ messages in thread
From: Richard Weinberger @ 2016-09-20 14:30 UTC (permalink / raw)
  To: linux-ext4, linux-fsdevel, linux-kernel@vger.kernel.org
  Cc: Theodore Ts'o, David Gstir

Hi!

To my understanding ->setxattr() is always being called with i_mutex held.
->set_context() in ext4 stores the security context using ext4_xattr_set(),
but the fs crypto framework does not lock the inode itself.
So, depending on the call path, ext4_xattr_set() is sometimes being
called with i_mutex held and some times not.

What are the locking rules for fscrypt_operations and especially ->set_context()?

Thanks,
//richard

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2016-09-22  0:14 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-09-20 14:30 Locking rules for fscrypt_operations->set_context() Richard Weinberger
2016-09-22  0:14 ` Eric Biggers

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).