Impact: prevent races with ring_buffer_expanded
This patch places the expanding of the tracing buffer under the
protection of the trace_types_lock mutex. It is highly unlikely
that there would be any contention, but better safe than sorry.
Reported-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Steven Rostedt <srostedt@redhat.com>
 {
        int ret = 0;
 
+       mutex_lock(&trace_types_lock);
        if (!ring_buffer_expanded)
                ret = tracing_resize_ring_buffer(trace_buf_size);
+       mutex_unlock(&trace_types_lock);
 
        return ret;
 }
        struct tracer *t;
        int ret = 0;
 
+       mutex_lock(&trace_types_lock);
+
        if (!ring_buffer_expanded) {
                ret = tracing_resize_ring_buffer(trace_buf_size);
                if (ret < 0)
                ret = 0;
        }
 
-       mutex_lock(&trace_types_lock);
        for (t = trace_types; t; t = t->next) {
                if (strcmp(t->name, buf) == 0)
                        break;