FW: [PATCH] Smack: Use GFP_KERNEL for smk_netlbl_mls().
Casey Schaufler
casey at schaufler-ca.com
Mon Mar 27 15:15:05 UTC 2017
On 3/27/2017 3:33 AM, Tetsuo Handa wrote:
> Casey, I think you haven't applied this one.
You're right. I plan to take it for 4.12.
>
> ------- Forwarded Message
> From: Tetsuo Handa <penguin-kernel at I-love.SAKURA.ne.jp>
> To: casey at schaufler-ca.com
> Cc: linux-security-module at vger.kernel.org,Tetsuo Handa <penguin-kernel at I-love.SAKURA.ne.jp>
> Subject: [PATCH] Smack: Use GFP_KERNEL for smk_netlbl_mls().
> Date: Mon, 14 Nov 2016 20:12:56 +0900
>
> Since all callers of smk_netlbl_mls() are GFP_KERNEL context
> (smk_set_cipso() calls memdup_user_nul(), init_smk_fs() calls
> __kernfs_new_node(), smk_import_entry() calls kzalloc(GFP_KERNEL)),
> it is safe to use GFP_KERNEL from netlbl_catmap_setbit().
>
> Signed-off-by: Tetsuo Handa <penguin-kernel at I-love.SAKURA.ne.jp>
> ---
> security/smack/smack_access.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/security/smack/smack_access.c b/security/smack/smack_access.c
> index 23e5808..1f1ac3d 100644
> --- a/security/smack/smack_access.c
> +++ b/security/smack/smack_access.c
> @@ -509,7 +509,7 @@ int smk_netlbl_mls(int level, char *catset, struct netlbl_lsm_secattr *sap,
> if ((m & *cp) == 0)
> continue;
> rc = netlbl_catmap_setbit(&sap->attr.mls.cat,
> - cat, GFP_ATOMIC);
> + cat, GFP_KERNEL);
> if (rc < 0) {
> netlbl_catmap_free(sap->attr.mls.cat);
> return rc;
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo at vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
More information about the Linux-security-module-archive
mailing list