aboutsummaryrefslogtreecommitdiffstats
path: root/security/smack/smack_lsm.c
diff options
context:
space:
mode:
authorEric Biggers <ebiggers@google.com>2019-08-21 22:54:41 -0700
committerCasey Schaufler <casey@schaufler-ca.com>2019-09-04 09:37:07 -0700
commite5bfad3d7acc5702f32aafeb388362994f4d7bd0 (patch)
treec9daa0267c2dd110e5a8ccbed94ac8c8edb9c6e6 /security/smack/smack_lsm.c
parentsecurity: smack: Fix possible null-pointer dereferences in smack_socket_sock_rcv_skb() (diff)
downloadlinux-dev-e5bfad3d7acc5702f32aafeb388362994f4d7bd0.tar.xz
linux-dev-e5bfad3d7acc5702f32aafeb388362994f4d7bd0.zip
smack: use GFP_NOFS while holding inode_smack::smk_lock
inode_smack::smk_lock is taken during smack_d_instantiate(), which is called during a filesystem transaction when creating a file on ext4. Therefore to avoid a deadlock, all code that takes this lock must use GFP_NOFS, to prevent memory reclaim from waiting for the filesystem transaction to complete. Reported-by: syzbot+0eefc1e06a77d327a056@syzkaller.appspotmail.com Cc: stable@vger.kernel.org Signed-off-by: Eric Biggers <ebiggers@google.com> Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Diffstat (limited to 'security/smack/smack_lsm.c')
-rw-r--r--security/smack/smack_lsm.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c
index 516f7ba96f1e..abeb09c30633 100644
--- a/security/smack/smack_lsm.c
+++ b/security/smack/smack_lsm.c
@@ -288,7 +288,7 @@ static struct smack_known *smk_fetch(const char *name, struct inode *ip,
if (!(ip->i_opflags & IOP_XATTR))
return ERR_PTR(-EOPNOTSUPP);
- buffer = kzalloc(SMK_LONGLABEL, GFP_KERNEL);
+ buffer = kzalloc(SMK_LONGLABEL, GFP_NOFS);
if (buffer == NULL)
return ERR_PTR(-ENOMEM);