diff options
author | Eric Paris <eparis@redhat.com> | 2013-04-30 11:01:14 -0400 |
---|---|---|
committer | Eric Paris <eparis@redhat.com> | 2013-04-30 15:31:28 -0400 |
commit | bde02ca858448cf54a4226774dd1481f3bcc455e (patch) | |
tree | d5d7144d1314cba0c055b3804db35e06987a7956 /kernel/audit.c | |
parent | 4d3fb709b285ac885c40950a837edbfc90029c5f (diff) |
audit: use spin_lock_irqsave/restore in audit tty code
Some of the callers of the audit tty function use spin_lock_irqsave/restore.
We were using the forced always enable version, which seems really bad.
Since I don't know every one of these code paths well enough, it makes
sense to just switch everything to the safe version. Maybe it's a
little overzealous, but it's a lot better than an unlucky deadlock when
we return to a caller with irq enabled and they expect it to be
disabled.
Signed-off-by: Eric Paris <eparis@redhat.com>
Diffstat (limited to 'kernel/audit.c')
-rw-r--r-- | kernel/audit.c | 10 |
1 files changed, 6 insertions, 4 deletions
diff --git a/kernel/audit.c b/kernel/audit.c index 44803f25b236..241aa8593fa8 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
@@ -804,10 +804,11 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
804 | case AUDIT_TTY_GET: { | 804 | case AUDIT_TTY_GET: { |
805 | struct audit_tty_status s; | 805 | struct audit_tty_status s; |
806 | struct task_struct *tsk = current; | 806 | struct task_struct *tsk = current; |
807 | unsigned long flags; | ||
807 | 808 | ||
808 | spin_lock_irq(&tsk->sighand->siglock); | 809 | spin_lock_irqsave(&tsk->sighand->siglock, flags); |
809 | s.enabled = tsk->signal->audit_tty != 0; | 810 | s.enabled = tsk->signal->audit_tty != 0; |
810 | spin_unlock_irq(&tsk->sighand->siglock); | 811 | spin_unlock_irqrestore(&tsk->sighand->siglock, flags); |
811 | 812 | ||
812 | audit_send_reply(NETLINK_CB(skb).portid, seq, | 813 | audit_send_reply(NETLINK_CB(skb).portid, seq, |
813 | AUDIT_TTY_GET, 0, 0, &s, sizeof(s)); | 814 | AUDIT_TTY_GET, 0, 0, &s, sizeof(s)); |
@@ -816,6 +817,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
816 | case AUDIT_TTY_SET: { | 817 | case AUDIT_TTY_SET: { |
817 | struct audit_tty_status *s; | 818 | struct audit_tty_status *s; |
818 | struct task_struct *tsk = current; | 819 | struct task_struct *tsk = current; |
820 | unsigned long flags; | ||
819 | 821 | ||
820 | if (nlh->nlmsg_len < sizeof(struct audit_tty_status)) | 822 | if (nlh->nlmsg_len < sizeof(struct audit_tty_status)) |
821 | return -EINVAL; | 823 | return -EINVAL; |
@@ -823,9 +825,9 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
823 | if (s->enabled != 0 && s->enabled != 1) | 825 | if (s->enabled != 0 && s->enabled != 1) |
824 | return -EINVAL; | 826 | return -EINVAL; |
825 | 827 | ||
826 | spin_lock_irq(&tsk->sighand->siglock); | 828 | spin_lock_irqsave(&tsk->sighand->siglock, flags); |
827 | tsk->signal->audit_tty = s->enabled != 0; | 829 | tsk->signal->audit_tty = s->enabled != 0; |
828 | spin_unlock_irq(&tsk->sighand->siglock); | 830 | spin_unlock_irqrestore(&tsk->sighand->siglock, flags); |
829 | break; | 831 | break; |
830 | } | 832 | } |
831 | default: | 833 | default: |