diff options
author | Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> | 2010-04-28 01:17:42 -0400 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2010-05-05 10:50:43 -0400 |
commit | 4e5d6f7ec3833c0da9cf34fa5c53c6058c5908b6 (patch) | |
tree | 5c0db5bfcdcb1b07594f20054cc6eefe05161c9a /security/tomoyo/realpath.c | |
parent | a674fa46c79ffa37995bd1c8e4daa2b3be5a95ae (diff) |
TOMOYO: Use GFP_NOFS rather than GFP_KERNEL.
In Ubuntu, security_path_*() hooks are exported to Unionfs. Thus, prepare for
being called from inside VFS functions because I'm not sure whether it is safe
to use GFP_KERNEL or not.
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'security/tomoyo/realpath.c')
-rw-r--r-- | security/tomoyo/realpath.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/tomoyo/realpath.c b/security/tomoyo/realpath.c index cf7d61f781b9..8fe3ee20a189 100644 --- a/security/tomoyo/realpath.c +++ b/security/tomoyo/realpath.c | |||
@@ -138,7 +138,7 @@ int tomoyo_realpath_from_path2(struct path *path, char *newname, | |||
138 | */ | 138 | */ |
139 | char *tomoyo_realpath_from_path(struct path *path) | 139 | char *tomoyo_realpath_from_path(struct path *path) |
140 | { | 140 | { |
141 | char *buf = kzalloc(sizeof(struct tomoyo_page_buffer), GFP_KERNEL); | 141 | char *buf = kzalloc(sizeof(struct tomoyo_page_buffer), GFP_NOFS); |
142 | 142 | ||
143 | BUILD_BUG_ON(sizeof(struct tomoyo_page_buffer) | 143 | BUILD_BUG_ON(sizeof(struct tomoyo_page_buffer) |
144 | <= TOMOYO_MAX_PATHNAME_LEN - 1); | 144 | <= TOMOYO_MAX_PATHNAME_LEN - 1); |
@@ -269,7 +269,7 @@ const struct tomoyo_path_info *tomoyo_get_name(const char *name) | |||
269 | atomic_inc(&ptr->users); | 269 | atomic_inc(&ptr->users); |
270 | goto out; | 270 | goto out; |
271 | } | 271 | } |
272 | ptr = kzalloc(sizeof(*ptr) + len, GFP_KERNEL); | 272 | ptr = kzalloc(sizeof(*ptr) + len, GFP_NOFS); |
273 | allocated_len = ptr ? ksize(ptr) : 0; | 273 | allocated_len = ptr ? ksize(ptr) : 0; |
274 | if (!ptr || (tomoyo_quota_for_policy && | 274 | if (!ptr || (tomoyo_quota_for_policy && |
275 | atomic_read(&tomoyo_policy_memory_size) + allocated_len | 275 | atomic_read(&tomoyo_policy_memory_size) + allocated_len |