linux/security
Eric Paris 9ade0cf440 SELINUX: Make selinux cache VFS RCU walks safe
Now that the security modules can decide whether they support the
dcache RCU walk or not it's possible to make selinux a bit more
RCU friendly.  The SELinux AVC and security server access decision
code is RCU safe.  A specific piece of the LSM audit code may not
be RCU safe.

This patch makes the VFS RCU walk retry if it would hit the non RCU
safe chunk of code.  It will normally just work under RCU.  This is
done simply by passing the VFS RCU state as a flag down into the
avc_audit() code and returning ECHILD there if it would have an issue.

Based-on-patch-by: Andi Kleen <ak@linux.intel.com>
Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2011-04-25 18:16:32 -07:00
..
apparmor Fix common misspellings 2011-03-31 11:26:23 -03:00
integrity/ima
keys
selinux SELINUX: Make selinux cache VFS RCU walks safe 2011-04-25 18:16:32 -07:00
smack SECURITY: Move exec_permission RCU checks into security modules 2011-04-22 16:17:29 -07:00
tomoyo Fix common misspellings 2011-03-31 11:26:23 -03:00
capability.c SECURITY: Move exec_permission RCU checks into security modules 2011-04-22 16:17:29 -07:00
commoncap.c userns: allow ptrace from non-init user namespaces 2011-03-23 19:47:05 -07:00
device_cgroup.c
inode.c
Kconfig
lsm_audit.c
Makefile
min_addr.c
security.c SECURITY: Move exec_permission RCU checks into security modules 2011-04-22 16:17:29 -07:00