ddf9d24349
In the existing code we didn't really enforce that callers hold Giant before calling userland_sysctl(), even though there is no guarantee it is safe. Fix this by just placing Giant locks around the call to the oid handler. This also means we only pick up Giant for a very short period of time. Maybe we should add MPSAFE flags to sysctl or phase it out all together. I've also added SYSCTL_LOCK_ASSERT(). We have to make sure sysctl_root() and name2oid() are called with the sysctl lock held. Reviewed by: Jille Timmermans <jille quis cx> |
||
---|---|---|
.. | ||
linux_emul.c | ||
linux_emul.h | ||
linux_file.c | ||
linux_file.h | ||
linux_futex.c | ||
linux_futex.h | ||
linux_getcwd.c | ||
linux_ioctl.c | ||
linux_ioctl.h | ||
linux_ipc.c | ||
linux_ipc.h | ||
linux_mib.c | ||
linux_mib.h | ||
linux_misc.c | ||
linux_misc.h | ||
linux_signal.c | ||
linux_signal.h | ||
linux_socket.c | ||
linux_socket.h | ||
linux_stats.c | ||
linux_sysctl.c | ||
linux_sysproto.h | ||
linux_time.c | ||
linux_uid16.c | ||
linux_util.c | ||
linux_util.h |