diff options
author | Al Viro <viro@zeniv.linux.org.uk> | 2007-06-07 11:13:31 -0400 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2007-07-22 09:57:02 -0400 |
commit | 4259fa01a2d2aa3e589b34ba7624080232d9c1ff (patch) | |
tree | 3aa83d784c4db22f3b62e4d963757497555c5e5c /kernel/auditsc.c | |
parent | 74f2345b6be1410f824cb7dd638d2c10a9709379 (diff) |
[PATCH] get rid of AVC_PATH postponed treatment
Selinux folks had been complaining about the lack of AVC_PATH
records when audit is disabled. I must admit my stupidity - I assumed
that avc_audit() really couldn't use audit_log_d_path() because of
deadlocks (== could be called with dcache_lock or vfsmount_lock held).
Shouldn't have made that assumption - it never gets called that way.
It _is_ called under spinlocks, but not those.
Since audit_log_d_path() uses ab->gfp_mask for allocations,
kmalloc() in there is not a problem. IOW, the simple fix is sufficient:
let's rip AUDIT_AVC_PATH out and simply generate pathname as part of main
record. It's trivial to do.
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Acked-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'kernel/auditsc.c')
-rw-r--r-- | kernel/auditsc.c | 47 |
1 files changed, 0 insertions, 47 deletions
diff --git a/kernel/auditsc.c b/kernel/auditsc.c index f5e917e60ac2..bde1124d5908 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c | |||
@@ -173,12 +173,6 @@ struct audit_aux_data_fd_pair { | |||
173 | int fd[2]; | 173 | int fd[2]; |
174 | }; | 174 | }; |
175 | 175 | ||
176 | struct audit_aux_data_path { | ||
177 | struct audit_aux_data d; | ||
178 | struct dentry *dentry; | ||
179 | struct vfsmount *mnt; | ||
180 | }; | ||
181 | |||
182 | struct audit_aux_data_pids { | 176 | struct audit_aux_data_pids { |
183 | struct audit_aux_data d; | 177 | struct audit_aux_data d; |
184 | pid_t target_pid[AUDIT_AUX_PIDS]; | 178 | pid_t target_pid[AUDIT_AUX_PIDS]; |
@@ -654,12 +648,6 @@ static inline void audit_free_aux(struct audit_context *context) | |||
654 | struct audit_aux_data *aux; | 648 | struct audit_aux_data *aux; |
655 | 649 | ||
656 | while ((aux = context->aux)) { | 650 | while ((aux = context->aux)) { |
657 | if (aux->type == AUDIT_AVC_PATH) { | ||
658 | struct audit_aux_data_path *axi = (void *)aux; | ||
659 | dput(axi->dentry); | ||
660 | mntput(axi->mnt); | ||
661 | } | ||
662 | |||
663 | context->aux = aux->next; | 651 | context->aux = aux->next; |
664 | kfree(aux); | 652 | kfree(aux); |
665 | } | 653 | } |
@@ -1038,11 +1026,6 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts | |||
1038 | audit_log_hex(ab, axs->a, axs->len); | 1026 | audit_log_hex(ab, axs->a, axs->len); |
1039 | break; } | 1027 | break; } |
1040 | 1028 | ||
1041 | case AUDIT_AVC_PATH: { | ||
1042 | struct audit_aux_data_path *axi = (void *)aux; | ||
1043 | audit_log_d_path(ab, "path=", axi->dentry, axi->mnt); | ||
1044 | break; } | ||
1045 | |||
1046 | case AUDIT_FD_PAIR: { | 1029 | case AUDIT_FD_PAIR: { |
1047 | struct audit_aux_data_fd_pair *axs = (void *)aux; | 1030 | struct audit_aux_data_fd_pair *axs = (void *)aux; |
1048 | audit_log_format(ab, "fd0=%d fd1=%d", axs->fd[0], axs->fd[1]); | 1031 | audit_log_format(ab, "fd0=%d fd1=%d", axs->fd[0], axs->fd[1]); |
@@ -1991,36 +1974,6 @@ void __audit_ptrace(struct task_struct *t) | |||
1991 | } | 1974 | } |
1992 | 1975 | ||
1993 | /** | 1976 | /** |
1994 | * audit_avc_path - record the granting or denial of permissions | ||
1995 | * @dentry: dentry to record | ||
1996 | * @mnt: mnt to record | ||
1997 | * | ||
1998 | * Returns 0 for success or NULL context or < 0 on error. | ||
1999 | * | ||
2000 | * Called from security/selinux/avc.c::avc_audit() | ||
2001 | */ | ||
2002 | int audit_avc_path(struct dentry *dentry, struct vfsmount *mnt) | ||
2003 | { | ||
2004 | struct audit_aux_data_path *ax; | ||
2005 | struct audit_context *context = current->audit_context; | ||
2006 | |||
2007 | if (likely(!context)) | ||
2008 | return 0; | ||
2009 | |||
2010 | ax = kmalloc(sizeof(*ax), GFP_ATOMIC); | ||
2011 | if (!ax) | ||
2012 | return -ENOMEM; | ||
2013 | |||
2014 | ax->dentry = dget(dentry); | ||
2015 | ax->mnt = mntget(mnt); | ||
2016 | |||
2017 | ax->d.type = AUDIT_AVC_PATH; | ||
2018 | ax->d.next = context->aux; | ||
2019 | context->aux = (void *)ax; | ||
2020 | return 0; | ||
2021 | } | ||
2022 | |||
2023 | /** | ||
2024 | * audit_signal_info - record signal info for shutting down audit subsystem | 1977 | * audit_signal_info - record signal info for shutting down audit subsystem |
2025 | * @sig: signal value | 1978 | * @sig: signal value |
2026 | * @t: task being signaled | 1979 | * @t: task being signaled |