audit/stable-5.12 PR 20210215
-----BEGIN PGP SIGNATURE----- iQJIBAABCAAyFiEES0KozwfymdVUl37v6iDy2pc3iXMFAmAqwXoUHHBhdWxAcGF1 bC1tb29yZS5jb20ACgkQ6iDy2pc3iXOGahAAx4MfOnmW6cy80oD/g5rIcO9SeD57 gQB0EQHBRjYC6c6/j7pmT8DX3lWr6ivDAca559EsJrLxtB8fhuMAoBAitzyRhIwh 21t1QcVvoQ7WTH4H5Ix7oWcm2xRFg8CbioMCEtyJB5Q4i6e5jwOk0rsLzw4MMKMp P6/JsOQC4sASYx7v12/+egL3wPyksOYOSDEVnp+dUUnxa0/Dg3P7BrWSSg5gi3k1 Im/LYPsP3NjRDcTcS6iREwlP2iFvLBka553wmrvCqNEXVIKALcQ0uDVEf7e5meFm UBMa45ZyxkCNGiN5MmnISOBRqvyD1xixHRar3Uk6KQDwX11nUBSEhYEuooiMOBOV yLJtXnX/9NK34JpzccSrcW0oP9rWJTEr/5zW1ZyVPP1yy7LrqFqeJTOIVCDcDnVK 8d0Moxl9pWoujlts7N3sAs00PlCEbg745dap2yJolNQ8g5Mz/aNjZ+bpxx1XykbY fywvUFyPJ4wNWEgi605vSD1Xtl4kzapsSJ6N+cfAzKfLb9OpnJzXtqdc2JM7KjTv Cz3+vroHsR3CJ67Tao5v+Qrj2fO+NjXL2y2oE0TRqyvkwxUUfSTFrpmNuH5IVtYX 1Rxbv97zBylml43oeUCtUDs5CNpn/0deJjv//xCFT4VFAjA+hu2kvAw5TDqOAOP5 77z+hqO4eZnivAA= =TyeU -----END PGP SIGNATURE----- Merge tag 'audit-pr-20210215' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit Pull audit updates from Paul Moore: "Three very trivial patches for audit this time" * tag 'audit-pr-20210215' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit: audit: Make audit_filter_syscall() return void audit: Remove leftover reference to the audit_tasklet kernel/audit: convert comma to semicolon
This commit is contained in:
commit
23b6ba45f3
|
@ -2285,7 +2285,7 @@ static void audit_log_set_loginuid(kuid_t koldloginuid, kuid_t kloginuid,
|
||||||
|
|
||||||
uid = from_kuid(&init_user_ns, task_uid(current));
|
uid = from_kuid(&init_user_ns, task_uid(current));
|
||||||
oldloginuid = from_kuid(&init_user_ns, koldloginuid);
|
oldloginuid = from_kuid(&init_user_ns, koldloginuid);
|
||||||
loginuid = from_kuid(&init_user_ns, kloginuid),
|
loginuid = from_kuid(&init_user_ns, kloginuid);
|
||||||
tty = audit_get_tty();
|
tty = audit_get_tty();
|
||||||
|
|
||||||
audit_log_format(ab, "pid=%d uid=%u", task_tgid_nr(current), uid);
|
audit_log_format(ab, "pid=%d uid=%u", task_tgid_nr(current), uid);
|
||||||
|
@ -2365,7 +2365,7 @@ int audit_signal_info(int sig, struct task_struct *t)
|
||||||
*
|
*
|
||||||
* We can not do a netlink send inside an irq context because it blocks (last
|
* We can not do a netlink send inside an irq context because it blocks (last
|
||||||
* arg, flags, is not set to MSG_DONTWAIT), so the audit buffer is placed on a
|
* arg, flags, is not set to MSG_DONTWAIT), so the audit buffer is placed on a
|
||||||
* queue and a tasklet is scheduled to remove them from the queue outside the
|
* queue and a kthread is scheduled to remove them from the queue outside the
|
||||||
* irq context. May be called in any context.
|
* irq context. May be called in any context.
|
||||||
*/
|
*/
|
||||||
void audit_log_end(struct audit_buffer *ab)
|
void audit_log_end(struct audit_buffer *ab)
|
||||||
|
|
|
@ -799,12 +799,12 @@ static int audit_in_mask(const struct audit_krule *rule, unsigned long val)
|
||||||
return rule->mask[word] & bit;
|
return rule->mask[word] & bit;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* At syscall entry and exit time, this filter is called if the
|
/* At syscall exit time, this filter is called if the audit_state is
|
||||||
* audit_state is not low enough that auditing cannot take place, but is
|
* not low enough that auditing cannot take place, but is also not
|
||||||
* also not high enough that we already know we have to write an audit
|
* high enough that we already know we have to write an audit record
|
||||||
* record (i.e., the state is AUDIT_SETUP_CONTEXT or AUDIT_BUILD_CONTEXT).
|
* (i.e., the state is AUDIT_SETUP_CONTEXT or AUDIT_BUILD_CONTEXT).
|
||||||
*/
|
*/
|
||||||
static enum audit_state audit_filter_syscall(struct task_struct *tsk,
|
static void audit_filter_syscall(struct task_struct *tsk,
|
||||||
struct audit_context *ctx,
|
struct audit_context *ctx,
|
||||||
struct list_head *list)
|
struct list_head *list)
|
||||||
{
|
{
|
||||||
|
@ -812,7 +812,7 @@ static enum audit_state audit_filter_syscall(struct task_struct *tsk,
|
||||||
enum audit_state state;
|
enum audit_state state;
|
||||||
|
|
||||||
if (auditd_test_task(tsk))
|
if (auditd_test_task(tsk))
|
||||||
return AUDIT_DISABLED;
|
return;
|
||||||
|
|
||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
list_for_each_entry_rcu(e, list, list) {
|
list_for_each_entry_rcu(e, list, list) {
|
||||||
|
@ -821,11 +821,11 @@ static enum audit_state audit_filter_syscall(struct task_struct *tsk,
|
||||||
&state, false)) {
|
&state, false)) {
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
ctx->current_state = state;
|
ctx->current_state = state;
|
||||||
return state;
|
return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
rcu_read_unlock();
|
rcu_read_unlock();
|
||||||
return AUDIT_BUILD_CONTEXT;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
|
Loading…
Reference in New Issue