提交 4eb0f4ab 编写于 作者: R Richard Guy Briggs 提交者: Eric Paris

smack: call WARN_ONCE() instead of calling audit_log_start()

Remove the call to audit_log() (which call audit_log_start()) and deal with
the errors in the caller, logging only once if the condition is met.  Calling
audit_log_start() in this location makes buffer allocation and locking more
complicated in the calling tree (audit_filter_user()).
Signed-off-by: NRichard Guy Briggs <rgb@redhat.com>
Signed-off-by: NEric Paris <eparis@redhat.com>
上级 9ad42a79
...@@ -3615,9 +3615,8 @@ static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, ...@@ -3615,9 +3615,8 @@ static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule,
struct smack_known *skp; struct smack_known *skp;
char *rule = vrule; char *rule = vrule;
if (!rule) { if (unlikely(!rule)) {
audit_log(actx, GFP_ATOMIC, AUDIT_SELINUX_ERR, WARN_ONCE(1, "Smack: missing rule\n");
"Smack: missing rule\n");
return -ENOENT; return -ENOENT;
} }
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册