Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
openeuler
raspberrypi-kernel
提交
c62d773a
R
raspberrypi-kernel
项目概览
openeuler
/
raspberrypi-kernel
通知
13
Star
1
Fork
0
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
R
raspberrypi-kernel
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
提交
c62d773a
编写于
10月 20, 2012
作者:
A
Al Viro
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
audit: no nested contexts anymore...
Signed-off-by:
N
Al Viro
<
viro@zeniv.linux.org.uk
>
上级
6b94631f
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
21 addition
and
81 deletion
+21
-81
kernel/auditsc.c
kernel/auditsc.c
+21
-81
未找到文件。
kernel/auditsc.c
浏览文件 @
c62d773a
...
...
@@ -200,7 +200,6 @@ struct audit_context {
struct
list_head
names_list
;
/* anchor for struct audit_names->list */
char
*
filterkey
;
/* key for rule that triggered record */
struct
path
pwd
;
struct
audit_context
*
previous
;
/* For nested syscalls */
struct
audit_aux_data
*
aux
;
struct
audit_aux_data
*
aux_pids
;
struct
sockaddr_storage
*
sockaddr
;
...
...
@@ -1091,29 +1090,13 @@ int audit_alloc(struct task_struct *tsk)
static
inline
void
audit_free_context
(
struct
audit_context
*
context
)
{
struct
audit_context
*
previous
;
int
count
=
0
;
do
{
previous
=
context
->
previous
;
if
(
previous
||
(
count
&&
count
<
10
))
{
++
count
;
printk
(
KERN_ERR
"audit(:%d): major=%d name_count=%d:"
" freeing multiple contexts (%d)
\n
"
,
context
->
serial
,
context
->
major
,
context
->
name_count
,
count
);
}
audit_free_names
(
context
);
unroll_tree_refs
(
context
,
NULL
,
0
);
free_tree_refs
(
context
);
audit_free_aux
(
context
);
kfree
(
context
->
filterkey
);
kfree
(
context
->
sockaddr
);
kfree
(
context
);
context
=
previous
;
}
while
(
context
);
if
(
count
>=
10
)
printk
(
KERN_ERR
"audit: freed %d contexts
\n
"
,
count
);
audit_free_names
(
context
);
unroll_tree_refs
(
context
,
NULL
,
0
);
free_tree_refs
(
context
);
audit_free_aux
(
context
);
kfree
(
context
->
filterkey
);
kfree
(
context
->
sockaddr
);
kfree
(
context
);
}
void
audit_log_task_context
(
struct
audit_buffer
*
ab
)
...
...
@@ -1783,42 +1766,6 @@ void __audit_syscall_entry(int arch, int major,
if
(
!
context
)
return
;
/*
* This happens only on certain architectures that make system
* calls in kernel_thread via the entry.S interface, instead of
* with direct calls. (If you are porting to a new
* architecture, hitting this condition can indicate that you
* got the _exit/_leave calls backward in entry.S.)
*
* i386 no
* x86_64 no
* ppc64 yes (see arch/powerpc/platforms/iseries/misc.S)
*
* This also happens with vm86 emulation in a non-nested manner
* (entries without exits), so this case must be caught.
*/
if
(
context
->
in_syscall
)
{
struct
audit_context
*
newctx
;
#if AUDIT_DEBUG
printk
(
KERN_ERR
"audit(:%d) pid=%d in syscall=%d;"
" entering syscall=%d
\n
"
,
context
->
serial
,
tsk
->
pid
,
context
->
major
,
major
);
#endif
newctx
=
audit_alloc_context
(
context
->
state
);
if
(
newctx
)
{
newctx
->
previous
=
context
;
context
=
newctx
;
tsk
->
audit_context
=
newctx
;
}
else
{
/* If we can't alloc a new context, the best we
* can do is to leak memory (any pending putname
* will be lost). The only other alternative is
* to abandon auditing. */
audit_zero_context
(
context
,
context
->
state
);
}
}
BUG_ON
(
context
->
in_syscall
||
context
->
name_count
);
if
(
!
audit_enabled
)
...
...
@@ -1881,28 +1828,21 @@ void __audit_syscall_exit(int success, long return_code)
if
(
!
list_empty
(
&
context
->
killed_trees
))
audit_kill_trees
(
&
context
->
killed_trees
);
if
(
context
->
previous
)
{
struct
audit_context
*
new_context
=
context
->
previous
;
context
->
previous
=
NULL
;
audit_free_context
(
context
);
tsk
->
audit_context
=
new_context
;
}
else
{
audit_free_names
(
context
);
unroll_tree_refs
(
context
,
NULL
,
0
);
audit_free_aux
(
context
);
context
->
aux
=
NULL
;
context
->
aux_pids
=
NULL
;
context
->
target_pid
=
0
;
context
->
target_sid
=
0
;
context
->
sockaddr_len
=
0
;
context
->
type
=
0
;
context
->
fds
[
0
]
=
-
1
;
if
(
context
->
state
!=
AUDIT_RECORD_CONTEXT
)
{
kfree
(
context
->
filterkey
);
context
->
filterkey
=
NULL
;
}
tsk
->
audit_context
=
context
;
audit_free_names
(
context
);
unroll_tree_refs
(
context
,
NULL
,
0
);
audit_free_aux
(
context
);
context
->
aux
=
NULL
;
context
->
aux_pids
=
NULL
;
context
->
target_pid
=
0
;
context
->
target_sid
=
0
;
context
->
sockaddr_len
=
0
;
context
->
type
=
0
;
context
->
fds
[
0
]
=
-
1
;
if
(
context
->
state
!=
AUDIT_RECORD_CONTEXT
)
{
kfree
(
context
->
filterkey
);
context
->
filterkey
=
NULL
;
}
tsk
->
audit_context
=
context
;
}
static
inline
void
handle_one
(
const
struct
inode
*
inode
)
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录