Files
i2som-imx-linux/include/linux
Anton Blanchard ad86524f94 audit: Syscall rules are not applied to existing processes on non-x86
commit cdee3904b4 upstream.

Commit b05d8447e7 (audit: inline audit_syscall_entry to reduce
burden on archs) changed audit_syscall_entry to check for a dummy
context before calling __audit_syscall_entry. Unfortunately the dummy
context state is maintained in __audit_syscall_entry so once set it
never gets cleared, even if the audit rules change.

As a result, if there are no auditing rules when a process starts
then it will never be subject to any rules added later. x86 doesn't
see this because it has an assembly fast path that calls directly into
__audit_syscall_entry.

I noticed this issue when working on audit performance optimisations.
I wrote a set of simple test cases available at:

http://ozlabs.org/~anton/junkcode/audit_tests.tar.gz

02_new_rule.py fails without the patch and passes with it. The
test case clears all rules, starts a process, adds a rule then
verifies the process produces a syscall audit record.

Signed-off-by: Anton Blanchard <anton@samba.org>
Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2013-05-19 10:54:39 -07:00
..
2013-01-17 08:51:20 -08:00
2012-11-26 11:38:03 -08:00
2012-04-23 14:23:32 +03:00
2012-04-27 11:03:38 -06:00
2012-11-17 13:16:12 -08:00
2012-04-27 10:46:45 +08:00
2012-10-02 10:30:35 -07:00
2012-08-15 08:10:29 -07:00
2012-07-19 08:59:00 -07:00
2013-04-16 21:27:26 -07:00
2012-10-02 10:30:05 -07:00
2012-12-17 10:37:42 -08:00
2013-04-25 21:19:56 -07:00
2012-08-09 08:31:30 -07:00
2012-08-15 08:10:29 -07:00
2013-01-11 09:07:15 -08:00
2012-07-16 09:04:42 -07:00
2013-04-05 10:04:40 -07:00