Files
linux/include
Anton Blanchard 1ebc7c29ec audit: Syscall rules are not applied to existing processes on non-x86
BugLink: http://bugs.launchpad.net/bugs/1187551

commit cdee3904b4 upstream.

Commit b05d8447e7 (audit: inline audit_syscall_entry to reduce
burden on archs) changed audit_syscall_entry to check for a dummy
context before calling __audit_syscall_entry. Unfortunately the dummy
context state is maintained in __audit_syscall_entry so once set it
never gets cleared, even if the audit rules change.

As a result, if there are no auditing rules when a process starts
then it will never be subject to any rules added later. x86 doesn't
see this because it has an assembly fast path that calls directly into
__audit_syscall_entry.

I noticed this issue when working on audit performance optimisations.
I wrote a set of simple test cases available at:

http://ozlabs.org/~anton/junkcode/audit_tests.tar.gz

02_new_rule.py fails without the patch and passes with it. The
test case clears all rules, starts a process, adds a rule then
verifies the process produces a syscall audit record.

Signed-off-by: Anton Blanchard <anton@samba.org>
Signed-off-by: Eric Paris <eparis@redhat.com>
Signed-off-by: Kamal Mostafa <kamal@canonical.com>
Signed-off-by: Steve Conklin <sconklin@canonical.com>
2013-06-07 11:42:57 -05:00
..
2012-09-17 13:42:20 +01:00
2013-05-30 16:30:07 -05:00
2013-01-02 17:36:10 -08:00
2013-01-10 20:06:08 -08:00
2013-01-02 17:36:10 -08:00