Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753268AbbHETXr (ORCPT ); Wed, 5 Aug 2015 15:23:47 -0400 Received: from mx1.redhat.com ([209.132.183.28]:47424 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752162AbbHETXq (ORCPT ); Wed, 5 Aug 2015 15:23:46 -0400 From: Richard Guy Briggs To: linux-audit@redhat.com, linux-kernel@vger.kernel.org Cc: Richard Guy Briggs , sgrubb@redhat.com, pmoore@redhat.com, eparis@redhat.com Subject: [PATCH V6] audit: save signal match info in case entry passed in is the one deleted Date: Wed, 5 Aug 2015 15:23:09 -0400 Message-Id: <576d852cbf243447bb2c4ec1b5f7520e88bbe23c.1438801399.git.rgb@redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2492 Lines: 79 Move the access to the entry for audit_match_signal() to earlier in the function in case the entry found is the same one passed in. This will enable it to be used by audit_remove_mark_rule(). Signed-off-by: Richard Guy Briggs --- Revision history: v6: Fix a rebase manual merge error that mixed parts of two patches. v4 -> v5: Move mutex_unlock after out label. Move list_del group after test for signal to remove temp variable. --- This patch was split out from the audit by executable path patch set due to the potential to use it elsewhere. In particular, some questions came up while assessing the potential for code reuse: Why does audit_remove_parent_watches() not call audit_del_rule() for each entry found? Is audit_signals not properly decremented? Is audit_n_rules not properly decremented? Why does kill_rules() not call audit_del_rule() for each entry found? Is audit_signals not properly decremented? Is audit_n_rules not properly decremented? kernel/auditfilter.c | 12 ++++++------ 1 files changed, 6 insertions(+), 6 deletions(-) diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c index 4cb9b44..018719a 100644 --- a/kernel/auditfilter.c +++ b/kernel/auditfilter.c @@ -953,7 +953,6 @@ static inline int audit_del_rule(struct audit_entry *entry) mutex_lock(&audit_filter_mutex); e = audit_find_rule(entry, &list); if (!e) { - mutex_unlock(&audit_filter_mutex); ret = -ENOENT; goto out; } @@ -964,10 +963,6 @@ static inline int audit_del_rule(struct audit_entry *entry) if (e->rule.tree) audit_remove_tree_rule(&e->rule); - list_del_rcu(&e->list); - list_del(&e->rule.list); - call_rcu(&e->rcu, audit_free_rule_rcu); - #ifdef CONFIG_AUDITSYSCALL if (!dont_count) audit_n_rules--; @@ -975,9 +970,14 @@ static inline int audit_del_rule(struct audit_entry *entry) if (!audit_match_signal(entry)) audit_signals--; #endif - mutex_unlock(&audit_filter_mutex); + + list_del_rcu(&e->list); + list_del(&e->rule.list); + call_rcu(&e->rcu, audit_free_rule_rcu); out: + mutex_unlock(&audit_filter_mutex); + if (tree) audit_put_tree(tree); /* that's the temporary one */ -- 1.7.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/