Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp493759pxb; Wed, 27 Jan 2021 12:57:32 -0800 (PST) X-Google-Smtp-Source: ABdhPJxCsKtka1iuIsSvaMqIiN3jK9j2lipBwRT1Gl0q6Dq0vcFyTRVav0ouPRjxoyx0+YD/xVxC X-Received: by 2002:a17:906:29d4:: with SMTP id y20mr8063845eje.294.1611781052664; Wed, 27 Jan 2021 12:57:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611781052; cv=none; d=google.com; s=arc-20160816; b=PyQjgwh5ApIBAuxewBkh3W8guEKqirJ4uJzykLye15K6OUwApIie9JSviA4pUQkSN8 816JNNiIiiFKU5NiKx7ccBvcgj3yzgwl5ELsCTN19xJvo0Z+lD+RMxzifEqRk2nn6QaX fqrGgua9ATzXoLT3jWJNqSrw0L7IYh2fp7tqH9R0O+Juo5H+vnWF2fiE2mBV46Y2PvmQ 34gPpRtBY20IX6SgXF/JWBxsJehXk2/q9wbMEjR59geP4zUAYVBXbw0B1bZ8vyQaTFyZ LLOLb/BcbKGUVFB/6mzML+/pwtO7QxA/SdnybaopaQvBCuGLyTK4kGuuM57RgmXsigfZ q+6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=6V+09PYy3UBnK+L5rrj+ECCvyFqSJJIBq/ZXEMb2bJM=; b=ahINFh8NBqdHm5AALwvBk7e+U++I7M+z4yI57SbqiQR9BXL2zIdHUFZerdCmUOlGoV VBB4u/c15MEzXTCvJrLP8FP0v44zVuDVALwzpjHi30Bc6cs4+z1yFBWWnu1e2c65+1mz X2aDOA3DAlIEXlQTBJp/M9l+GCkBnxLG436jXRARBi7x0jwwmvflGZ1JTzDQpNWiOz/s FXnR64VD1x5TbemA0bxSt60fESPsOLKbRjH3dLjdfNDZwSMTM3J52KJcsvlawhmV+5B9 NWlB0GxlAAQjTWV86dQikK7grhE8Ola7fDoJMOAKVI3YoOy9uDvwsqX+/hCoPopOelEt 7cKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZoXfkY6a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id zk17si1303781ejb.268.2021.01.27.12.57.07; Wed, 27 Jan 2021 12:57:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZoXfkY6a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237817AbhA0D7D (ORCPT + 99 others); Tue, 26 Jan 2021 22:59:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35920 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231801AbhA0CzK (ORCPT ); Tue, 26 Jan 2021 21:55:10 -0500 Received: from mail-pj1-x1043.google.com (mail-pj1-x1043.google.com [IPv6:2607:f8b0:4864:20::1043]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1AE55C0698C1 for ; Tue, 26 Jan 2021 18:52:07 -0800 (PST) Received: by mail-pj1-x1043.google.com with SMTP id cq1so393714pjb.4 for ; Tue, 26 Jan 2021 18:52:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=6V+09PYy3UBnK+L5rrj+ECCvyFqSJJIBq/ZXEMb2bJM=; b=ZoXfkY6au+f9VFrzVzXn/35yEt+V21ErdfK8UUzPrDekTn3WXfhm9eokWBKcVeDxw0 RnxGM/kYI4sBGjcH5Ae0InpMZaDF5VMiUppOOVtmAmpgsHaGS4syx9rR86kW7L8kI4Ex 7LO43eOWui4WqSuKneoZU0Yt+j3ZYxr3c1nAIwP86DabwPYijOrzHH6xk7kxpaowPyRm +cJwiC+JSlJmhhLfC77cLAp9zbzNZImMO4LKp0OZPkGayi+1H7A1VlG1hSB+j+3d5o5y FjZU87dG076x+MhAdS+tD2IEXFA/rPeXmuRYVh3krmuenfek1Vxq+wrfSAJyPwP/xXl7 fi9g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=6V+09PYy3UBnK+L5rrj+ECCvyFqSJJIBq/ZXEMb2bJM=; b=Cj+Dku67sUMF5EhcuaZe8LLqSK85EYNvqjyPAvlhslGc4kN75r2W8h0AnrYWHKrvpZ GClM2wxgl+JgmYYFTB57UdZlUSCBx+CJk9krFlQMOmB0Olo2LPudxrWqH8VUx29/m74V RgI44VEIcVXmUm3bjCRK9Q9e6+D1RIbYnbAtoXHfQTqdD4SZurAOfKvOLZNWPyb+xmNM cek8vm9Pmrjwb4L9erNXrOfcauQoeObAJ2bwrz8fhkhs6aVbefuvZfBO/ydNreVFhFEp UiDI1/6wcQ6xk8/wnqABzpFwdSAwkHcdOT/u1I0l8Hcarr1sjpWO9Mxb2feJU7V+27ln 1SQg== X-Gm-Message-State: AOAM532lwprqAZ4FI0Yp+jyHjaHRvQfvo8lFz2IVhssTX/LYPgXmTik5 JfdQfXwKpv+XRg/fdlkHxT4= X-Received: by 2002:a17:903:31ca:b029:e0:ee2:c076 with SMTP id v10-20020a17090331cab02900e00ee2c076mr7841800ple.58.1611715926642; Tue, 26 Jan 2021 18:52:06 -0800 (PST) Received: from localhost.localdomain ([178.236.46.205]) by smtp.gmail.com with ESMTPSA id h12sm346472pgs.7.2021.01.26.18.52.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 26 Jan 2021 18:52:06 -0800 (PST) From: menglong8.dong@gmail.com X-Google-Original-From: yang.yang29@zte.com.cn To: paul@paul-moore.com Cc: eparis@redhat.com, linux-audit@redhat.com, linux-kernel@vger.kernel.org, Yang Yang , Richard Guy Briggs Subject: [PATCH v2] audit: Make audit_filter_syscall() return void Date: Tue, 26 Jan 2021 18:51:43 -0800 Message-Id: <20210127025144.24253-1-yang.yang29@zte.com.cn> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yang Yang No invoker uses the return value of audit_filter_syscall(). So make it return void, and amend the comment of audit_filter_syscall(). Changes since v1: - amend the comment of audit_filter_syscall(). Signed-off-by: Yang Yang Reviewed-by: Richard Guy Briggs --- kernel/auditsc.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/kernel/auditsc.c b/kernel/auditsc.c index ce8c9e2279ba..434337ab6b2b 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c @@ -799,12 +799,12 @@ static int audit_in_mask(const struct audit_krule *rule, unsigned long val) return rule->mask[word] & bit; } -/* At syscall entry and exit time, this filter is called if the - * audit_state is not low enough that auditing cannot take place, but is - * also not high enough that we already know we have to write an audit - * record (i.e., the state is AUDIT_SETUP_CONTEXT or AUDIT_BUILD_CONTEXT). +/* At syscall exit time, this filter is called if the audit_state is + * not low enough that auditing cannot take place, but is also not + * high enough that we already know we have to write an audit record + * (i.e., the state is AUDIT_SETUP_CONTEXT or AUDIT_BUILD_CONTEXT). */ -static enum audit_state audit_filter_syscall(struct task_struct *tsk, +static void audit_filter_syscall(struct task_struct *tsk, struct audit_context *ctx, struct list_head *list) { @@ -812,7 +812,7 @@ static enum audit_state audit_filter_syscall(struct task_struct *tsk, enum audit_state state; if (auditd_test_task(tsk)) - return AUDIT_DISABLED; + return; rcu_read_lock(); list_for_each_entry_rcu(e, list, list) { @@ -821,11 +821,11 @@ static enum audit_state audit_filter_syscall(struct task_struct *tsk, &state, false)) { rcu_read_unlock(); ctx->current_state = state; - return state; + return; } } rcu_read_unlock(); - return AUDIT_BUILD_CONTEXT; + return; } /* -- 2.25.1