Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/signal
Pull big execve/kernel_thread/fork unification series from Al Viro: "All architectures are converted to new model. Quite a bit of that stuff is actually shared with architecture trees; in such cases it's literally shared branch pulled by both, not a cherry-pick. A lot of ugliness and black magic is gone (-3KLoC total in this one): - kernel_thread()/kernel_execve()/sys_execve() redesign. We don't do syscalls from kernel anymore for either kernel_thread() or kernel_execve(): kernel_thread() is essentially clone(2) with callback run before we return to userland, the callbacks either never return or do successful do_execve() before returning. kernel_execve() is a wrapper for do_execve() - it doesn't need to do transition to user mode anymore. As a result kernel_thread() and kernel_execve() are arch-independent now - they live in kernel/fork.c and fs/exec.c resp. sys_execve() is also in fs/exec.c and it's completely architecture-independent. - daemonize() is gone, along with its parts in fs/*.c - struct pt_regs * is no longer passed to do_fork/copy_process/ copy_thread/do_execve/search_binary_handler/->load_binary/do_coredump. - sys_fork()/sys_vfork()/sys_clone() unified; some architectures still need wrappers (ones with callee-saved registers not saved in pt_regs on syscall entry), but the main part of those suckers is in kernel/fork.c now." * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/signal: (113 commits) do_coredump(): get rid of pt_regs argument print_fatal_signal(): get rid of pt_regs argument ptrace_signal(): get rid of unused arguments get rid of ptrace_signal_deliver() arguments new helper: signal_pt_regs() unify default ptrace_signal_deliver flagday: kill pt_regs argument of do_fork() death to idle_regs() don't pass regs to copy_process() flagday: don't pass regs to copy_thread() bfin: switch to generic vfork, get rid of pointless wrappers xtensa: switch to generic clone() openrisc: switch to use of generic fork and clone unicore32: switch to generic clone(2) score: switch to generic fork/vfork/clone c6x: sanitize copy_thread(), get rid of clone(2) wrapper, switch to generic clone() take sys_fork/sys_vfork/sys_clone prototypes to linux/syscalls.h mn10300: switch to generic fork/vfork/clone h8300: switch to generic fork/vfork/clone tile: switch to generic clone() ... Conflicts: arch/microblaze/include/asm/Kbuild
This commit is contained in:
102
kernel/auditsc.c
102
kernel/auditsc.c
@@ -200,7 +200,6 @@ struct audit_context {
|
||||
struct list_head names_list; /* anchor for struct audit_names->list */
|
||||
char * filterkey; /* key for rule that triggered record */
|
||||
struct path pwd;
|
||||
struct audit_context *previous; /* For nested syscalls */
|
||||
struct audit_aux_data *aux;
|
||||
struct audit_aux_data *aux_pids;
|
||||
struct sockaddr_storage *sockaddr;
|
||||
@@ -1091,29 +1090,13 @@ int audit_alloc(struct task_struct *tsk)
|
||||
|
||||
static inline void audit_free_context(struct audit_context *context)
|
||||
{
|
||||
struct audit_context *previous;
|
||||
int count = 0;
|
||||
|
||||
do {
|
||||
previous = context->previous;
|
||||
if (previous || (count && count < 10)) {
|
||||
++count;
|
||||
printk(KERN_ERR "audit(:%d): major=%d name_count=%d:"
|
||||
" freeing multiple contexts (%d)\n",
|
||||
context->serial, context->major,
|
||||
context->name_count, count);
|
||||
}
|
||||
audit_free_names(context);
|
||||
unroll_tree_refs(context, NULL, 0);
|
||||
free_tree_refs(context);
|
||||
audit_free_aux(context);
|
||||
kfree(context->filterkey);
|
||||
kfree(context->sockaddr);
|
||||
kfree(context);
|
||||
context = previous;
|
||||
} while (context);
|
||||
if (count >= 10)
|
||||
printk(KERN_ERR "audit: freed %d contexts\n", count);
|
||||
audit_free_names(context);
|
||||
unroll_tree_refs(context, NULL, 0);
|
||||
free_tree_refs(context);
|
||||
audit_free_aux(context);
|
||||
kfree(context->filterkey);
|
||||
kfree(context->sockaddr);
|
||||
kfree(context);
|
||||
}
|
||||
|
||||
void audit_log_task_context(struct audit_buffer *ab)
|
||||
@@ -1783,42 +1766,6 @@ void __audit_syscall_entry(int arch, int major,
|
||||
if (!context)
|
||||
return;
|
||||
|
||||
/*
|
||||
* This happens only on certain architectures that make system
|
||||
* calls in kernel_thread via the entry.S interface, instead of
|
||||
* with direct calls. (If you are porting to a new
|
||||
* architecture, hitting this condition can indicate that you
|
||||
* got the _exit/_leave calls backward in entry.S.)
|
||||
*
|
||||
* i386 no
|
||||
* x86_64 no
|
||||
* ppc64 yes (see arch/powerpc/platforms/iseries/misc.S)
|
||||
*
|
||||
* This also happens with vm86 emulation in a non-nested manner
|
||||
* (entries without exits), so this case must be caught.
|
||||
*/
|
||||
if (context->in_syscall) {
|
||||
struct audit_context *newctx;
|
||||
|
||||
#if AUDIT_DEBUG
|
||||
printk(KERN_ERR
|
||||
"audit(:%d) pid=%d in syscall=%d;"
|
||||
" entering syscall=%d\n",
|
||||
context->serial, tsk->pid, context->major, major);
|
||||
#endif
|
||||
newctx = audit_alloc_context(context->state);
|
||||
if (newctx) {
|
||||
newctx->previous = context;
|
||||
context = newctx;
|
||||
tsk->audit_context = newctx;
|
||||
} else {
|
||||
/* If we can't alloc a new context, the best we
|
||||
* can do is to leak memory (any pending putname
|
||||
* will be lost). The only other alternative is
|
||||
* to abandon auditing. */
|
||||
audit_zero_context(context, context->state);
|
||||
}
|
||||
}
|
||||
BUG_ON(context->in_syscall || context->name_count);
|
||||
|
||||
if (!audit_enabled)
|
||||
@@ -1881,28 +1828,21 @@ void __audit_syscall_exit(int success, long return_code)
|
||||
if (!list_empty(&context->killed_trees))
|
||||
audit_kill_trees(&context->killed_trees);
|
||||
|
||||
if (context->previous) {
|
||||
struct audit_context *new_context = context->previous;
|
||||
context->previous = NULL;
|
||||
audit_free_context(context);
|
||||
tsk->audit_context = new_context;
|
||||
} else {
|
||||
audit_free_names(context);
|
||||
unroll_tree_refs(context, NULL, 0);
|
||||
audit_free_aux(context);
|
||||
context->aux = NULL;
|
||||
context->aux_pids = NULL;
|
||||
context->target_pid = 0;
|
||||
context->target_sid = 0;
|
||||
context->sockaddr_len = 0;
|
||||
context->type = 0;
|
||||
context->fds[0] = -1;
|
||||
if (context->state != AUDIT_RECORD_CONTEXT) {
|
||||
kfree(context->filterkey);
|
||||
context->filterkey = NULL;
|
||||
}
|
||||
tsk->audit_context = context;
|
||||
audit_free_names(context);
|
||||
unroll_tree_refs(context, NULL, 0);
|
||||
audit_free_aux(context);
|
||||
context->aux = NULL;
|
||||
context->aux_pids = NULL;
|
||||
context->target_pid = 0;
|
||||
context->target_sid = 0;
|
||||
context->sockaddr_len = 0;
|
||||
context->type = 0;
|
||||
context->fds[0] = -1;
|
||||
if (context->state != AUDIT_RECORD_CONTEXT) {
|
||||
kfree(context->filterkey);
|
||||
context->filterkey = NULL;
|
||||
}
|
||||
tsk->audit_context = context;
|
||||
}
|
||||
|
||||
static inline void handle_one(const struct inode *inode)
|
||||
|
Reference in New Issue
Block a user