Commit 4eb0f4ab authored by Richard Guy Briggs's avatar Richard Guy Briggs Committed by Eric Paris

smack: call WARN_ONCE() instead of calling audit_log_start()

Remove the call to audit_log() (which call audit_log_start()) and deal with
the errors in the caller, logging only once if the condition is met.  Calling
audit_log_start() in this location makes buffer allocation and locking more
complicated in the calling tree (audit_filter_user()).
Signed-off-by: default avatarRichard Guy Briggs <rgb@redhat.com>
Signed-off-by: default avatarEric Paris <eparis@redhat.com>
parent 9ad42a79
...@@ -3615,9 +3615,8 @@ static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, ...@@ -3615,9 +3615,8 @@ static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule,
struct smack_known *skp; struct smack_known *skp;
char *rule = vrule; char *rule = vrule;
if (!rule) { if (unlikely(!rule)) {
audit_log(actx, GFP_ATOMIC, AUDIT_SELINUX_ERR, WARN_ONCE(1, "Smack: missing rule\n");
"Smack: missing rule\n");
return -ENOENT; return -ENOENT;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment