An error occurred fetching the project authors.
  1. 14 Sep, 2021 1 commit
  2. 11 Jun, 2021 1 commit
  3. 09 Jun, 2021 1 commit
  4. 10 May, 2021 1 commit
  5. 22 Mar, 2021 1 commit
    • Paul Moore's avatar
      lsm: separate security_task_getsecid() into subjective and objective variants · 4ebd7651
      Paul Moore authored
      Of the three LSMs that implement the security_task_getsecid() LSM
      hook, all three LSMs provide the task's objective security
      credentials.  This turns out to be unfortunate as most of the hook's
      callers seem to expect the task's subjective credentials, although
      a small handful of callers do correctly expect the objective
      credentials.
      
      This patch is the first step towards fixing the problem: it splits
      the existing security_task_getsecid() hook into two variants, one
      for the subjective creds, one for the objective creds.
      
        void security_task_getsecid_subj(struct task_struct *p,
      				   u32 *secid);
        void security_task_getsecid_obj(struct task_struct *p,
      				  u32 *secid);
      
      While this patch does fix all of the callers to use the correct
      variant, in order to keep this patch focused on the callers and to
      ease review, the LSMs continue to use the same implementation for
      both hooks.  The net effect is that this patch should not change
      the behavior of the kernel in any way, it will be up to the latter
      LSM specific patches in this series to change the hook
      implementations and return the correct credentials.
      
      Acked-by: Mimi Zohar <zohar@linux.ibm.com> (IMA)
      Acked-by: default avatarCasey Schaufler <casey@schaufler-ca.com>
      Reviewed-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      4ebd7651
  6. 12 Mar, 2021 1 commit
  7. 28 Jan, 2021 1 commit
  8. 24 Jan, 2021 1 commit
    • Christian Brauner's avatar
      commoncap: handle idmapped mounts · 71bc356f
      Christian Brauner authored
      When interacting with user namespace and non-user namespace aware
      filesystem capabilities the vfs will perform various security checks to
      determine whether or not the filesystem capabilities can be used by the
      caller, whether they need to be removed and so on. The main
      infrastructure for this resides in the capability codepaths but they are
      called through the LSM security infrastructure even though they are not
      technically an LSM or optional. This extends the existing security hooks
      security_inode_removexattr(), security_inode_killpriv(),
      security_inode_getsecurity() to pass down the mount's user namespace and
      makes them aware of idmapped mounts.
      
      In order to actually get filesystem capabilities from disk the
      capability infrastructure exposes the get_vfs_caps_from_disk() helper.
      For user namespace aware filesystem capabilities a root uid is stored
      alongside the capabilities.
      
      In order to determine whether the caller can make use of the filesystem
      capability or whether it needs to be ignored it is translated according
      to the superblock's user namespace. If it can be translated to uid 0
      according to that id mapping the caller can use the filesystem
      capabilities stored on disk. If we are accessing the inode that holds
      the filesystem capabilities through an idmapped mount we map the root
      uid according to the mount's user namespace. Afterwards the checks are
      identical to non-idmapped mounts: reading filesystem caps from disk
      enforces that the root uid associated with the filesystem capability
      must have a mapping in the superblock's user namespace and that the
      caller is either in the same user namespace or is a descendant of the
      superblock's user namespace. For filesystems that are mountable inside
      user namespace the caller can just mount the filesystem and won't
      usually need to idmap it. If they do want to idmap it they can create an
      idmapped mount and mark it with a user namespace they created and which
      is thus a descendant of s_user_ns. For filesystems that are not
      mountable inside user namespaces the descendant rule is trivially true
      because the s_user_ns will be the initial user namespace.
      
      If the initial user namespace is passed nothing changes so non-idmapped
      mounts will see identical behavior as before.
      
      Link: https://lore.kernel.org/r/20210121131959.646623-11-christian.brauner@ubuntu.com
      Cc: Christoph Hellwig <hch@lst.de>
      Cc: David Howells <dhowells@redhat.com>
      Cc: Al Viro <viro@zeniv.linux.org.uk>
      Cc: linux-fsdevel@vger.kernel.org
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Acked-by: default avatarJames Morris <jamorris@linux.microsoft.com>
      Signed-off-by: default avatarChristian Brauner <christian.brauner@ubuntu.com>
      71bc356f
  9. 25 Nov, 2020 1 commit
    • Alex Shi's avatar
      audit: fix macros warnings · ba59eae7
      Alex Shi authored
      Some unused macros could cause gcc warning:
      kernel/audit.c:68:0: warning: macro "AUDIT_UNINITIALIZED" is not used
      [-Wunused-macros]
      kernel/auditsc.c:104:0: warning: macro "AUDIT_AUX_IPCPERM" is not used
      [-Wunused-macros]
      kernel/auditsc.c:82:0: warning: macro "AUDITSC_INVALID" is not used
      [-Wunused-macros]
      
      AUDIT_UNINITIALIZED and AUDITSC_INVALID are still meaningful and should
      be in incorporated.
      
      Just remove AUDIT_AUX_IPCPERM.
      
      Thanks comments from Richard Guy Briggs and Paul Moore.
      Signed-off-by: default avatarAlex Shi <alex.shi@linux.alibaba.com>
      Cc: Paul Moore <paul@paul-moore.com>
      Cc: Richard Guy Briggs <rgb@redhat.com>
      Cc: Eric Paris <eparis@redhat.com>
      Cc: linux-audit@redhat.com
      Cc: linux-kernel@vger.kernel.org
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      ba59eae7
  10. 16 Nov, 2020 1 commit
  11. 28 Oct, 2020 1 commit
    • Richard Guy Briggs's avatar
      audit: trigger accompanying records when no rules present · 6d915476
      Richard Guy Briggs authored
      When there are no audit rules registered, mandatory records (config,
      etc.) are missing their accompanying records (syscall, proctitle, etc.).
      
      This is due to audit context dummy set on syscall entry based on absence
      of rules that signals that no other records are to be printed.  Clear the dummy
      bit if any record is generated, open coding this in audit_log_start().
      
      The proctitle context and dummy checks are pointless since the
      proctitle record will not be printed if no syscall records are printed.
      
      The fds array is reset to -1 after the first syscall to indicate it
      isn't valid any more, but was never set to -1 when the context was
      allocated to indicate it wasn't yet valid.
      
      Check ctx->pwd in audit_log_name().
      
      The audit_inode* functions can be called without going through
      getname_flags() or getname_kernel() that sets audit_names and cwd, so
      set the cwd in audit_alloc_name() if it has not already been done so due to
      audit_names being valid and purge all other audit_getcwd() calls.
      
      Revert the LSM dump_common_audit_data() LSM_AUDIT_DATA_* cases from the
      ghak96 patch since they are no longer necessary due to cwd coverage in
      audit_alloc_name().
      
      Thanks to bauen1 <j2468h@googlemail.com> for reporting LSM situations in
      which context->cwd is not valid, inadvertantly fixed by the ghak96 patch.
      
      Please see upstream github issue
      https://github.com/linux-audit/audit-kernel/issues/120
      This is also related to upstream github issue
      https://github.com/linux-audit/audit-kernel/issues/96Signed-off-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      6d915476
  12. 29 Jul, 2020 1 commit
    • Paul Moore's avatar
      revert: 1320a405 ("audit: trigger accompanying records when no rules present") · 8ac68dc4
      Paul Moore authored
      Unfortunately the commit listed in the subject line above failed
      to ensure that the task's audit_context was properly initialized/set
      before enabling the "accompanying records".  Depending on the
      situation, the resulting audit_context could have invalid values in
      some of it's fields which could cause a kernel panic/oops when the
      task/syscall exists and the audit records are generated.
      
      We will revisit the original patch, with the necessary fixes, in a
      future kernel but right now we just want to fix the kernel panic
      with the least amount of added risk.
      
      Cc: stable@vger.kernel.org
      Fixes: 1320a405 ("audit: trigger accompanying records when no rules present")
      Reported-by: j2468h@googlemail.com
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      8ac68dc4
  13. 08 Jul, 2020 1 commit
  14. 29 Jun, 2020 1 commit
  15. 24 Jun, 2020 1 commit
    • Richard Guy Briggs's avatar
      audit: log nftables configuration change events · 8e6cf365
      Richard Guy Briggs authored
      iptables, ip6tables, arptables and ebtables table registration,
      replacement and unregistration configuration events are logged for the
      native (legacy) iptables setsockopt api, but not for the
      nftables netlink api which is used by the nft-variant of iptables in
      addition to nftables itself.
      
      Add calls to log the configuration actions in the nftables netlink api.
      
      This uses the same NETFILTER_CFG record format but overloads the table
      field.
      
        type=NETFILTER_CFG msg=audit(2020-05-28 17:46:41.878:162) : table=?:0;?:0 family=unspecified entries=2 op=nft_register_gen pid=396 subj=system_u:system_r:firewalld_t:s0 comm=firewalld
        ...
        type=NETFILTER_CFG msg=audit(2020-05-28 17:46:41.878:162) : table=firewalld:1;?:0 family=inet entries=0 op=nft_register_table pid=396 subj=system_u:system_r:firewalld_t:s0 comm=firewalld
        ...
        type=NETFILTER_CFG msg=audit(2020-05-28 17:46:41.911:163) : table=firewalld:1;filter_FORWARD:85 family=inet entries=8 op=nft_register_chain pid=396 subj=system_u:system_r:firewalld_t:s0 comm=firewalld
        ...
        type=NETFILTER_CFG msg=audit(2020-05-28 17:46:41.911:163) : table=firewalld:1;filter_FORWARD:85 family=inet entries=101 op=nft_register_rule pid=396 subj=system_u:system_r:firewalld_t:s0 comm=firewalld
        ...
        type=NETFILTER_CFG msg=audit(2020-05-28 17:46:41.911:163) : table=firewalld:1;__set0:87 family=inet entries=87 op=nft_register_setelem pid=396 subj=system_u:system_r:firewalld_t:s0 comm=firewalld
        ...
        type=NETFILTER_CFG msg=audit(2020-05-28 17:46:41.911:163) : table=firewalld:1;__set0:87 family=inet entries=0 op=nft_register_set pid=396 subj=system_u:system_r:firewalld_t:s0 comm=firewalld
      
      For further information please see issue
      https://github.com/linux-audit/audit-kernel/issues/124Signed-off-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      8e6cf365
  16. 20 May, 2020 1 commit
    • Richard Guy Briggs's avatar
      audit: add subj creds to NETFILTER_CFG record to · 9d44a121
      Richard Guy Briggs authored
      Some table unregister actions seem to be initiated by the kernel to
      garbage collect unused tables that are not initiated by any userspace
      actions.  It was found to be necessary to add the subject credentials to
      cover this case to reveal the source of these actions.  A sample record:
      
      The uid, auid, tty, ses and exe fields have not been included since they
      are in the SYSCALL record and contain nothing useful in the non-user
      context.
      
      Here are two sample orphaned records:
      
        type=NETFILTER_CFG msg=audit(2020-05-20 12:14:36.505:5) : table=filter family=ipv4 entries=0 op=register pid=1 subj=kernel comm=swapper/0
      
        type=NETFILTER_CFG msg=audit(2020-05-20 12:15:27.701:301) : table=nat family=bridge entries=0 op=unregister pid=30 subj=system_u:system_r:kernel_t:s0 comm=kworker/u4:1
      Signed-off-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      9d44a121
  17. 01 May, 2020 1 commit
  18. 28 Apr, 2020 2 commits
  19. 12 Mar, 2020 1 commit
  20. 23 Nov, 2019 1 commit
  21. 20 Nov, 2019 1 commit
    • Daniel Borkmann's avatar
      bpf: Emit audit messages upon successful prog load and unload · 91e6015b
      Daniel Borkmann authored
      Allow for audit messages to be emitted upon BPF program load and
      unload for having a timeline of events. The load itself is in
      syscall context, so additional info about the process initiating
      the BPF prog creation can be logged and later directly correlated
      to the unload event.
      
      The only info really needed from BPF side is the globally unique
      prog ID where then audit user space tooling can query / dump all
      info needed about the specific BPF program right upon load event
      and enrich the record, thus these changes needed here can be kept
      small and non-intrusive to the core.
      
      Raw example output:
      
        # auditctl -D
        # auditctl -a always,exit -F arch=x86_64 -S bpf
        # ausearch --start recent -m 1334
        [...]
        ----
        time->Wed Nov 20 12:45:51 2019
        type=PROCTITLE msg=audit(1574271951.590:8974): proctitle="./test_verifier"
        type=SYSCALL msg=audit(1574271951.590:8974): arch=c000003e syscall=321 success=yes exit=14 a0=5 a1=7ffe2d923e80 a2=78 a3=0 items=0 ppid=742 pid=949 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=2 comm="test_verifier" exe="/root/bpf-next/tools/testing/selftests/bpf/test_verifier" subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)
        type=UNKNOWN[1334] msg=audit(1574271951.590:8974): auid=0 uid=0 gid=0 ses=2 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 pid=949 comm="test_verifier" exe="/root/bpf-next/tools/testing/selftests/bpf/test_verifier" prog-id=3260 event=LOAD
        ----
        time->Wed Nov 20 12:45:51 2019
      type=UNKNOWN[1334] msg=audit(1574271951.590:8975): prog-id=3260 event=UNLOAD
        ----
        [...]
      Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
      Signed-off-by: default avatarJiri Olsa <jolsa@kernel.org>
      Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
      Link: https://lore.kernel.org/bpf/20191120213816.8186-1-jolsa@kernel.org
      91e6015b
  22. 28 May, 2019 1 commit
  23. 24 May, 2019 1 commit
    • Richard Guy Briggs's avatar
      audit: add saddr_fam filter field · bf361231
      Richard Guy Briggs authored
      Provide a method to filter out sockaddr and bind calls by network
      address family.
      
      Existing SOCKADDR records are listed for any network activity.
      Implement the AUDIT_SADDR_FAM field selector to be able to classify or
      limit records to specific network address families, such as AF_INET or
      AF_INET6.
      
      An example of a network record that is unlikely to be useful and flood
      the logs:
      
      type=SOCKADDR msg=audit(07/27/2017 12:18:27.019:845) : saddr={ fam=local
      path=/var/run/nscd/socket }
      type=SYSCALL msg=audit(07/27/2017 12:18:27.019:845) : arch=x86_64
      syscall=connect success=no exit=ENOENT(No such file or directory) a0=0x3
      a1=0x7fff229c4980 a2=0x6e a3=0x6 items=1 ppid=3301 pid=6145 auid=sgrubb
      uid=sgrubb gid=sgrubb euid=sgrubb suid=sgrubb fsuid=sgrubb egid=sgrubb
      sgid=sgrubb fsgid=sgrubb tty=pts3 ses=4 comm=bash exe=/usr/bin/bash
      subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
      key=network-test
      
      Please see the audit-testsuite PR at
      https://github.com/linux-audit/audit-testsuite/pull/87
      Please see the github issue
      https://github.com/linux-audit/audit-kernel/issues/64
      Please see the github issue for the accompanying userspace support
      https://github.com/linux-audit/audit-userspace/issues/93Signed-off-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      [PM: merge fuzz in auditfilter.c]
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      bf361231
  24. 22 May, 2019 1 commit
  25. 29 Apr, 2019 1 commit
  26. 15 Apr, 2019 2 commits
    • Ondrej Mosnacek's avatar
      ntp: Audit NTP parameters adjustment · 7e8eda73
      Ondrej Mosnacek authored
      Emit an audit record every time selected NTP parameters are modified
      from userspace (via adjtimex(2) or clock_adjtime(2)). These parameters
      may be used to indirectly change system clock, and thus their
      modifications should be audited.
      
      Such events will now generate records of type AUDIT_TIME_ADJNTPVAL
      containing the following fields:
        - op -- which value was adjusted:
          - offset -- corresponding to the time_offset variable
          - freq   -- corresponding to the time_freq variable
          - status -- corresponding to the time_status variable
          - adjust -- corresponding to the time_adjust variable
          - tick   -- corresponding to the tick_usec variable
          - tai    -- corresponding to the timekeeping's TAI offset
        - old -- the old value
        - new -- the new value
      
      Example records:
      
      type=TIME_ADJNTPVAL msg=audit(1530616044.507:7): op=status old=64 new=8256
      type=TIME_ADJNTPVAL msg=audit(1530616044.511:11): op=freq old=0 new=49180377088000
      
      The records of this type will be associated with the corresponding
      syscall records.
      
      An overview of parameter changes that can be done via do_adjtimex()
      (based on information from Miroslav Lichvar) and whether they are
      audited:
        __timekeeping_set_tai_offset() -- sets the offset from the
                                          International Atomic Time
                                          (AUDITED)
        NTP variables:
          time_offset -- can adjust the clock by up to 0.5 seconds per call
                         and also speed it up or slow down by up to about
                         0.05% (43 seconds per day) (AUDITED)
          time_freq -- can speed up or slow down by up to about 0.05%
                       (AUDITED)
          time_status -- can insert/delete leap seconds and it also enables/
                         disables synchronization of the hardware real-time
                         clock (AUDITED)
          time_maxerror, time_esterror -- change error estimates used to
                                          inform userspace applications
                                          (NOT AUDITED)
          time_constant -- controls the speed of the clock adjustments that
                           are made when time_offset is set (NOT AUDITED)
          time_adjust -- can temporarily speed up or slow down the clock by up
                         to 0.05% (AUDITED)
          tick_usec -- a more extreme version of time_freq; can speed up or
                       slow down the clock by up to 10% (AUDITED)
      Signed-off-by: default avatarOndrej Mosnacek <omosnace@redhat.com>
      Reviewed-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      Reviewed-by: default avatarThomas Gleixner <tglx@linutronix.de>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      7e8eda73
    • Ondrej Mosnacek's avatar
      timekeeping: Audit clock adjustments · 2d87a067
      Ondrej Mosnacek authored
      Emit an audit record whenever the system clock is changed (i.e. shifted
      by a non-zero offset) by a syscall from userspace. The syscalls than can
      (at the time of writing) trigger such record are:
        - settimeofday(2), stime(2), clock_settime(2) -- via
          do_settimeofday64()
        - adjtimex(2), clock_adjtime(2) -- via do_adjtimex()
      
      The new records have type AUDIT_TIME_INJOFFSET and contain the following
      fields:
        - sec -- the 'seconds' part of the offset
        - nsec -- the 'nanoseconds' part of the offset
      
      Example record (time was shifted backwards by ~15.875 seconds):
      
      type=TIME_INJOFFSET msg=audit(1530616049.652:13): sec=-16 nsec=124887145
      
      The records of this type will be associated with the corresponding
      syscall records.
      Signed-off-by: default avatarOndrej Mosnacek <omosnace@redhat.com>
      Reviewed-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      Reviewed-by: default avatarThomas Gleixner <tglx@linutronix.de>
      [PM: fixed a line width problem in __audit_tk_injoffset()]
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      2d87a067
  27. 08 Apr, 2019 1 commit
  28. 21 Mar, 2019 2 commits
    • Dmitry V. Levin's avatar
      syscall_get_arch: add "struct task_struct *" argument · 16add411
      Dmitry V. Levin authored
      This argument is required to extend the generic ptrace API with
      PTRACE_GET_SYSCALL_INFO request: syscall_get_arch() is going
      to be called from ptrace_request() along with syscall_get_nr(),
      syscall_get_arguments(), syscall_get_error(), and
      syscall_get_return_value() functions with a tracee as their argument.
      
      The primary intent is that the triple (audit_arch, syscall_nr, arg1..arg6)
      should describe what system call is being called and what its arguments
      are.
      
      Reverts: 5e937a9a ("syscall_get_arch: remove useless function arguments")
      Reverts: 1002d94d ("syscall.h: fix doc text for syscall_get_arch()")
      Reviewed-by: Andy Lutomirski <luto@kernel.org> # for x86
      Reviewed-by: default avatarPalmer Dabbelt <palmer@sifive.com>
      Acked-by: default avatarPaul Moore <paul@paul-moore.com>
      Acked-by: Paul Burton <paul.burton@mips.com> # MIPS parts
      Acked-by: Michael Ellerman <mpe@ellerman.id.au> (powerpc)
      Acked-by: Kees Cook <keescook@chromium.org> # seccomp parts
      Acked-by: Mark Salter <msalter@redhat.com> # for the c6x bit
      Cc: Elvira Khabirova <lineprinter@altlinux.org>
      Cc: Eugene Syromyatnikov <esyr@redhat.com>
      Cc: Oleg Nesterov <oleg@redhat.com>
      Cc: x86@kernel.org
      Cc: linux-alpha@vger.kernel.org
      Cc: linux-snps-arc@lists.infradead.org
      Cc: linux-arm-kernel@lists.infradead.org
      Cc: linux-c6x-dev@linux-c6x.org
      Cc: uclinux-h8-devel@lists.sourceforge.jp
      Cc: linux-hexagon@vger.kernel.org
      Cc: linux-ia64@vger.kernel.org
      Cc: linux-m68k@lists.linux-m68k.org
      Cc: linux-mips@vger.kernel.org
      Cc: nios2-dev@lists.rocketboards.org
      Cc: openrisc@lists.librecores.org
      Cc: linux-parisc@vger.kernel.org
      Cc: linuxppc-dev@lists.ozlabs.org
      Cc: linux-riscv@lists.infradead.org
      Cc: linux-s390@vger.kernel.org
      Cc: linux-sh@vger.kernel.org
      Cc: sparclinux@vger.kernel.org
      Cc: linux-um@lists.infradead.org
      Cc: linux-xtensa@linux-xtensa.org
      Cc: linux-arch@vger.kernel.org
      Cc: linux-audit@redhat.com
      Signed-off-by: default avatarDmitry V. Levin <ldv@altlinux.org>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      16add411
    • YueHaibing's avatar
      audit: Make audit_log_cap and audit_copy_inode static · 2efa48fe
      YueHaibing authored
      Fix sparse warning:
      
      kernel/auditsc.c:1150:6: warning: symbol 'audit_log_cap' was not declared. Should it be static?
      kernel/auditsc.c:1908:6: warning: symbol 'audit_copy_inode' was not declared. Should it be static?
      Signed-off-by: default avatarYueHaibing <yuehaibing@huawei.com>
      Acked-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      2efa48fe
  29. 18 Mar, 2019 1 commit
    • Li RongQing's avatar
      audit: fix a memleak caused by auditing load module · 95e0b46f
      Li RongQing authored
      module.name will be allocated unconditionally when auditing load
      module, and audit_log_start() can fail with other reasons, or
      audit_log_exit maybe not called, caused module.name is not freed
      
      so free module.name in audit_free_context and __audit_syscall_exit
      
      unreferenced object 0xffff88af90837d20 (size 8):
        comm "modprobe", pid 1036, jiffies 4294704867 (age 3069.138s)
        hex dump (first 8 bytes):
          69 78 67 62 65 00 ff ff                          ixgbe...
        backtrace:
          [<0000000008da28fe>] __audit_log_kern_module+0x33/0x80
          [<00000000c1491e61>] load_module+0x64f/0x3850
          [<000000007fc9ae3f>] __do_sys_init_module+0x218/0x250
          [<0000000000d4a478>] do_syscall_64+0x117/0x400
          [<000000004924ded8>] entry_SYSCALL_64_after_hwframe+0x49/0xbe
          [<000000007dc331dd>] 0xffffffffffffffff
      
      Fixes: ca86cad7 ("audit: log module name on init_module")
      Signed-off-by: default avatarZhang Yu <zhangyu31@baidu.com>
      Signed-off-by: default avatarLi RongQing <lirongqing@baidu.com>
      [PM: manual merge fixup in __audit_syscall_exit()]
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      95e0b46f
  30. 03 Feb, 2019 1 commit
  31. 01 Feb, 2019 1 commit
  32. 31 Jan, 2019 1 commit
    • Richard Guy Briggs's avatar
      audit: ignore fcaps on umount · 57d46577
      Richard Guy Briggs authored
      Don't fetch fcaps when umount2 is called to avoid a process hang while
      it waits for the missing resource to (possibly never) re-appear.
      
      Note the comment above user_path_mountpoint_at():
       * A umount is a special case for path walking. We're not actually interested
       * in the inode in this situation, and ESTALE errors can be a problem.  We
       * simply want track down the dentry and vfsmount attached at the mountpoint
       * and avoid revalidating the last component.
      
      This can happen on ceph, cifs, 9p, lustre, fuse (gluster) or NFS.
      
      Please see the github issue tracker
      https://github.com/linux-audit/audit-kernel/issues/100Signed-off-by: default avatarRichard Guy Briggs <rgb@redhat.com>
      [PM: merge fuzz in audit_log_fcaps()]
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      57d46577
  33. 25 Jan, 2019 3 commits
  34. 14 Jan, 2019 1 commit
  35. 26 Nov, 2018 1 commit