The patch titled

     Task watchers: register audit task watcher

has been removed from the -mm tree.  Its filename is

     task-watchers-register-audit-task-watcher.patch

This patch was dropped because it was nacked by the maintainer

------------------------------------------------------
Subject: Task watchers: register audit task watcher
From: Matt Helsley <[EMAIL PROTECTED]>

Adapt audit to use task watchers.

Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
Cc: Al Viro <[EMAIL PROTECTED]>
Cc: <[email protected]>
Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
---

 kernel/audit.c |   25 ++++++++++++++++++++++++-
 kernel/exit.c  |    3 ---
 kernel/fork.c  |    7 +------
 3 files changed, 25 insertions(+), 10 deletions(-)

diff -puN kernel/audit.c~task-watchers-register-audit-task-watcher 
kernel/audit.c
--- a/kernel/audit.c~task-watchers-register-audit-task-watcher
+++ a/kernel/audit.c
@@ -48,6 +48,7 @@
 #include <linux/module.h>
 #include <linux/err.h>
 #include <linux/kthread.h>
+#include <linux/notifier.h>
 
 #include <linux/audit.h>
 
@@ -67,6 +68,26 @@ static int   audit_initialized;
 /* No syscall auditing will take place unless audit_enabled != 0. */
 int            audit_enabled;
 
+static int audit_task(struct notifier_block *nb, unsigned long val, void *t)
+{
+       struct task_struct *tsk = t;
+
+       switch(get_watch_event(val)) {
+       case WATCH_TASK_INIT:
+               /* Hack: -EFOO sets NOTIFY_STOP_MASK */
+               return audit_alloc(tsk);
+       case WATCH_TASK_FREE:
+               if (unlikely(tsk->audit_context))
+                       audit_free(tsk);
+       default:
+               return NOTIFY_DONE;
+       }
+}
+
+static struct notifier_block __read_mostly audit_watch_tasks_nb = {
+       .notifier_call = audit_task,
+};
+
 /* Default state when kernel boots without any parameters. */
 static int     audit_default;
 
@@ -734,8 +755,10 @@ static int __init audit_enable(char *str
        printk(KERN_INFO "audit: %s%s\n",
               audit_default ? "enabled" : "disabled",
               audit_initialized ? "" : " (after initialization)");
-       if (audit_initialized)
+       if (audit_initialized) {
                audit_enabled = audit_default;
+               register_task_watcher(&audit_watch_tasks_nb);
+       }
        return 1;
 }
 
diff -puN kernel/exit.c~task-watchers-register-audit-task-watcher kernel/exit.c
--- a/kernel/exit.c~task-watchers-register-audit-task-watcher
+++ a/kernel/exit.c
@@ -35,7 +35,6 @@
 #include <linux/futex.h>
 #include <linux/compat.h>
 #include <linux/pipe_fs_i.h>
-#include <linux/audit.h> /* for audit_free() */
 #include <linux/resource.h>
 #include <linux/notifier.h>
 
@@ -907,8 +906,6 @@ fastcall NORET_TYPE void do_exit(long co
        if (unlikely(tsk->compat_robust_list))
                compat_exit_robust_list(tsk);
 #endif
-       if (unlikely(tsk->audit_context))
-               audit_free(tsk);
        tsk->exit_code = code;
        taskstats_exit_send(tsk, tidstats, group_dead, mycpu);
        taskstats_exit_free(tidstats);
diff -puN kernel/fork.c~task-watchers-register-audit-task-watcher kernel/fork.c
--- a/kernel/fork.c~task-watchers-register-audit-task-watcher
+++ a/kernel/fork.c
@@ -39,7 +39,6 @@
 #include <linux/notifier.h>
 #include <linux/ptrace.h>
 #include <linux/mount.h>
-#include <linux/audit.h>
 #include <linux/profile.h>
 #include <linux/rmap.h>
 #include <linux/acct.h>
@@ -1091,11 +1090,9 @@ static struct task_struct *copy_process(
 
        if ((retval = security_task_alloc(p)))
                goto bad_fork_cleanup_policy;
-       if ((retval = audit_alloc(p)))
-               goto bad_fork_cleanup_security;
        /* copy all the process information */
        if ((retval = copy_semundo(clone_flags, p)))
-               goto bad_fork_cleanup_audit;
+               goto bad_fork_cleanup_security;
        if ((retval = copy_files(clone_flags, p)))
                goto bad_fork_cleanup_semundo;
        if ((retval = copy_fs(clone_flags, p)))
@@ -1273,8 +1270,6 @@ bad_fork_cleanup_files:
        exit_files(p); /* blocking */
 bad_fork_cleanup_semundo:
        exit_sem(p);
-bad_fork_cleanup_audit:
-       audit_free(p);
 bad_fork_cleanup_security:
        security_task_free(p);
        notify_result = notify_watchers(WATCH_TASK_FREE, p);
_

Patches currently in -mm which might be from [EMAIL PROTECTED] are

kernel-bug-fixing-for-kernel-kmodc.patch
task-watchers-register-audit-task-watcher.patch
task-watchers-register-per-task-delay-accounting.patch
task-watchers-register-profile-as-a-task-watcher.patch
task-watchers-add-support-for-per-task-watchers.patch
task-watchers-register-semundo-task-watcher.patch
task-watchers-register-per-task-semundo-watcher.patch
ipc-replace-kmalloc-and-memset-in-get_undo_list-with-kzalloc.patch

--
Linux-audit mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/linux-audit

Reply via email to