able+0x3b3/0x422
kernel_init+0x24/0x1e0
ret_from_fork+0x1f/0x30
Signed-off-by: Gaosheng Cui
[PM: remove bad 'Fixes' tag as issue predates git, added in v2.6.6-rc1]
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
include/uapi/linux/audit.h | 2 +-
1 file changed, 1 inse
able+0x3b3/0x422
kernel_init+0x24/0x1e0
ret_from_fork+0x1f/0x30
Signed-off-by: Gaosheng Cui
[PM: remove bad 'Fixes' tag as issue predates git, added in v2.6.6-rc1]
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
include/uapi/linux/audit.h | 2 +-
1 file changed, 1 inse
able+0x3b3/0x422
kernel_init+0x24/0x1e0
ret_from_fork+0x1f/0x30
Signed-off-by: Gaosheng Cui
[PM: remove bad 'Fixes' tag as issue predates git, added in v2.6.6-rc1]
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
include/uapi/linux/audit.h | 2 +-
1 file changed, 1 inse
able+0x3b3/0x422
kernel_init+0x24/0x1e0
ret_from_fork+0x1f/0x30
Signed-off-by: Gaosheng Cui
[PM: remove bad 'Fixes' tag as issue predates git, added in v2.6.6-rc1]
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
include/uapi/linux/audit.h | 2 +-
1 file changed, 1 inse
able+0x3b3/0x422
kernel_init+0x24/0x1e0
ret_from_fork+0x1f/0x30
Signed-off-by: Gaosheng Cui
[PM: remove bad 'Fixes' tag as issue predates git, added in v2.6.6-rc1]
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
include/uapi/linux/audit.h | 2 +-
1 file changed, 1 inse
able+0x3b3/0x422
kernel_init+0x24/0x1e0
ret_from_fork+0x1f/0x30
Signed-off-by: Gaosheng Cui
[PM: remove bad 'Fixes' tag as issue predates git, added in v2.6.6-rc1]
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
include/uapi/linux/audit.h | 2 +-
1 file changed, 1 inse
able+0x3b3/0x422
kernel_init+0x24/0x1e0
ret_from_fork+0x1f/0x30
Signed-off-by: Gaosheng Cui
[PM: remove bad 'Fixes' tag as issue predates git, added in v2.6.6-rc1]
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
include/uapi/linux/audit.h | 2 +-
1 file changed, 1 inse
these privileged userspace tasks after
they have finished their audit processing, and dropped the audit
control mutex, but before they return to userspace.
Reported-by: Gaosheng Cui
Tested-by: Gaosheng Cui
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
k
these privileged userspace tasks after
they have finished their audit processing, and dropped the audit
control mutex, but before they return to userspace.
Reported-by: Gaosheng Cui
Tested-by: Gaosheng Cui
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
k
these privileged userspace tasks after
they have finished their audit processing, and dropped the audit
control mutex, but before they return to userspace.
Reported-by: Gaosheng Cui
Tested-by: Gaosheng Cui
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
k
these privileged userspace tasks after
they have finished their audit processing, and dropped the audit
control mutex, but before they return to userspace.
Reported-by: Gaosheng Cui
Tested-by: Gaosheng Cui
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
k
these privileged userspace tasks after
they have finished their audit processing, and dropped the audit
control mutex, but before they return to userspace.
Reported-by: Gaosheng Cui
Tested-by: Gaosheng Cui
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
k
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
On Sun, Aug 02, 2020 at 01:55:45PM +0200, Pavel Machek wrote:
Hi!
IPE is a Linux Security Module which allows for a configurable
policy to enforce integrity requirements on the whole system. It
attempts to solve the issue of Code Integrity: that any code being
executed (or files being read), ar
audit_send_list() to audit_send_list_thread() to better
match its cousin, audit_send_reply_thread().
Reported-by: teroi...@gmail.com
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit.c | 2 +-
kernel/audit.h | 2 +-
kernel/auditfilter.c
audit_send_list() to audit_send_list_thread() to better
match its cousin, audit_send_reply_thread().
Reported-by: teroi...@gmail.com
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit.c | 2 +-
kernel/audit.h | 2 +-
kernel/auditfilter.c
audit_send_list() to audit_send_list_thread() to better
match its cousin, audit_send_reply_thread().
Reported-by: teroi...@gmail.com
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit.c | 2 +-
kernel/audit.h | 2 +-
kernel/auditfilter.c
audit_send_list() to audit_send_list_thread() to better
match its cousin, audit_send_reply_thread().
Reported-by: teroi...@gmail.com
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit.c | 2 +-
kernel/audit.h | 2 +-
kernel/auditfilter.c
cleanups that came up while fixing the code.
Reported-by: teroi...@gmail.com
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit.c | 50 +-
1 file changed, 29 insertions(+), 21 deletions(-)
diff
cleanups that came up while fixing the code.
Reported-by: teroi...@gmail.com
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit.c | 50 +-
1 file changed, 29 insertions(+), 21 deletions(-)
diff
cleanups that came up while fixing the code.
Reported-by: teroi...@gmail.com
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit.c | 50 +-
1 file changed, 29 insertions(+), 21 deletions(-)
diff
cleanups that came up while fixing the code.
Reported-by: teroi...@gmail.com
Reviewed-by: Richard Guy Briggs
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit.c | 50 +-
1 file changed, 29 insertions(+), 21 deletions(-)
diff
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
d which is sufficient.
The correct resolution is to drop logging config_update events since
the watch is still in effect but just on another unknown inode.
Signed-off-by: Steve Grubb
Signed-off-by: Paul Moore
Signed-off-by: Sasha Levin
---
kernel/audit_watch.c | 2 --
1 file changed, 2 deletions(-)
di
From: Al Viro
[ Upstream commit 69924b89687a2923e88cc42144aea27868913d0e ]
if the child has been negative and just went positive
under us, we want coherent d_is_positive() and ->d_inode.
Don't unlock the parent until we'd done that work...
Signed-off-by: Al Viro
Signed-off-by
From: Al Viro
[ Upstream commit 69924b89687a2923e88cc42144aea27868913d0e ]
if the child has been negative and just went positive
under us, we want coherent d_is_positive() and ->d_inode.
Don't unlock the parent until we'd done that work...
Signed-off-by: Al Viro
Signed-off-by
From: Al Viro
[ Upstream commit 69924b89687a2923e88cc42144aea27868913d0e ]
if the child has been negative and just went positive
under us, we want coherent d_is_positive() and ->d_inode.
Don't unlock the parent until we'd done that work...
Signed-off-by: Al Viro
Signed-off-by
On 01/19/2015 03:08 PM, Paul Moore wrote:
> There are several areas in the kernel that create temporary filename
> objects using the following pattern:
>
> int func(const char *name)
> {
> struct filename *file = { .name = name };
> ...
> retur
37 matches
Mail list logo