• Chen Gang's avatar
    kernel/audit_tree.c:audit_add_tree_rule(): protect `rule' from kill_rules() · 736f3203
    Chen Gang authored
    audit_add_tree_rule() must set 'rule->tree = NULL;' firstly, to protect
    the rule itself freed in kill_rules().
    
    The reason is when it is killed, the 'rule' itself may have already
    released, we should not access it.  one example: we add a rule to an
    inode, just at the same time the other task is deleting this inode.
    
    The work flow for adding a rule:
    
        audit_receive() -> (need audit_cmd_mutex lock)
          audit_receive_skb() ->
            audit_receive_msg() ->
              audit_receive_filter() ->
                audit_add_rule() ->
                  audit_add_tree_rule() -> (need audit_filter_mutex lock)
                    ...
                    unlock audit_filter_mutex
                    get_tree()
                    ...
                    iterate_mounts() -> (iterate all related inodes)
                      tag_mount() ->
                        tag_trunk() ->
                          create_trunk() -> (assume it is 1st rule)
                            fsnotify_add_...
    736f3203
audit_tree.c 22.2 KB