mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-04 16:35:02 +01:00
The AppArmor user space development project.
![]() It turns out that audit and selinux were modified to slightly change the behavior of getprocattr. The changes are: 1. when the audit subsystem calls security_getprocattr it only allows for a return code of EINVAL 2. when the audit subsystem calls security_getprocattr with the size paramter set to 0. It expects the returned size to be the size that would be put in the buffer. This behavior is undocumented in LSM but the changes showed up in audit and selinux. This patch fixes AA so that when 0 is passed it will return the size that would have been read. This in turn fixes the problem where the audit system spits out a ton of error in audit_log_task_context messages the AA getprocattr handling can still return error messages that are not EINVAL but these should not happen in the audit log context unless audit makes an error. The possible places are: - audit passes a buffer that is to small - this shouldn't happen since audit uses the return value from a prob with parameter size == 0 - audit task context is trying to read a /proc/<pid>/attr/current that is the current tasks context. This shouldn't happen since the task context is for the current task. - memory allocation fails This one will generate the message but the audit code its self will generate the message if its allocation fails. |
||
---|---|---|
changehat | ||
common | ||
docs | ||
kernel-patches | ||
management | ||
module | ||
module-nextgen/apparmor | ||
parser | ||
profiles | ||
tests | ||
utils |