From: Richard Guy Briggs Date: Thu, 21 Nov 2013 18:57:33 +0000 (-0500) Subject: smack: call WARN_ONCE() instead of calling audit_log_start() X-Git-Tag: submit/tizen_common/20140905.094502~14^2~10 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=refs%2Fchanges%2F62%2F23262%2F1;p=sdk%2Femulator%2Femulator-kernel.git smack: call WARN_ONCE() instead of calling audit_log_start() Remove the call to audit_log() (which call audit_log_start()) and deal with the errors in the caller, logging only once if the condition is met. Calling audit_log_start() in this location makes buffer allocation and locking more complicated in the calling tree (audit_filter_user()). Change-Id: I318b7d926a10e9d63dfe170450345799788c6f12 Signed-off-by: Richard Guy Briggs Signed-off-by: Eric Paris --- diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 5e4ed2e18820..acd857471f95 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c @@ -3622,9 +3622,8 @@ static int smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, struct smack_known *skp; char *rule = vrule; - if (!rule) { - audit_log(actx, GFP_ATOMIC, AUDIT_SELINUX_ERR, - "Smack: missing rule\n"); + if (unlikely(!rule)) { + WARN_ONCE(1, "Smack: missing rule\n"); return -ENOENT; }