mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2025-01-19 12:00:00 +00:00
fs: move audit parent inode
During O_CREAT we unconditionally audit the parent inode. This makes it difficult to support a fastpath for O_CREAT when the file already exists because we have to drop out of RCU lookup needlessly. We worked around this by checking whether audit was actually active but that's also suboptimal. Instead, move the audit of the parent inode down into lookup_open() at a point where it's mostly certain that the file needs to be created. This also reduced the inconsistency that currently exists: while audit on the parent is done independent of whether or no the file already existed an audit on the file is only performed if it has been created. By moving the audit down a bit we emit the audit a little later but it will allow us to simplify the fastpath for O_CREAT significantly. Signed-off-by: Christian Brauner <brauner@kernel.org>
This commit is contained in:
parent
e747e15156
commit
c65d41c5a5
@ -3535,6 +3535,9 @@ static struct dentry *lookup_open(struct nameidata *nd, struct file *file,
|
||||
return dentry;
|
||||
}
|
||||
|
||||
if (open_flag & O_CREAT)
|
||||
audit_inode(nd->name, dir, AUDIT_INODE_PARENT);
|
||||
|
||||
/*
|
||||
* Checking write permission is tricky, bacuse we don't know if we are
|
||||
* going to actually need it: O_CREAT opens should work as long as the
|
||||
@ -3691,7 +3694,6 @@ static const char *open_last_lookups(struct nameidata *nd,
|
||||
if (!unlazied)
|
||||
return ERR_PTR(-ECHILD);
|
||||
}
|
||||
audit_inode(nd->name, dir, AUDIT_INODE_PARENT);
|
||||
if (trailing_slashes(nd)) {
|
||||
dput(dentry);
|
||||
return ERR_PTR(-EISDIR);
|
||||
|
Loading…
x
Reference in New Issue
Block a user