Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp4643023imm; Mon, 14 May 2018 10:25:40 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoDR1Svh42t9b4psulDOnneOG3PXWPRXy8lY7ryQiWYaubeZXpA2MQKS7HjX58LdvCsz4QA X-Received: by 2002:a62:4184:: with SMTP id g4-v6mr11438163pfd.51.1526318740156; Mon, 14 May 2018 10:25:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526318740; cv=none; d=google.com; s=arc-20160816; b=A9e8AHAFtQOYVklJJt7UqatmmtAq6aly6nt8TxdyJv/8+zUqtzsTydl96I5PYOWKNH MC4xZIyv+RR/KyEs29eoHcSvKrd05q0fsA8vPzAo8XJQOQyAfHYiW5UxO98mfE0GY+5q wrXBex13WMNTSRavmhD7OnxgvVIFilgrXvn0TshXQKn1J7U4zHGS0gHQGeHRv1w/AdJ/ ip1RvF0WVoXENqfrsUb9NySRgwySHWHX4gmmpYxRaubpRIacRpl7evEdQAD4Uvx8vAqv kBgNz4X4Ctm7PymRcYlPA5zQXgXnuuInknk8ttK3KBIknlvQvqZ+I4+SkxC8QKT9ONbQ 5hEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:from:subject :message-id:arc-authentication-results; bh=YPXxhTmNGl1lnJhgkp6yG2TfzjULFW2Ym8WABfdffS0=; b=qPr7XI/LA2Ud/iG5xgmL4q6YPQwrQJkivb3twMkDiNisEYBHTyvoy1zUuJ6P009wWL xbd7iJoRhZI1MRDZQf6+aYfd0Mh1lBidmhvE/T0rT0c0+3fh1+Pz2i7Qsf//12E26Whf bBg9S7EtKc407v6/x5OsDvKJ8dJ1zBPKMLRrMcjRd2RhU9dfzdAQxkO9m1rJYOiwqOq5 Gz08vZyLeSrMEaD5YtW5eVgnjTwqVMgqz7BUfprH6M0WsClG0E84jDuEuiVrsGoOBuDr xAU70DgPlsN4kazYjlDYVjqfDKjiXFe9vZSo1vW6Gl/tjKb6I1om8HvJlNneTIx66S4f pktw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i3-v6si9851559pld.189.2018.05.14.10.25.25; Mon, 14 May 2018 10:25:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=codethink.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752915AbeENQTA (ORCPT + 99 others); Mon, 14 May 2018 12:19:00 -0400 Received: from imap1.codethink.co.uk ([176.9.8.82]:33715 "EHLO imap1.codethink.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752717AbeENQS7 (ORCPT ); Mon, 14 May 2018 12:18:59 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126] helo=xylophone) by imap1.codethink.co.uk with esmtpsa (Exim 4.84_2 #1 (Debian)) id 1fIGBd-0006ZO-7r; Mon, 14 May 2018 17:18:57 +0100 Message-ID: <1526314736.9159.13.camel@codethink.co.uk> Subject: Re: [PATCH 4.4 24/72] audit: add tty field to LOGIN event From: Ben Hutchings To: Greg Kroah-Hartman , linux-kernel@vger.kernel.org Cc: stable@vger.kernel.org, Richard Guy Briggs , Paul Moore Date: Mon, 14 May 2018 17:18:56 +0100 In-Reply-To: <20180406084307.173351538@linuxfoundation.org> References: <20180406084305.210085169@linuxfoundation.org> <20180406084307.173351538@linuxfoundation.org> Organization: Codethink Ltd. Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2018-04-06 at 15:23 +0200, Greg Kroah-Hartman wrote: > 4.4-stable review patch.  If anyone has any objections, please let me know. > > ------------------ > > From: Richard Guy Briggs > > commit db0a6fb5d97afe01fd9c47d37c6daa82d4d4001d upstream. [...] > --- a/kernel/auditsc.c > +++ b/kernel/auditsc.c > @@ -1976,6 +1976,7 @@ static void audit_log_set_loginuid(kuid_ >  { >   struct audit_buffer *ab; >   uid_t uid, oldloginuid, loginuid; > + struct tty_struct *tty; >   >   if (!audit_enabled) >   return; > @@ -1983,14 +1984,17 @@ static void audit_log_set_loginuid(kuid_ >   uid = from_kuid(&init_user_ns, task_uid(current)); >   oldloginuid = from_kuid(&init_user_ns, koldloginuid); >   loginuid = from_kuid(&init_user_ns, kloginuid), > + tty = audit_get_tty(current); >   >   ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_LOGIN); >   if (!ab) >   return; This error path leaks the tty ref. Fixed upstream by: commit 76a658c20efd541a62838d9ff68ce94170d7a549 Author: Richard Guy Briggs Date: Tue Jun 28 12:06:58 2016 -0400 audit: move calcs after alloc and check when logging set loginuid Ben. >   audit_log_format(ab, "pid=%d uid=%u", task_pid_nr(current), uid); >   audit_log_task_context(ab); > - audit_log_format(ab, " old-auid=%u auid=%u old-ses=%u ses=%u res=%d", > -  oldloginuid, loginuid, oldsessionid, sessionid, !rc); > + audit_log_format(ab, " old-auid=%u auid=%u tty=%s old-ses=%u ses=%u res=%d", > +  oldloginuid, loginuid, tty ? tty_name(tty) : "(none)", > +  oldsessionid, sessionid, !rc); > + audit_put_tty(tty); >   audit_log_end(ab); >  } >   -- Ben Hutchings Software Developer, Codethink Ltd.