Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp413209imm; Thu, 28 Jun 2018 23:23:38 -0700 (PDT) X-Google-Smtp-Source: ADUXVKI0pQsQvjR1Rk+8c4EX6fzcQvE/pwXWUAc3tYQUyporDOF8PmApe7ewNx1CkDr7AE9CAHRW X-Received: by 2002:a17:902:8f94:: with SMTP id z20-v6mr13378726plo.337.1530253418003; Thu, 28 Jun 2018 23:23:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530253417; cv=none; d=google.com; s=arc-20160816; b=we+kTzrhUgDQqsJO8B1H8N5Y20Xucpt/ReV8gxWRbBDqozsRmzEI58Zxj6o7vnnBp6 aYmhtMuaUdnASBJYVbyB4hdJge/qbGI/LxfTbCTw4wrP3gGYN8q0oJYLW8hSWNW1cqt1 X9YSh2k8mma2x1QzFuWB3zThA+TJukJMGMv+Je2ffvni4dUq09m7yfBJ5Iq5Z5PBUD8x rjAKNLxLdE0EMakgpQQXWPB+PqhWqP+Rju0YlwdXGecxvBgGYh1RAUND2GEgqAchVDPQ yrJZdC8wStiSKjvn0kK3hqlp6Gp5xXls5nlDLJnXIp22tL+lN2HFcF2IcUSHqnrNXAgJ Ubog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=lPQKNXDgKjxs4VpSMVhmyYh2WWXJfsx19qHpfo1V9hA=; b=iijH4tCq4HW241tsTcQedklWVgo+3xADD++54cAXsJ2XyuFRJCvw+C4cPr8dAWVnnm tqqZO+VxANWVXX5k5y9nTbX/5JgYr62sYKmLyuT95YtuSq/HX5V58wamSCyGNnWosPpT epmXE+0m0YTd9z3GtJJkPyuG4dcU7cWRT9n6K+t+U5QytxfOSZerDDvy6uW4Opsy1eJL AMrFJczCECDk9WXlK0tfwyhaFLSEHtbruBojVUaA9iH6zDoidcX5VuVAiv8OiaKpxpmL ENkBjMms94YWZsXki6vIIHmDCOV+r449+7Cst6DYBASguPBJx9EmX6j9wc2FkrDbl74G ToaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=lNoQsQnK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l4-v6si8182127plt.497.2018.06.28.23.23.23; Thu, 28 Jun 2018 23:23:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=lNoQsQnK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S967289AbeF1WK5 (ORCPT + 99 others); Thu, 28 Jun 2018 18:10:57 -0400 Received: from mail-lf0-f68.google.com ([209.85.215.68]:42012 "EHLO mail-lf0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966704AbeF1WK4 (ORCPT ); Thu, 28 Jun 2018 18:10:56 -0400 Received: by mail-lf0-f68.google.com with SMTP id u202-v6so5344225lff.9 for ; Thu, 28 Jun 2018 15:10:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=lPQKNXDgKjxs4VpSMVhmyYh2WWXJfsx19qHpfo1V9hA=; b=lNoQsQnKPc8Dsi4YnA4pQAycTmSH0Qx5R+BbZ0bGGidNagBCpuiJ+RuWOt+bn38/nr EVt3ranWjlVIPsAK/JfjRC3jabZ1hUVdfZeNbORXH0pv+HE4pIwQ+Rt01YlTiiBd9q8s IXX2k5ezlVQdzqorzeRvurXlyDIg0nj4Rrwvx+sEnZ54MHFL5+4y9Oy0+taWfZw1MU37 mqfYKdq06P0jIcwPUZgYrt+yU6FIErFOjKIlftTZuoBveCsQHy7T4PdxdXqxNShjq4LF PEpBUWsvqHAdV6oSJRP1s+bEI9vWqcukcL/8a+5/dOU7mV+5fmklrUjAorxRmbSzB8uc gohA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=lPQKNXDgKjxs4VpSMVhmyYh2WWXJfsx19qHpfo1V9hA=; b=t8H9IHego9D/Rgk24iDi8WTtaZFNABOqfKDTuZJiYcOmBKtrNksWlcS8D4IxwDX157 +0GxZMd/kWUgBWj3kaj5R71cdSbkl3ag4E1oCvW11XoOFz7TnIDsCytCiqbwA0RI34PI 9oTFCAD1IDbQJF1noeOAGPcKd9b3LXNDoSyg3fmNkXKOq4mWwG7RtumCDSaOfBhmfRHv PoFGcT1ycpdAfa0+zvY41d1GlFxR2ceAKUzTAznN2ZnjrOIlLILxSUJL7W/pFvrSBWBg 5V8IfZGhlDwbCWI+BZFuZL8dKvKatLFYhwz96ilF+Kgw/DrnFA0grL14MXxK5w6Ky4r/ iIeg== X-Gm-Message-State: APt69E2eGoF4ZSUCwxpKLdIH4YIyBOhvezg33rCxItIXS77YoArMHeuD N6bxTeo1AqmDl+RBuq74BXwjyKJ6EzpXy5nCPPB0 X-Received: by 2002:a19:c1c4:: with SMTP id r187-v6mr8389981lff.90.1530223854977; Thu, 28 Jun 2018 15:10:54 -0700 (PDT) MIME-Version: 1.0 References: <244a8049197a23b0cee37dc3f00d070e646fd1b7.1529003588.git.rgb@redhat.com> In-Reply-To: From: Paul Moore Date: Thu, 28 Jun 2018 18:10:44 -0400 Message-ID: Subject: Re: [RFC PATCH ghak59 V1 2/6] audit: add syscall information to CONFIG_CHANGE records To: rgb@redhat.com Cc: linux-audit@redhat.com, linux-kernel@vger.kernel.org, Eric Paris , sgrubb@redhat.com, aviro@redhat.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 28, 2018 at 5:47 PM Paul Moore wrote: > > On Thu, Jun 14, 2018 at 4:23 PM Richard Guy Briggs wrote: > > > > Tie syscall information to all CONFIG_CHANGE calls since they are all a > > result of user actions. > > > > See: https://github.com/linux-audit/audit-kernel/issues/59 > > See: https://github.com/linux-audit/audit-kernel/issues/50 > > Signed-off-by: Richard Guy Briggs > > --- > > kernel/audit.c | 4 ++-- > > kernel/audit_fsnotify.c | 2 +- > > kernel/audit_tree.c | 2 +- > > kernel/audit_watch.c | 2 +- > > kernel/auditfilter.c | 2 +- > > 5 files changed, 6 insertions(+), 6 deletions(-) > > Merged, thanks. Actually, I take that back (good thing I hadn't pushed yet). Why don't you squash this patch with 3/6 so that a bisect or cherry-pick backport doesn't end up splitting 2/6 and 3/6 and causing a regression with the AUDIT_USER_* records. > > diff --git a/kernel/audit.c b/kernel/audit.c > > index ad54339..e469234 100644 > > --- a/kernel/audit.c > > +++ b/kernel/audit.c > > @@ -400,7 +400,7 @@ static int audit_log_config_change(char *function_name, u32 new, u32 old, > > struct audit_buffer *ab; > > int rc = 0; > > > > - ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); > > + ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_CONFIG_CHANGE); > > if (unlikely(!ab)) > > return rc; > > audit_log_format(ab, "op=set %s=%u old=%u", function_name, new, old); > > @@ -1067,7 +1067,7 @@ static void audit_log_common_recv_msg(struct audit_buffer **ab, u16 msg_type) > > return; > > } > > > > - *ab = audit_log_start(NULL, GFP_KERNEL, msg_type); > > + *ab = audit_log_start(audit_context(), GFP_KERNEL, msg_type); > > if (unlikely(!*ab)) > > return; > > audit_log_format(*ab, "pid=%d uid=%u", pid, uid); > > diff --git a/kernel/audit_fsnotify.c b/kernel/audit_fsnotify.c > > index 52f368b..1640eb6 100644 > > --- a/kernel/audit_fsnotify.c > > +++ b/kernel/audit_fsnotify.c > > @@ -127,7 +127,7 @@ static void audit_mark_log_rule_change(struct audit_fsnotify_mark *audit_mark, c > > > > if (!audit_enabled) > > return; > > - ab = audit_log_start(NULL, GFP_NOFS, AUDIT_CONFIG_CHANGE); > > + ab = audit_log_start(audit_context(), GFP_NOFS, AUDIT_CONFIG_CHANGE); > > if (unlikely(!ab)) > > return; > > audit_log_format(ab, "auid=%u ses=%u op=%s", > > diff --git a/kernel/audit_tree.c b/kernel/audit_tree.c > > index 5e9d1e5..a01b9da 100644 > > --- a/kernel/audit_tree.c > > +++ b/kernel/audit_tree.c > > @@ -499,7 +499,7 @@ static void audit_tree_log_remove_rule(struct audit_krule *rule) > > > > if (!audit_enabled) > > return; > > - ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); > > + ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_CONFIG_CHANGE); > > if (unlikely(!ab)) > > return; > > audit_log_format(ab, "op=remove_rule"); > > diff --git a/kernel/audit_watch.c b/kernel/audit_watch.c > > index 9b4836b..da2978b 100644 > > --- a/kernel/audit_watch.c > > +++ b/kernel/audit_watch.c > > @@ -242,7 +242,7 @@ static void audit_watch_log_rule_change(struct audit_krule *r, struct audit_watc > > > > if (!audit_enabled) > > return; > > - ab = audit_log_start(NULL, GFP_NOFS, AUDIT_CONFIG_CHANGE); > > + ab = audit_log_start(audit_context(), GFP_NOFS, AUDIT_CONFIG_CHANGE); > > if (!ab) > > return; > > audit_log_format(ab, "auid=%u ses=%u op=%s", > > diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c > > index eaa3201..6e19acb 100644 > > --- a/kernel/auditfilter.c > > +++ b/kernel/auditfilter.c > > @@ -1093,7 +1093,7 @@ static void audit_log_rule_change(char *action, struct audit_krule *rule, int re > > if (!audit_enabled) > > return; > > > > - ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); > > + ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_CONFIG_CHANGE); > > if (!ab) > > return; > > audit_log_session_info(ab); > > -- > > 1.8.3.1 > > > > > -- > paul moore > www.paul-moore.com -- paul moore www.paul-moore.com