Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp1947077ima; Thu, 25 Oct 2018 07:24:55 -0700 (PDT) X-Google-Smtp-Source: AJdET5cZY5yBlyASm7/YAYN0G28NYopU8Nf4gLmRlIrF+RJwqkzcF0lk6wlE/RohWXMjd/LPNK5b X-Received: by 2002:a63:7c13:: with SMTP id x19mr1667839pgc.45.1540477495730; Thu, 25 Oct 2018 07:24:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540477495; cv=none; d=google.com; s=arc-20160816; b=XMrZm4ol9JRBUP8GpzUQfUqHlUidoSIGVpCGZJ8/ASBnDAR3BGa3vK1uFDFBM6SlNx fnjalB8bKmOSx2Nj/pqxgMkAWlrk8cbCc37GJN0825xCNLhlWMTkh1R/sgKoln/6rAZJ jcIvWLhssEmPHaFie4MHbu8fnXdJ6t+nIgxPxvuEX0ALUO9cLvn8ataMJJ7mKDW2jHlT 1BWjYDEa6RvF5wIkjQ5d2As4HUE1rEm9FOuwA7FUuuQaaUVn2ZVdPr7W4ht07k8AWDg2 +Xf49fmNl1fQWBqowCmhHcHiAxEn6mEZtWmIvOMxLCoa4/nDeaI35u2r0Q+DY25+pVV4 6IZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=va3JqYSq/5jzScymEuY8twnr/DiuUdkzYlxCSLGzv+Y=; b=RbBHNOwzR0VuhEREudEW8oCXcWgUM8of6d+8sKxGPDbc+xbPt691gcqhsxtaEgYy0H vu1HcFVyxUs0unrX8u8K/7m4Z0zVrUoAbRyP8iypRQaYuzpq+fS6GiXDSV3kvG68Xku3 FEVMaXVyVm3gY88e9lHeoqp/Mo4FCSDYF8alrQQCbusgBc4zo8tCoI+1Zjp70BrgHzPr /988thnsUG9NwzYnDgoyRfrJP1eexvZIkIcAiVZg3C3ID0l6EKhxg6CcfxPSpvIhdiO6 O9ZbvFyQG1dRHfy5QIsZbZYRdi9QnRQXyY39HyuDJ3tnJpOEJBSTHGaiCA7sM/x46Unc pbVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="JRJ+JF/Y"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id be11-v6si7845328plb.193.2018.10.25.07.24.13; Thu, 25 Oct 2018 07:24:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="JRJ+JF/Y"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731278AbeJYWx5 (ORCPT + 99 others); Thu, 25 Oct 2018 18:53:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:36604 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731243AbeJYWxy (ORCPT ); Thu, 25 Oct 2018 18:53:54 -0400 Received: from sasha-vm.mshome.net (unknown [167.98.65.38]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D9D6F208A3; Thu, 25 Oct 2018 14:20:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1540477256; bh=DxD1SwH5m2wdf/pe2wa7hQdPavqNaGbu5Us+PVP6PrA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JRJ+JF/Yk8WilxdnELFoRk6TK6Loj2rIseZeI9pemjCm4XKFCMLZA/BsgAZrDGbOD mieh0OEMJ24mpIMteFfhEemNpErFjcQTSYTnYrAWHT70mbncX60n8k98H1gprb5jTf hVWJsggQ2bieosno0JxdGdWyT3yIbS1H9sONPoQU= From: Sasha Levin To: stable@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Peter Hurley , =?UTF-8?q?Miloslav=20Trma=C4=8D?= , Greg Kroah-Hartman , Sasha Levin Subject: [PATCH AUTOSEL 3.18 80/98] tty: audit: Fix audit source Date: Thu, 25 Oct 2018 10:18:35 -0400 Message-Id: <20181025141853.214051-80-sashal@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181025141853.214051-1-sashal@kernel.org> References: <20181025141853.214051-1-sashal@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Peter Hurley [ Upstream commit 6b2a3d628aa752f0ab825fc6d4d07b09e274d1c1 ] The data to audit/record is in the 'from' buffer (ie., the input read buffer). Fixes: 72586c6061ab ("n_tty: Fix auditing support for cannonical mode") Cc: stable # 4.1+ Cc: Miloslav Trmač Signed-off-by: Peter Hurley Acked-by: Laura Abbott Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/tty/n_tty.c | 2 +- drivers/tty/tty_audit.c | 2 +- include/linux/tty.h | 6 +++--- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/drivers/tty/n_tty.c b/drivers/tty/n_tty.c index 0ed99ad74bee..f53682bb30cf 100644 --- a/drivers/tty/n_tty.c +++ b/drivers/tty/n_tty.c @@ -195,7 +195,7 @@ static inline int tty_copy_to_user(struct tty_struct *tty, { struct n_tty_data *ldata = tty->disc_data; - tty_audit_add_data(tty, to, n, ldata->icanon); + tty_audit_add_data(tty, from, n, ldata->icanon); return copy_to_user(to, from, n); } diff --git a/drivers/tty/tty_audit.c b/drivers/tty/tty_audit.c index 90ca082935f6..3d245cd3d8e6 100644 --- a/drivers/tty/tty_audit.c +++ b/drivers/tty/tty_audit.c @@ -265,7 +265,7 @@ static struct tty_audit_buf *tty_audit_buf_get(struct tty_struct *tty, * * Audit @data of @size from @tty, if necessary. */ -void tty_audit_add_data(struct tty_struct *tty, unsigned char *data, +void tty_audit_add_data(struct tty_struct *tty, const void *data, size_t size, unsigned icanon) { struct tty_audit_buf *buf; diff --git a/include/linux/tty.h b/include/linux/tty.h index 4858a3b79b7a..47d0bfa536e7 100644 --- a/include/linux/tty.h +++ b/include/linux/tty.h @@ -587,7 +587,7 @@ extern void n_tty_inherit_ops(struct tty_ldisc_ops *ops); /* tty_audit.c */ #ifdef CONFIG_AUDIT -extern void tty_audit_add_data(struct tty_struct *tty, unsigned char *data, +extern void tty_audit_add_data(struct tty_struct *tty, const void *data, size_t size, unsigned icanon); extern void tty_audit_exit(void); extern void tty_audit_fork(struct signal_struct *sig); @@ -595,8 +595,8 @@ extern void tty_audit_tiocsti(struct tty_struct *tty, char ch); extern void tty_audit_push(struct tty_struct *tty); extern int tty_audit_push_current(void); #else -static inline void tty_audit_add_data(struct tty_struct *tty, - unsigned char *data, size_t size, unsigned icanon) +static inline void tty_audit_add_data(struct tty_struct *tty, const void *data, + size_t size, unsigned icanon) { } static inline void tty_audit_tiocsti(struct tty_struct *tty, char ch) -- 2.17.1