Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp817518pxb; Wed, 11 Nov 2020 17:42:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJwZLNLmZ/SWRbjYUmpZaFDoj+6/CAaHdKBjo5bCB1DC+ayfiDiyNangQn+CPaU3LWQm9YEi X-Received: by 2002:a05:6402:308b:: with SMTP id de11mr133725edb.5.1605145338564; Wed, 11 Nov 2020 17:42:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605145338; cv=none; d=google.com; s=arc-20160816; b=QEvpXHtBaXtTAumu0Srn0vgU0qQVyMn4V492syrfC+Z6/m9OSUXEBT7lnY/jpnn8EB 5iANkMmavXepmi/FtBicF4Om6WH4nKQCnULZi5Dj7S4ApCfXFrY7RKI6TQBHcfxQftgr kAz8UsCBWCnXj/eRfOOmcS0bQZeujEEgTcZ2dUSYaNwWnwIVBNy/hdkLiLxIwqE1Ipxl SyyPZaG72zu3QoPrJiEpiuTow1sdVN91JPOvvxxEj4EHm9XADgthzro8IRwV2EPQSoV1 2NdPmKND9K2Xh1e1OAyA4AyGW7lBmdMkAK6iSC2cPtr8evq6mRt7Ik7u9Xb6rfhTterI NAsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=a7YQwajg6u5kki4nx0fdQiwjSU7aQD2tBCyvDLpcF3o=; b=0O+iFZyNNroja0I/JchGHAmWeU02RQihobDpZZWpUv0BXNg/xxRpAB7m6RndV7vZnh GA4bvmC+zZZyCX1fuUYsNfdSaaGM8zxJoNu6nqGHVr/ozFwzd9MSWgTgEK699KFQEl7z e1griG1S/qMnEw8Nta0yTLnLwz2bxr5pIPwxNivSEF4W20nKD09SicbiISrimRVF+v2j xWLj3N/0QzlWpU8Iuj14LqkL8BnWav90caw2ZQ2+tBhedLqqXHOOg6VWH71Bq3E2VT1w VMStamScaoTjGxH9ZLblGo1edrGyGOrfNwGWu5CAcqfnhtrC9UcAGIXLGcnZzgd7CDZd ZrKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q2si2459705ejt.383.2020.11.11.17.41.55; Wed, 11 Nov 2020 17:42:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729324AbgKLBjE (ORCPT + 99 others); Wed, 11 Nov 2020 20:39:04 -0500 Received: from out30-42.freemail.mail.aliyun.com ([115.124.30.42]:45575 "EHLO out30-42.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728098AbgKLAhi (ORCPT ); Wed, 11 Nov 2020 19:37:38 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R161e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04394;MF=alex.shi@linux.alibaba.com;NM=1;PH=DS;RN=4;SR=0;TI=SMTPD_---0UF10qhn_1605141454; Received: from IT-FVFX43SYHV2H.lan(mailfrom:alex.shi@linux.alibaba.com fp:SMTPD_---0UF10qhn_1605141454) by smtp.aliyun-inc.com(127.0.0.1); Thu, 12 Nov 2020 08:37:35 +0800 Subject: Re: [PATCH] audit: remove unused macros To: Richard Guy Briggs Cc: Paul Moore , linux-audit@redhat.com, linux-kernel@vger.kernel.org References: <1604651482-9780-1-git-send-email-alex.shi@linux.alibaba.com> <20201110152310.GB55411@madcap2.tricolour.ca> <20201111030359.GB55072@madcap2.tricolour.ca> <20201111131759.GD55072@madcap2.tricolour.ca> From: Alex Shi Message-ID: <9784a39e-c39f-b3f9-3d05-68d63e560c75@linux.alibaba.com> Date: Thu, 12 Nov 2020 08:36:50 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: <20201111131759.GD55072@madcap2.tricolour.ca> Content-Type: text/plain; charset=gbk Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ?? 2020/11/11 ????9:17, Richard Guy Briggs ะด??: >> >> audit_filter_syscall(tsk, context, > This all looks good, but I don't see the initialization of > context->return_valid in audit_alloc_context() that was mentioned for > completeness. > Sorry for missing that. Here they are. From 5fef5f1b7b745b52bedc9c7eec9fc163202ad421 Mon Sep 17 00:00:00 2001 From: Alex Shi Date: Fri, 6 Nov 2020 16:31:22 +0800 Subject: [PATCH v3] audit: fix macros warnings Some unused macros could cause gcc warning: kernel/audit.c:68:0: warning: macro "AUDIT_UNINITIALIZED" is not used [-Wunused-macros] kernel/auditsc.c:104:0: warning: macro "AUDIT_AUX_IPCPERM" is not used [-Wunused-macros] kernel/auditsc.c:82:0: warning: macro "AUDITSC_INVALID" is not used [-Wunused-macros] AUDIT_UNINITIALIZED and AUDITSC_INVALID are still meaningful and should be in incorporated. Just remove AUDIT_AUX_IPCPERM. Thanks comments from Richard Guy Briggs and Paul Moore. Signed-off-by: Alex Shi Cc: Paul Moore Cc: Richard Guy Briggs Cc: Eric Paris Cc: linux-audit@redhat.com Cc: linux-kernel@vger.kernel.org --- kernel/audit.c | 2 +- kernel/auditsc.c | 11 +++++------ 2 files changed, 6 insertions(+), 7 deletions(-) diff --git a/kernel/audit.c b/kernel/audit.c index ac0aeaa99937..e22f22bdc000 100644 --- a/kernel/audit.c +++ b/kernel/audit.c @@ -67,7 +67,7 @@ #define AUDIT_DISABLED -1 #define AUDIT_UNINITIALIZED 0 #define AUDIT_INITIALIZED 1 -static int audit_initialized; +static int audit_initialized = AUDIT_UNINITIALIZED; u32 audit_enabled = AUDIT_OFF; bool audit_ever_enabled = !!AUDIT_OFF; diff --git a/kernel/auditsc.c b/kernel/auditsc.c index 183d79cc2e12..9cbe6d5437be 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c @@ -102,8 +102,6 @@ struct audit_aux_data { int type; }; -#define AUDIT_AUX_IPCPERM 0 - /* Number of target pids per aux struct. */ #define AUDIT_AUX_PIDS 16 @@ -552,11 +550,11 @@ static int audit_filter_rules(struct task_struct *tsk, break; case AUDIT_EXIT: - if (ctx && ctx->return_valid) + if (ctx && ctx->return_valid != AUDITSC_INVALID) result = audit_comparator(ctx->return_code, f->op, f->val); break; case AUDIT_SUCCESS: - if (ctx && ctx->return_valid) { + if (ctx && ctx->return_valid != AUDITSC_INVALID) { if (f->val) result = audit_comparator(ctx->return_valid, f->op, AUDITSC_SUCCESS); else @@ -930,6 +928,7 @@ static inline struct audit_context *audit_alloc_context(enum audit_state state) INIT_LIST_HEAD(&context->killed_trees); INIT_LIST_HEAD(&context->names_list); context->fds[0] = -1; + context->return_valid = AUDITSC_INVALID; return context; } @@ -1488,7 +1487,7 @@ static void audit_log_exit(void) context->arch, context->major); if (context->personality != PER_LINUX) audit_log_format(ab, " per=%lx", context->personality); - if (context->return_valid) + if (context->return_valid != AUDITSC_INVALID) audit_log_format(ab, " success=%s exit=%ld", (context->return_valid==AUDITSC_SUCCESS)?"yes":"no", context->return_code); @@ -1625,7 +1624,7 @@ void __audit_free(struct task_struct *tsk) * need to log via audit_log_exit(). */ if (tsk == current && !context->dummy && context->in_syscall) { - context->return_valid = 0; + context->return_valid = AUDITSC_INVALID; context->return_code = 0; audit_filter_syscall(tsk, context, -- 1.8.3.1