Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp67599pxy; Wed, 21 Apr 2021 18:45:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyZPMZnDSe4r/TkjKYEodtLxNHaWVjtB17QMdk5I+Wr3pfPHUZbD1YMGFypeW1prip9w3vf X-Received: by 2002:aa7:ce17:: with SMTP id d23mr914022edv.47.1619055935528; Wed, 21 Apr 2021 18:45:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619055935; cv=none; d=google.com; s=arc-20160816; b=J8J/iEuapES35xsRqORbAO/yZIJWhL7+Y/q6q2ucaII1UcQeuY4TA9o/ZXm9N6FjrN gKNKJJWC17Re2LUnkma36PQE2X7sFy6G9ra09uc5PXK+AIpeCHHvuNi6DxM2SgBZpJgm QmIyavETfdrm/Rbw2YpP/S5gdbqdNKHufkJko/H+l8cVff+/fq3iv2QYENBXlU0JFWHo 9kUgcGYYw3sTAAr/c66GBEltgMsmGliDvbi3Ea0WwZtdrrQHYJfHQu1lF1YEqo0YBrBR ElYXw32b1cZppjccOsi3g2O9YHqWj5knouAuTucXfNozMolpiCjESS37RLWP5dFRArQp Y8lA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=ylabI7yel8trfiw05+8kfE4gsMq9DsV89TTz7H0mBd4=; b=la8Ffv6qx2PodCR7jPvbEDdznWlxvoeYj+GfE0OsdY46mukwzEFrGfU4bNVvjnB98F Smx9OCQf96uVl6XNJcCNICKkHnZH2ZW2VQXeutErjv1xLZaMMbDWHQM7VA5Wtf0WWqPs XpBvNb6d8P6HggTiB+6wDeGBlPdSdCTsnLX4zVsVzemNVqK9tmuv1q1pbnU0Bbe/dv/q m7+utPkNfuCNAKHMGBuHLEtepKnzGAK7l3fm4xPYk9eurbEMl0iSwV5dBfcmIGx3x6EL dRQNRwg7WyYWfNQgfWk1hjnn+FJncW/0WokavXp0XM22XhhU1cECz3hFZ4PkaC6Pl5j3 PBAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=SwLJaGpP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bo27si894979edb.81.2021.04.21.18.45.12; Wed, 21 Apr 2021 18:45:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b=SwLJaGpP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242565AbhDUQTa (ORCPT + 99 others); Wed, 21 Apr 2021 12:19:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239855AbhDUQTa (ORCPT ); Wed, 21 Apr 2021 12:19:30 -0400 Received: from mail-ed1-x533.google.com (mail-ed1-x533.google.com [IPv6:2a00:1450:4864:20::533]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9F342C06174A for ; Wed, 21 Apr 2021 09:18:56 -0700 (PDT) Received: by mail-ed1-x533.google.com with SMTP id s15so50081772edd.4 for ; Wed, 21 Apr 2021 09:18:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ylabI7yel8trfiw05+8kfE4gsMq9DsV89TTz7H0mBd4=; b=SwLJaGpPLtubReINVzZzoWVROzzwBu7D3g0d7StyTVDnq3cS/jTgMrZklC1rtnAfIJ I1NtrQwMsXKsB7O6l0w6BobwTe+J6V2eALIjXVy+DBpFRzVJBNkwYZZrhHIjKL8/0WFL Xg7jgr0yS8iCGqxANmUPLzPwRLaORmZOEmoUr1VDcTHIz/cK+rF4MGWq7WDqvPgbYEJS ci15cpv8c6UrFqFq8CS5BkvPNYL54rGjZoBDVeTeBc1i3b1lwj23nZMN6CthAlVaUn8+ bQzZSld8I8O7N560e6m9J1V5SxaSwzKEnXkiQhjTy6Fq2F2ZTyQycEXiZ8aIaz6lYOcx 9gGw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ylabI7yel8trfiw05+8kfE4gsMq9DsV89TTz7H0mBd4=; b=ErRX+hNdPS8bc23hQdLfsrwgaTJVN6XnT7d/OTtXKY1mI77/ovvs+YueIHqKDxUh3D vpFqsHmxOhLA3FWfAbdVMtZ/1AAn8irvLhL9hXGIX4fpgPJCIOnq1WsHhUpMsOm9qMUH XOhxRntruo65t/YYA4NJNtTVcgO5nfjl6Odo5J34vKu2jt+UN/QUESGNYKvPQ5OAIija arQr8I+GoZ/DBJKKb7t3tHizostupajKPGOi72CNxozQy9zSR7DBv1/bG30dh7zgcBMV l239KOu9ESvpewqhPzdxcb5Yc1ZXQhcqfKi9m/QOQ7IR4KeaRlMFhMw/hYw5JJUN0q5N X4iA== X-Gm-Message-State: AOAM530qWxHlf25oz+JUcJmILnyo8nBWG/nQX1WJXvT9mpWlpaCmFE1k FVhOod11J5vE1Iq2oTxMnM4JFPJv2fp7QoaYCQlu X-Received: by 2002:a05:6402:199:: with SMTP id r25mr31401269edv.128.1619021935361; Wed, 21 Apr 2021 09:18:55 -0700 (PDT) MIME-Version: 1.0 References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> <20210421130105.1226686-86-gregkh@linuxfoundation.org> In-Reply-To: <20210421130105.1226686-86-gregkh@linuxfoundation.org> From: Paul Moore Date: Wed, 21 Apr 2021 12:18:44 -0400 Message-ID: Subject: Re: [PATCH 085/190] Revert "audit: fix a memory leak bug" To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, Wenwen Wang , Richard Guy Briggs Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 21, 2021 at 9:04 AM Greg Kroah-Hartman wrote: > > This reverts commit 70c4cf17e445264453bc5323db3e50aa0ac9e81f. > > Commits from @umn.edu addresses have been found to be submitted in "bad > faith" to try to test the kernel community's ability to review "known > malicious" changes. The result of these submissions can be found in a > paper published at the 42nd IEEE Symposium on Security and Privacy > entitled, "Open Source Insecurity: Stealthily Introducing > Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University > of Minnesota) and Kangjie Lu (University of Minnesota). > > Because of this, all submissions from this group must be reverted from > the kernel tree and will need to be re-reviewed again to determine if > they actually are a valid fix. Until that work is complete, remove this > change to ensure that no problems are being introduced into the > codebase. > > Cc: Wenwen Wang > Cc: Richard Guy Briggs > Cc: Paul Moore > Signed-off-by: Greg Kroah-Hartman > --- > kernel/auditfilter.c | 12 +++++------- > 1 file changed, 5 insertions(+), 7 deletions(-) NACK on this revert. I've looked at the original patch again this morning, and the original patch still looks correct and doesn't appear to introduce any new faults to the best of my understanding. > diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c > index 333b3bcfc545..19f908b96000 100644 > --- a/kernel/auditfilter.c > +++ b/kernel/auditfilter.c > @@ -1125,24 +1125,22 @@ int audit_rule_change(int type, int seq, void *data, size_t datasz) > int err = 0; > struct audit_entry *entry; > > + entry = audit_data_to_entry(data, datasz); > + if (IS_ERR(entry)) > + return PTR_ERR(entry); > + > switch (type) { > case AUDIT_ADD_RULE: > - entry = audit_data_to_entry(data, datasz); > - if (IS_ERR(entry)) > - return PTR_ERR(entry); > err = audit_add_rule(entry); > audit_log_rule_change("add_rule", &entry->rule, !err); > break; > case AUDIT_DEL_RULE: > - entry = audit_data_to_entry(data, datasz); > - if (IS_ERR(entry)) > - return PTR_ERR(entry); > err = audit_del_rule(entry); > audit_log_rule_change("remove_rule", &entry->rule, !err); > break; > default: > + err = -EINVAL; > WARN_ON(1); > - return -EINVAL; > } > > if (err || type == AUDIT_DEL_RULE) { > -- > 2.31.1 -- paul moore www.paul-moore.com