Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3476628pxb; Mon, 4 Apr 2022 18:12:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwwsO2wYMuF4+6ACeBDQcohRw487zAEUicnk/V2jnBOM0OdpwYaHTjUi/iEKB8aHrp7TSNB X-Received: by 2002:a17:903:230a:b0:156:9c66:5cd2 with SMTP id d10-20020a170903230a00b001569c665cd2mr824613plh.57.1649121132213; Mon, 04 Apr 2022 18:12:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649121132; cv=none; d=google.com; s=arc-20160816; b=Us1xAR91k1DR8L7A1m+rG80NerAYX4UsyCSkvp8ao6bnBoFMmTaXaVF1mj97+jdFVn otmBkyZ7nBDGptJ1c9Ouor7a88a2PyoKgb863hIeT4+qbUoyy3SUhQtKf4vpmvDiAuZp MkDJfFf6hChmOUf3qnJfPToVU8kP3v/102enWTq9qIaUnG8S/B0nLI2FWaoZ2S4YJma7 fpWjIiYI2dDVtLr1CoE/zV9m/ppPmiDr49d3ixKNTLW/Y0WxkR5947SPIOn1e/2hJ3qQ 6sBkL1X8y/aA0MjwemR7UEGP1Re0dwZyWXm9Mq7wRYbSiQqOCxvKaC5hVctFVPCD7IQ2 gEFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=QmcosJ0awvDxQa0wViF9xFspilUbHFNWDRIzA6YRAYc=; b=KBYaJWva6Zhw+XyY8m1z0S0Q3Td/mPMP37ChFL8UCDDWw3KoakzuE1ipODsqbDvrWd k1epaSw32sKJNdLQGR6iszbSFZTqQgZuBkx0EepIjcyO8W25+EGDjfHKbw6qTzUvVRsi 9c8JyT/e5+lmArZtem3dfu5PqWZrDugZsvpTgX9C2IZsHXxclbwbp1qd26y7vtvlRBFh TveHvu6qLSXrxU7K2nUoK4KNRJyW0RflY9cGTsD+UWqC+zVLx4+xiYUBXE/ygyl0gyOt 6ahY85GHaLmd0PKOYpVbw/ogqTUcd+B51OOYnZXRMzGi/9cZs/plXAJrBFTdA0tNDKG4 ltvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=cHeWBkvD; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id f124-20020a62db82000000b004fa3a8e0087si11136657pfg.318.2022.04.04.18.12.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 18:12:12 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20210112.gappssmtp.com header.s=20210112 header.b=cHeWBkvD; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 288F617665D; Mon, 4 Apr 2022 17:11:32 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1349875AbiDDNOZ (ORCPT + 99 others); Mon, 4 Apr 2022 09:14:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33992 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349514AbiDDNOW (ORCPT ); Mon, 4 Apr 2022 09:14:22 -0400 Received: from mail-ed1-x52c.google.com (mail-ed1-x52c.google.com [IPv6:2a00:1450:4864:20::52c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6C40B3A186 for ; Mon, 4 Apr 2022 06:12:26 -0700 (PDT) Received: by mail-ed1-x52c.google.com with SMTP id r10so5295120eda.1 for ; Mon, 04 Apr 2022 06:12:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QmcosJ0awvDxQa0wViF9xFspilUbHFNWDRIzA6YRAYc=; b=cHeWBkvDqpk6gM5OtQBV1AQ2CcgskHZNbkbu9z8QFjxmF7eatwS5PLikWHc6HPpmP1 tv12HLMBBZ80ZLDuLTPf2fSMeQa4E9z1SYlSAP1BUuoNhc37cjpX+MF1n5/t2wLVZFqL d08B0tTV4SlH2quTJBbPIpJyuRNTZRiGTfIZUIVUSi2F4JADuWx51aw0qlShwH5CqVkx HxYCbeW5CXmoi6ikZ8lj+hBeaR998l0j4N6m4hsnp4CeJN5rvzIPWMcdWgeY63T6Sfii AjNK7qYwq35ZsDdPwQdCTRejxvJIWvkU1HQnVtyHVpyostVNC/jUu/PM9bmY1B+6X0Na S40Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QmcosJ0awvDxQa0wViF9xFspilUbHFNWDRIzA6YRAYc=; b=eOTm+Z7V/3QuzqLmm6jPEDGA39+Ikb7QYly4cyNUvcfZD+E8tYFHD8/xJh8Fbq8ist 3i/1Fc9aV3aVja302Qk+UhP+i4I2cG91CjTy264ExH8SNtMuoXntuYOs8fOvacJuTPwx aHL+w9affXXcUxCuLbJ26uaSRRC5PqqAVfhCe2Tgmv/2ucKJPkIASpTbqddS2vC7C4ae kR9PNdACU8i2vV2Mf6K2uhQtnzWYrdB/bOcI4Cod4MjBT601TpQYw66bywMjvKqlms2Y Dm1i3SOus5XGkLvxoAc5bUz/1OFdd1l9JQvk5v6mpJihMttvH00H1U93ARS3ZLPUnZan 6Nbw== X-Gm-Message-State: AOAM5310yrcRyb4N8B5bzwF9+SCH5geqy5MB/SBi5ucNTk7r+hMXlAy8 pD2mCp9Relf6nisxTLbtVwyHxWRAWk79U0W224UM4/hGrg== X-Received: by 2002:a05:6402:350d:b0:419:547f:134a with SMTP id b13-20020a056402350d00b00419547f134amr33564821edd.405.1649077944906; Mon, 04 Apr 2022 06:12:24 -0700 (PDT) MIME-Version: 1.0 References: <20220404022317.2449865-1-yang.yang29@zte.com.cn> In-Reply-To: <20220404022317.2449865-1-yang.yang29@zte.com.cn> From: Paul Moore Date: Mon, 4 Apr 2022 09:12:13 -0400 Message-ID: Subject: Re: [PATCH v2] audit: do a quick exit when syscall number is less than 0 To: cgel.zte@gmail.com Cc: eparis@redhat.com, linux-audit@redhat.com, rth@twiddle.net, sgrubb@redhat.com, linux-kernel@vger.kernel.org, ink@jurassic.park.msu.ru, mattst88@gmail.com, Yang Yang , Zeal Robot Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Apr 3, 2022 at 10:23 PM wrote: > > From: Yang Yang > > Userspace may use syscall with syscall number less than 0 by calling > syscall(syscall_num,..). This kind of syscall could never be audited, > because auditctl requires rule with syscall number >=0. Therefore we > better do a quick handle no need to gohead with this situation. > > Note that auditctl may set rules auditing invalid syscall with syscall > number bigger than NR_syscalls, to keep this mechanism working, we do > no more check(context->major bigger than NR_syscalls or not). > > Signed-off-by: Yang Yang > Reported-by: Zeal Robot > --- > v2: > - cancel checking against NR_syscalls > --- > kernel/auditsc.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) As discussed previously, this is not something I want to merge upstream at this time. -- paul-moore.com