lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAGH-KgsOLEXH2gMwcmfxA7PMzE9sqZf7riN0cdAjas_o17aw9A@mail.gmail.com>
Date:	Tue, 28 Jun 2016 15:56:21 -0400
From:	Paul Moore <pmoore@...hat.com>
To:	Richard Guy Briggs <rgb@...hat.com>
Cc:	linux-audit@...hat.com, linux-kernel@...r.kernel.org,
	peter@...leysoftware.com, sgrubb@...hat.com, eparis@...hat.com
Subject: Re: [PATCH] audit: move audit_get_tty to reduce scope and kabi changes

On Tue, Jun 28, 2016 at 12:07 PM, Richard Guy Briggs <rgb@...hat.com> wrote:
> The only users of audit_get_tty and audit_put_tty are internal to audit,
> so move it out of include/linux/audit.h to kernel.h and create a proper
> function rather than inlining it.  This also reduces kABI changes.
>
> Suggested-by: Paul Moore <pmoore@...hat.com>
> Signed-off-by: Richard Guy Briggs <rgb@...hat.com>
> ---
>  include/linux/audit.h |   24 ------------------------
>  kernel/audit.c        |   17 +++++++++++++++++
>  kernel/audit.h        |    4 ++++
>  kernel/auditsc.c      |    1 -
>  4 files changed, 21 insertions(+), 25 deletions(-)

With some exceptions, unless it lives under include/uapi it really
isn't a stable API issue for the kernel; all the other kABI fun is a
distribution specific value-add and not something we care about
upstream.  That said, I think this is the better choice.

Further, since I'm already pushing your other patch to Linus for the
next 4.7-rc, I'm going to include this as I think it is worth fixing
now.  Although if Linus balks at this patch I'm not going to fight
very hard for it, I'll just defer it to a future merge window.

> diff --git a/include/linux/audit.h b/include/linux/audit.h
> index 32cdafb..b40ed5d 100644
> --- a/include/linux/audit.h
> +++ b/include/linux/audit.h
> @@ -26,7 +26,6 @@
>  #include <linux/sched.h>
>  #include <linux/ptrace.h>
>  #include <uapi/linux/audit.h>
> -#include <linux/tty.h>
>
>  #define AUDIT_INO_UNSET ((unsigned long)-1)
>  #define AUDIT_DEV_UNSET ((dev_t)-1)
> @@ -344,23 +343,6 @@ static inline unsigned int audit_get_sessionid(struct task_struct *tsk)
>         return tsk->sessionid;
>  }
>
> -static inline struct tty_struct *audit_get_tty(struct task_struct *tsk)
> -{
> -       struct tty_struct *tty = NULL;
> -       unsigned long flags;
> -
> -       spin_lock_irqsave(&tsk->sighand->siglock, flags);
> -       if (tsk->signal)
> -               tty = tty_kref_get(tsk->signal->tty);
> -       spin_unlock_irqrestore(&tsk->sighand->siglock, flags);
> -       return tty;
> -}
> -
> -static inline void audit_put_tty(struct tty_struct *tty)
> -{
> -       tty_kref_put(tty);
> -}
> -
>  extern void __audit_ipc_obj(struct kern_ipc_perm *ipcp);
>  extern void __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mode);
>  extern void __audit_bprm(struct linux_binprm *bprm);
> @@ -518,12 +500,6 @@ static inline unsigned int audit_get_sessionid(struct task_struct *tsk)
>  {
>         return -1;
>  }
> -static inline struct tty_struct *audit_get_tty(struct task_struct *tsk)
> -{
> -       return NULL;
> -}
> -static inline void audit_put_tty(struct tty_struct *tty)
> -{ }
>  static inline void audit_ipc_obj(struct kern_ipc_perm *ipcp)
>  { }
>  static inline void audit_ipc_set_perm(unsigned long qbytes, uid_t uid,
> diff --git a/kernel/audit.c b/kernel/audit.c
> index 384374a..d597101 100644
> --- a/kernel/audit.c
> +++ b/kernel/audit.c
> @@ -1866,6 +1866,23 @@ out_null:
>         audit_log_format(ab, " exe=(null)");
>  }
>
> +struct tty_struct *audit_get_tty(struct task_struct *tsk)
> +{
> +       struct tty_struct *tty = NULL;
> +       unsigned long flags;
> +
> +       spin_lock_irqsave(&tsk->sighand->siglock, flags);
> +       if (tsk->signal)
> +               tty = tty_kref_get(tsk->signal->tty);
> +       spin_unlock_irqrestore(&tsk->sighand->siglock, flags);
> +       return tty;
> +}
> +
> +void audit_put_tty(struct tty_struct *tty)
> +{
> +       tty_kref_put(tty);
> +}
> +
>  void audit_log_task_info(struct audit_buffer *ab, struct task_struct *tsk)
>  {
>         const struct cred *cred;
> diff --git a/kernel/audit.h b/kernel/audit.h
> index cbbe6bb..a492f4c 100644
> --- a/kernel/audit.h
> +++ b/kernel/audit.h
> @@ -23,6 +23,7 @@
>  #include <linux/audit.h>
>  #include <linux/skbuff.h>
>  #include <uapi/linux/mqueue.h>
> +#include <linux/tty.h>
>
>  /* AUDIT_NAMES is the number of slots we reserve in the audit_context
>   * for saving names from getname().  If we get more names we will allocate
> @@ -262,6 +263,9 @@ extern struct audit_entry *audit_dupe_rule(struct audit_krule *old);
>  extern void audit_log_d_path_exe(struct audit_buffer *ab,
>                                  struct mm_struct *mm);
>
> +extern struct tty_struct *audit_get_tty(struct task_struct *tsk);
> +extern void audit_put_tty(struct tty_struct *tty);
> +
>  /* audit watch functions */
>  #ifdef CONFIG_AUDIT_WATCH
>  extern void audit_put_watch(struct audit_watch *watch);
> diff --git a/kernel/auditsc.c b/kernel/auditsc.c
> index 33dafa7..60a354e 100644
> --- a/kernel/auditsc.c
> +++ b/kernel/auditsc.c
> @@ -63,7 +63,6 @@
>  #include <asm/unistd.h>
>  #include <linux/security.h>
>  #include <linux/list.h>
> -#include <linux/tty.h>
>  #include <linux/binfmts.h>
>  #include <linux/highmem.h>
>  #include <linux/syscalls.h>
> --
> 1.7.1
>



-- 
paul moore
security @ redhat

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ