lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 9 May 2018 12:07:00 +1000 From: "Tobin C. Harding" <tobin@...orbit.com> To: Richard Guy Briggs <rgb@...hat.com> Cc: Linux-Audit Mailing List <linux-audit@...hat.com>, LKML <linux-kernel@...r.kernel.org>, Linux NetDev Upstream Mailing List <netdev@...r.kernel.org>, Netfilter Devel List <netfilter-devel@...r.kernel.org>, Linux Security Module list <linux-security-module@...r.kernel.org>, Integrity Measurement Architecture <linux-integrity@...r.kernel.org>, SElinux list <selinux@...ho.nsa.gov>, Eric Paris <eparis@...hat.com>, Paul Moore <paul@...l-moore.com>, Steve Grubb <sgrubb@...hat.com>, Ingo Molnar <mingo@...hat.com>, David Howells <dhowells@...hat.com> Subject: Re: [PATCH ghak81 RFC V1 4/5] audit: use inline function to set audit context On Fri, May 04, 2018 at 04:54:37PM -0400, Richard Guy Briggs wrote: > Recognizing that the audit context is an internal audit value, use an > access function to set the audit context pointer for the task > rather than reaching directly into the task struct to set it. > > Signed-off-by: Richard Guy Briggs <rgb@...hat.com> > --- > include/linux/audit.h | 8 ++++++++ > kernel/auditsc.c | 6 +++--- > kernel/fork.c | 2 +- > 3 files changed, 12 insertions(+), 4 deletions(-) > > diff --git a/include/linux/audit.h b/include/linux/audit.h > index 93e4c61..dba0d45 100644 > --- a/include/linux/audit.h > +++ b/include/linux/audit.h > @@ -235,6 +235,10 @@ extern void __audit_inode_child(struct inode *parent, > extern void __audit_seccomp(unsigned long syscall, long signr, int code); > extern void __audit_ptrace(struct task_struct *t); > > +static inline void audit_set_context(struct task_struct *task, struct audit_context *ctx) > +{ > + task->audit_context = ctx; > +} > static inline struct audit_context *audit_context(struct task_struct *task) > { > return task->audit_context; > @@ -472,6 +476,10 @@ static inline bool audit_dummy_context(void) > { > return true; > } > +static inline void audit_set_context(struct task_struct *task, struct audit_context *ctx) > +{ > + task->audit_context = ctx; > +} If audit_context is an internal audit value why do we set it when CONFIG_AUDITSYSCALL is not set? thanks, Tobin.
Powered by blists - more mailing lists