lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 8 Jul 2020 19:06:18 -0400 From: Paul Moore <paul@...l-moore.com> To: Richard Guy Briggs <rgb@...hat.com> Cc: Linux-Audit Mailing List <linux-audit@...hat.com>, LKML <linux-kernel@...r.kernel.org>, Linux Security Module list <linux-security-module@...r.kernel.org>, Eric Paris <eparis@...isplace.org>, john.johansen@...onical.com Subject: Re: [PATCH ghak96 v3] audit: issue CWD record to accompany LSM_AUDIT_DATA_* records On Fri, Jul 3, 2020 at 12:56 PM Richard Guy Briggs <rgb@...hat.com> wrote: > > The LSM_AUDIT_DATA_* records for PATH, FILE, IOCTL_OP, DENTRY and INODE > are incomplete without the task context of the AUDIT Current Working > Directory record. Add it. > > This record addition can't use audit_dummy_context to determine whether > or not to store the record information since the LSM_AUDIT_DATA_* > records are initiated by various LSMs independent of any audit rules. > context->in_syscall is used to determine if it was called in user > context like audit_getname. > > Please see the upstream issue > https://github.com/linux-audit/audit-kernel/issues/96 > > Adapted from Vladis Dronov's v2 patch. > > Signed-off-by: Richard Guy Briggs <rgb@...hat.com> > --- > Passes audit-testsuite. > > Changelog: > v3 > - adapt and refactor__audit_getname, don't key on dummy > > v2 > 2020-04-02 vdronov https://www.redhat.com/archives/linux-audit/2020-April/msg00004.html > - convert to standalone CWD record > > v1: > 2020-03-24 vdronov https://github.com/nefigtut/audit-kernel/commit/df0b55b7ab84e1c9faa588b08e547e604bf25c87 > - add cwd= field to LSM record > > include/linux/audit.h | 9 ++++++++- > kernel/auditsc.c | 17 +++++++++++++++-- > security/lsm_audit.c | 5 +++++ > 3 files changed, 28 insertions(+), 3 deletions(-) Merged into audit/next, thanks. -- paul moore www.paul-moore.com
Powered by blists - more mailing lists