On Tue, Feb 27, 2018 at 5:52 PM, Greg Edwards <gedwards(a)ddn.com> wrote:
 On Tue, Feb 27, 2018 at 05:28:09PM -0500, Paul Moore wrote:
> On Tue, Feb 27, 2018 at 10:59 AM, Greg Edwards <gedwards(a)ddn.com> wrote:
>> On Mon, Feb 26, 2018 at 07:00:51PM -0500, Paul Moore wrote:
>>>
>>> In the process of trying to explain things a bit further (see the
>>> discussion thread in 0/2), I realized that some example code might
>>> speak better than I could.  Below is what I was thinking for a fix; I
>>> haven't tested it, so it may blow up badly, but hopefully it makes
>>> things a bit more clear.
>>>
>>> One thing of note, I did away with the kstrtol() altogether, when we
>>> are only looking for zero and one it seems easier to just compare the
>>> strings.
>>>
>>> diff --git a/kernel/audit.c b/kernel/audit.c
>>> index 1a3e75d9a66c..5dd63f60ef90 100644
>>> --- a/kernel/audit.c
>>> +++ b/kernel/audit.c
>>> @@ -61,6 +61,7 @@
>>> #include <linux/gfp.h>
>>> #include <linux/pid.h>
>>> #include <linux/slab.h>
>>> +#include <linux/string.h>
>>>
>>> #include <linux/audit.h>
>>>
>>> @@ -86,6 +87,7 @@ static int    audit_initialized;
>>> #define AUDIT_OFF      0
>>> #define AUDIT_ON       1
>>> #define AUDIT_LOCKED   2
>>> +#define AUDIT_ARGERR   3       /* indicate a "audit=X" syntax
error at boot */
>>> u32            audit_enabled = AUDIT_OFF;
>>> bool           audit_ever_enabled = !!AUDIT_OFF;
>>>
>>> @@ -1581,6 +1583,12 @@ static int __init audit_init(void)
>>>        if (audit_initialized == AUDIT_DISABLED)
>>>                return 0;
>>>
>>> +       /* handle any delayed error reporting from audit_enable() */
>>> +       if (audit_default == AUDIT_ARGERR) {
>>> +               pr_err("invalid 'audit' parameter value, use 0
or 1\n");
>>> +               audit_default = AUDIT_ON;
>>> +       }
>>> +
>>
>> If you are just going to pr_err() on invalid audit parameter instead of
>> panic, you don't need AUDIT_ARGERR at all or the delayed error reporting
>> of it here.  You can just use pr_err() in audit_enable() directly.
>
> I thought the issue was that we couldn't reliably write to the console
> in audit_enable() as it required early printks to be enabled?
 You can't reliably panic from audit_enable() unless earlyprintk is
 enabled, since the boot stops at the panic and the regular console isn't
 initialized yet.  pr_err/printk etc work fine, as those messages just
 get queued up and output once the regular console is initialized (since
 the boot continues on). 
Thanks for the more detailed explanation, I was operating under the
assumption that the printks were happening immediately and not getting
queued; my mistake.
 So, if you want to keep the panic behavior on bad audit parameters,
your
 delayed processing should do the trick.  If it instead, you are fine
 with just pr_err and leaving audit enabled for that error case, then we
 are almost back to my original patch, with the exceptions you previously
 noted:
   * leave audit enabled on parsing error
   * change panic on audit_set_enabled() failure to pr_err
   * handle on/off as well
 My apologies if my commit message was misleading! 
No need to apologize, I was a bit confused, but I think I've got a
handle on it now.
If we get rid of the need to panic(), which I think we are all okay
with, I think we can resolve everything with something like this, yes?
diff --git a/kernel/audit.c b/kernel/audit.c
index 1a3e75d9a66c..d41d09e84163 100644
--- a/kernel/audit.c
+++ b/kernel/audit.c
@@ -1618,16 +1618,20 @@ postcore_initcall(audit_init);
/* Process kernel command-line parameter at boot time.  audit=0 or audit=1. */
static int __init audit_enable(char *str)
{
-       long val;
-
-       if (kstrtol(str, 0, &val))
-               panic("audit: invalid 'audit' parameter value (%s)\n",
str);
-       audit_default = (val ? AUDIT_ON : AUDIT_OFF);
+       if (!strcasecmp(str, "off") || !strcmp(str, "0"))
+               audit_default = AUDIT_OFF;
+       else if (!strcasecmp(str, "on") || !strcmp(str, "1"))
+               audit_default = AUDIT_ON;
+       else {
+               pr_err("audit: invalid 'audit' parameter value (%s)\n",
str);
+               audit_default = AUDIT_ON;
+       }
       if (audit_default == AUDIT_OFF)
               audit_initialized = AUDIT_DISABLED;
       if (audit_set_enabled(audit_default))
-               panic("audit: error setting audit state (%d)\n",
audit_default);
+               pr_err("audit: error setting audit state (%d)\n",
+                      audit_default);
       pr_info("%s\n", audit_default ?
               "enabled (after initialization)" : "disabled (until
reboot)");
-- 
paul moore
www.paul-moore.com