diff options
| author | Randy Dunlap <rdunlap@xenotime.net> | 2005-09-13 15:47:11 -0400 |
|---|---|---|
| committer | Al Viro <viro@zeniv.linux.org.uk> | 2006-03-20 14:08:53 -0500 |
| commit | b0dd25a8263dde3c30b0d7d72a8bd92d7ba0e3f5 (patch) | |
| tree | 8eadfe525920c8256d755b084035a513e3dcab47 /kernel | |
| parent | 7e7f8a036b8e2b2a300df016da5e7128c8a9192e (diff) | |
[PATCH] AUDIT: kerneldoc for kernel/audit*.c
- add kerneldoc for non-static functions;
- don't init static data to 0;
- limit lines to < 80 columns;
- fix long-format style;
- delete whitespace at end of some lines;
(chrisw: resend and update to current audit-2.6 tree)
Signed-off-by: Randy Dunlap <rdunlap@xenotime.net>
Signed-off-by: Chris Wright <chrisw@osdl.org>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
Diffstat (limited to 'kernel')
| -rw-r--r-- | kernel/audit.c | 134 | ||||
| -rw-r--r-- | kernel/auditsc.c | 150 |
2 files changed, 238 insertions, 46 deletions
diff --git a/kernel/audit.c b/kernel/audit.c index 0a813d2883e5..973ca5a9e0d6 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
| @@ -72,7 +72,7 @@ static int audit_failure = AUDIT_FAIL_PRINTK; | |||
| 72 | * contains the (non-zero) pid. */ | 72 | * contains the (non-zero) pid. */ |
| 73 | int audit_pid; | 73 | int audit_pid; |
| 74 | 74 | ||
| 75 | /* If audit_limit is non-zero, limit the rate of sending audit records | 75 | /* If audit_rate_limit is non-zero, limit the rate of sending audit records |
| 76 | * to that number per second. This prevents DoS attacks, but results in | 76 | * to that number per second. This prevents DoS attacks, but results in |
| 77 | * audit records being dropped. */ | 77 | * audit records being dropped. */ |
| 78 | static int audit_rate_limit; | 78 | static int audit_rate_limit; |
| @@ -102,7 +102,7 @@ static struct sock *audit_sock; | |||
| 102 | * than AUDIT_MAXFREE are in use, the audit buffer is freed instead of | 102 | * than AUDIT_MAXFREE are in use, the audit buffer is freed instead of |
| 103 | * being placed on the freelist). */ | 103 | * being placed on the freelist). */ |
| 104 | static DEFINE_SPINLOCK(audit_freelist_lock); | 104 | static DEFINE_SPINLOCK(audit_freelist_lock); |
| 105 | static int audit_freelist_count = 0; | 105 | static int audit_freelist_count; |
| 106 | static LIST_HEAD(audit_freelist); | 106 | static LIST_HEAD(audit_freelist); |
| 107 | 107 | ||
| 108 | static struct sk_buff_head audit_skb_queue; | 108 | static struct sk_buff_head audit_skb_queue; |
| @@ -186,8 +186,14 @@ static inline int audit_rate_check(void) | |||
| 186 | return retval; | 186 | return retval; |
| 187 | } | 187 | } |
| 188 | 188 | ||
| 189 | /* Emit at least 1 message per second, even if audit_rate_check is | 189 | /** |
| 190 | * throttling. */ | 190 | * audit_log_lost - conditionally log lost audit message event |
| 191 | * @message: the message stating reason for lost audit message | ||
| 192 | * | ||
| 193 | * Emit at least 1 message per second, even if audit_rate_check is | ||
| 194 | * throttling. | ||
| 195 | * Always increment the lost messages counter. | ||
| 196 | */ | ||
| 191 | void audit_log_lost(const char *message) | 197 | void audit_log_lost(const char *message) |
| 192 | { | 198 | { |
| 193 | static unsigned long last_msg = 0; | 199 | static unsigned long last_msg = 0; |
| @@ -218,7 +224,6 @@ void audit_log_lost(const char *message) | |||
| 218 | audit_backlog_limit); | 224 | audit_backlog_limit); |
| 219 | audit_panic(message); | 225 | audit_panic(message); |
| 220 | } | 226 | } |
| 221 | |||
| 222 | } | 227 | } |
| 223 | 228 | ||
| 224 | static int audit_set_rate_limit(int limit, uid_t loginuid) | 229 | static int audit_set_rate_limit(int limit, uid_t loginuid) |
| @@ -302,6 +307,19 @@ static int kauditd_thread(void *dummy) | |||
| 302 | } | 307 | } |
| 303 | } | 308 | } |
| 304 | 309 | ||
| 310 | /** | ||
| 311 | * audit_send_reply - send an audit reply message via netlink | ||
| 312 | * @pid: process id to send reply to | ||
| 313 | * @seq: sequence number | ||
| 314 | * @type: audit message type | ||
| 315 | * @done: done (last) flag | ||
| 316 | * @multi: multi-part message flag | ||
| 317 | * @payload: payload data | ||
| 318 | * @size: payload size | ||
| 319 | * | ||
| 320 | * Allocates an skb, builds the netlink message, and sends it to the pid. | ||
| 321 | * No failure notifications. | ||
| 322 | */ | ||
| 305 | void audit_send_reply(int pid, int seq, int type, int done, int multi, | 323 | void audit_send_reply(int pid, int seq, int type, int done, int multi, |
| 306 | void *payload, int size) | 324 | void *payload, int size) |
| 307 | { | 325 | { |
| @@ -376,7 +394,8 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
| 376 | if (err) | 394 | if (err) |
| 377 | return err; | 395 | return err; |
| 378 | 396 | ||
| 379 | /* As soon as there's any sign of userspace auditd, start kauditd to talk to it */ | 397 | /* As soon as there's any sign of userspace auditd, |
| 398 | * start kauditd to talk to it */ | ||
| 380 | if (!kauditd_task) | 399 | if (!kauditd_task) |
| 381 | kauditd_task = kthread_run(kauditd_thread, NULL, "kauditd"); | 400 | kauditd_task = kthread_run(kauditd_thread, NULL, "kauditd"); |
| 382 | if (IS_ERR(kauditd_task)) { | 401 | if (IS_ERR(kauditd_task)) { |
| @@ -469,9 +488,11 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
| 469 | return err < 0 ? err : 0; | 488 | return err < 0 ? err : 0; |
| 470 | } | 489 | } |
| 471 | 490 | ||
| 472 | /* Get message from skb (based on rtnetlink_rcv_skb). Each message is | 491 | /* |
| 492 | * Get message from skb (based on rtnetlink_rcv_skb). Each message is | ||
| 473 | * processed by audit_receive_msg. Malformed skbs with wrong length are | 493 | * processed by audit_receive_msg. Malformed skbs with wrong length are |
| 474 | * discarded silently. */ | 494 | * discarded silently. |
| 495 | */ | ||
| 475 | static void audit_receive_skb(struct sk_buff *skb) | 496 | static void audit_receive_skb(struct sk_buff *skb) |
| 476 | { | 497 | { |
| 477 | int err; | 498 | int err; |
| @@ -600,7 +621,10 @@ err: | |||
| 600 | return NULL; | 621 | return NULL; |
| 601 | } | 622 | } |
| 602 | 623 | ||
| 603 | /* Compute a serial number for the audit record. Audit records are | 624 | /** |
| 625 | * audit_serial - compute a serial number for the audit record | ||
| 626 | * | ||
| 627 | * Compute a serial number for the audit record. Audit records are | ||
| 604 | * written to user-space as soon as they are generated, so a complete | 628 | * written to user-space as soon as they are generated, so a complete |
| 605 | * audit record may be written in several pieces. The timestamp of the | 629 | * audit record may be written in several pieces. The timestamp of the |
| 606 | * record and this serial number are used by the user-space tools to | 630 | * record and this serial number are used by the user-space tools to |
| @@ -612,8 +636,8 @@ err: | |||
| 612 | * audit context (for those records that have a context), and emit them | 636 | * audit context (for those records that have a context), and emit them |
| 613 | * all at syscall exit. However, this could delay the reporting of | 637 | * all at syscall exit. However, this could delay the reporting of |
| 614 | * significant errors until syscall exit (or never, if the system | 638 | * significant errors until syscall exit (or never, if the system |
| 615 | * halts). */ | 639 | * halts). |
| 616 | 640 | */ | |
| 617 | unsigned int audit_serial(void) | 641 | unsigned int audit_serial(void) |
| 618 | { | 642 | { |
| 619 | static spinlock_t serial_lock = SPIN_LOCK_UNLOCKED; | 643 | static spinlock_t serial_lock = SPIN_LOCK_UNLOCKED; |
| @@ -649,6 +673,21 @@ static inline void audit_get_stamp(struct audit_context *ctx, | |||
| 649 | * will be written at syscall exit. If there is no associated task, tsk | 673 | * will be written at syscall exit. If there is no associated task, tsk |
| 650 | * should be NULL. */ | 674 | * should be NULL. */ |
| 651 | 675 | ||
| 676 | /** | ||
| 677 | * audit_log_start - obtain an audit buffer | ||
| 678 | * @ctx: audit_context (may be NULL) | ||
| 679 | * @gfp_mask: type of allocation | ||
| 680 | * @type: audit message type | ||
| 681 | * | ||
| 682 | * Returns audit_buffer pointer on success or NULL on error. | ||
| 683 | * | ||
| 684 | * Obtain an audit buffer. This routine does locking to obtain the | ||
| 685 | * audit buffer, but then no locking is required for calls to | ||
| 686 | * audit_log_*format. If the task (ctx) is a task that is currently in a | ||
| 687 | * syscall, then the syscall is marked as auditable and an audit record | ||
| 688 | * will be written at syscall exit. If there is no associated task, then | ||
| 689 | * task context (ctx) should be NULL. | ||
| 690 | */ | ||
| 652 | struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, | 691 | struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, |
| 653 | int type) | 692 | int type) |
| 654 | { | 693 | { |
| @@ -713,6 +752,7 @@ struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, | |||
| 713 | /** | 752 | /** |
| 714 | * audit_expand - expand skb in the audit buffer | 753 | * audit_expand - expand skb in the audit buffer |
| 715 | * @ab: audit_buffer | 754 | * @ab: audit_buffer |
| 755 | * @extra: space to add at tail of the skb | ||
| 716 | * | 756 | * |
| 717 | * Returns 0 (no space) on failed expansion, or available space if | 757 | * Returns 0 (no space) on failed expansion, or available space if |
| 718 | * successful. | 758 | * successful. |
| @@ -729,10 +769,12 @@ static inline int audit_expand(struct audit_buffer *ab, int extra) | |||
| 729 | return skb_tailroom(skb); | 769 | return skb_tailroom(skb); |
| 730 | } | 770 | } |
| 731 | 771 | ||
| 732 | /* Format an audit message into the audit buffer. If there isn't enough | 772 | /* |
| 773 | * Format an audit message into the audit buffer. If there isn't enough | ||
| 733 | * room in the audit buffer, more room will be allocated and vsnprint | 774 | * room in the audit buffer, more room will be allocated and vsnprint |
| 734 | * will be called a second time. Currently, we assume that a printk | 775 | * will be called a second time. Currently, we assume that a printk |
| 735 | * can't format message larger than 1024 bytes, so we don't either. */ | 776 | * can't format message larger than 1024 bytes, so we don't either. |
| 777 | */ | ||
| 736 | static void audit_log_vformat(struct audit_buffer *ab, const char *fmt, | 778 | static void audit_log_vformat(struct audit_buffer *ab, const char *fmt, |
| 737 | va_list args) | 779 | va_list args) |
| 738 | { | 780 | { |
| @@ -757,7 +799,8 @@ static void audit_log_vformat(struct audit_buffer *ab, const char *fmt, | |||
| 757 | /* The printk buffer is 1024 bytes long, so if we get | 799 | /* The printk buffer is 1024 bytes long, so if we get |
| 758 | * here and AUDIT_BUFSIZ is at least 1024, then we can | 800 | * here and AUDIT_BUFSIZ is at least 1024, then we can |
| 759 | * log everything that printk could have logged. */ | 801 | * log everything that printk could have logged. */ |
| 760 | avail = audit_expand(ab, max_t(unsigned, AUDIT_BUFSIZ, 1+len-avail)); | 802 | avail = audit_expand(ab, |
| 803 | max_t(unsigned, AUDIT_BUFSIZ, 1+len-avail)); | ||
| 761 | if (!avail) | 804 | if (!avail) |
| 762 | goto out; | 805 | goto out; |
| 763 | len = vsnprintf(skb->tail, avail, fmt, args2); | 806 | len = vsnprintf(skb->tail, avail, fmt, args2); |
| @@ -768,8 +811,14 @@ out: | |||
| 768 | return; | 811 | return; |
| 769 | } | 812 | } |
| 770 | 813 | ||
| 771 | /* Format a message into the audit buffer. All the work is done in | 814 | /** |
| 772 | * audit_log_vformat. */ | 815 | * audit_log_format - format a message into the audit buffer. |
| 816 | * @ab: audit_buffer | ||
| 817 | * @fmt: format string | ||
| 818 | * @...: optional parameters matching @fmt string | ||
| 819 | * | ||
| 820 | * All the work is done in audit_log_vformat. | ||
| 821 | */ | ||
| 773 | void audit_log_format(struct audit_buffer *ab, const char *fmt, ...) | 822 | void audit_log_format(struct audit_buffer *ab, const char *fmt, ...) |
| 774 | { | 823 | { |
| 775 | va_list args; | 824 | va_list args; |
| @@ -781,9 +830,18 @@ void audit_log_format(struct audit_buffer *ab, const char *fmt, ...) | |||
| 781 | va_end(args); | 830 | va_end(args); |
| 782 | } | 831 | } |
| 783 | 832 | ||
| 784 | /* This function will take the passed buf and convert it into a string of | 833 | /** |
| 785 | * ascii hex digits. The new string is placed onto the skb. */ | 834 | * audit_log_hex - convert a buffer to hex and append it to the audit skb |
| 786 | void audit_log_hex(struct audit_buffer *ab, const unsigned char *buf, | 835 | * @ab: the audit_buffer |
| 836 | * @buf: buffer to convert to hex | ||
| 837 | * @len: length of @buf to be converted | ||
| 838 | * | ||
| 839 | * No return value; failure to expand is silently ignored. | ||
| 840 | * | ||
| 841 | * This function will take the passed buf and convert it into a string of | ||
| 842 | * ascii hex digits. The new string is placed onto the skb. | ||
| 843 | */ | ||
| 844 | void audit_log_hex(struct audit_buffer *ab, const unsigned char *buf, | ||
| 787 | size_t len) | 845 | size_t len) |
| 788 | { | 846 | { |
| 789 | int i, avail, new_len; | 847 | int i, avail, new_len; |
| @@ -812,10 +870,16 @@ void audit_log_hex(struct audit_buffer *ab, const unsigned char *buf, | |||
| 812 | skb_put(skb, len << 1); /* new string is twice the old string */ | 870 | skb_put(skb, len << 1); /* new string is twice the old string */ |
| 813 | } | 871 | } |
| 814 | 872 | ||
| 815 | /* This code will escape a string that is passed to it if the string | 873 | /** |
| 816 | * contains a control character, unprintable character, double quote mark, | 874 | * audit_log_unstrustedstring - log a string that may contain random characters |
| 875 | * @ab: audit_buffer | ||
| 876 | * @string: string to be logged | ||
| 877 | * | ||
| 878 | * This code will escape a string that is passed to it if the string | ||
| 879 | * contains a control character, unprintable character, double quote mark, | ||
| 817 | * or a space. Unescaped strings will start and end with a double quote mark. | 880 | * or a space. Unescaped strings will start and end with a double quote mark. |
| 818 | * Strings that are escaped are printed in hex (2 digits per char). */ | 881 | * Strings that are escaped are printed in hex (2 digits per char). |
| 882 | */ | ||
| 819 | void audit_log_untrustedstring(struct audit_buffer *ab, const char *string) | 883 | void audit_log_untrustedstring(struct audit_buffer *ab, const char *string) |
| 820 | { | 884 | { |
| 821 | const unsigned char *p = string; | 885 | const unsigned char *p = string; |
| @@ -854,10 +918,15 @@ void audit_log_d_path(struct audit_buffer *ab, const char *prefix, | |||
| 854 | kfree(path); | 918 | kfree(path); |
| 855 | } | 919 | } |
| 856 | 920 | ||
| 857 | /* The netlink_* functions cannot be called inside an irq context, so | 921 | /** |
| 858 | * the audit buffer is places on a queue and a tasklet is scheduled to | 922 | * audit_log_end - end one audit record |
| 923 | * @ab: the audit_buffer | ||
| 924 | * | ||
| 925 | * The netlink_* functions cannot be called inside an irq context, so | ||
| 926 | * the audit buffer is placed on a queue and a tasklet is scheduled to | ||
| 859 | * remove them from the queue outside the irq context. May be called in | 927 | * remove them from the queue outside the irq context. May be called in |
| 860 | * any context. */ | 928 | * any context. |
| 929 | */ | ||
| 861 | void audit_log_end(struct audit_buffer *ab) | 930 | void audit_log_end(struct audit_buffer *ab) |
| 862 | { | 931 | { |
| 863 | if (!ab) | 932 | if (!ab) |
| @@ -878,9 +947,18 @@ void audit_log_end(struct audit_buffer *ab) | |||
| 878 | audit_buffer_free(ab); | 947 | audit_buffer_free(ab); |
| 879 | } | 948 | } |
| 880 | 949 | ||
| 881 | /* Log an audit record. This is a convenience function that calls | 950 | /** |
| 882 | * audit_log_start, audit_log_vformat, and audit_log_end. It may be | 951 | * audit_log - Log an audit record |
| 883 | * called in any context. */ | 952 | * @ctx: audit context |
| 953 | * @gfp_mask: type of allocation | ||
| 954 | * @type: audit message type | ||
| 955 | * @fmt: format string to use | ||
| 956 | * @...: variable parameters matching the format string | ||
| 957 | * | ||
| 958 | * This is a convenience function that calls audit_log_start, | ||
| 959 | * audit_log_vformat, and audit_log_end. It may be called | ||
| 960 | * in any context. | ||
| 961 | */ | ||
| 884 | void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, | 962 | void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, |
| 885 | const char *fmt, ...) | 963 | const char *fmt, ...) |
| 886 | { | 964 | { |
diff --git a/kernel/auditsc.c b/kernel/auditsc.c index cfaa4a277f08..51a4f58a4d81 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c | |||
| @@ -330,6 +330,15 @@ static int audit_list_rules(void *_dest) | |||
| 330 | return 0; | 330 | return 0; |
| 331 | } | 331 | } |
| 332 | 332 | ||
| 333 | /** | ||
| 334 | * audit_receive_filter - apply all rules to the specified message type | ||
| 335 | * @type: audit message type | ||
| 336 | * @pid: target pid for netlink audit messages | ||
| 337 | * @uid: target uid for netlink audit messages | ||
| 338 | * @seq: netlink audit message sequence (serial) number | ||
| 339 | * @data: payload data | ||
| 340 | * @loginuid: loginuid of sender | ||
| 341 | */ | ||
| 333 | int audit_receive_filter(int type, int pid, int uid, int seq, void *data, | 342 | int audit_receive_filter(int type, int pid, int uid, int seq, void *data, |
| 334 | uid_t loginuid) | 343 | uid_t loginuid) |
| 335 | { | 344 | { |
| @@ -527,7 +536,7 @@ static enum audit_state audit_filter_task(struct task_struct *tsk) | |||
| 527 | /* At syscall entry and exit time, this filter is called if the | 536 | /* At syscall entry and exit time, this filter is called if the |
| 528 | * audit_state is not low enough that auditing cannot take place, but is | 537 | * audit_state is not low enough that auditing cannot take place, but is |
| 529 | * also not high enough that we already know we have to write an audit | 538 | * also not high enough that we already know we have to write an audit |
| 530 | * record (i.e., the state is AUDIT_SETUP_CONTEXT or AUDIT_BUILD_CONTEXT). | 539 | * record (i.e., the state is AUDIT_SETUP_CONTEXT or AUDIT_BUILD_CONTEXT). |
| 531 | */ | 540 | */ |
| 532 | static enum audit_state audit_filter_syscall(struct task_struct *tsk, | 541 | static enum audit_state audit_filter_syscall(struct task_struct *tsk, |
| 533 | struct audit_context *ctx, | 542 | struct audit_context *ctx, |
| @@ -721,10 +730,15 @@ static inline struct audit_context *audit_alloc_context(enum audit_state state) | |||
| 721 | return context; | 730 | return context; |
| 722 | } | 731 | } |
| 723 | 732 | ||
| 724 | /* Filter on the task information and allocate a per-task audit context | 733 | /** |
| 734 | * audit_alloc - allocate an audit context block for a task | ||
| 735 | * @tsk: task | ||
| 736 | * | ||
| 737 | * Filter on the task information and allocate a per-task audit context | ||
| 725 | * if necessary. Doing so turns on system call auditing for the | 738 | * if necessary. Doing so turns on system call auditing for the |
| 726 | * specified task. This is called from copy_process, so no lock is | 739 | * specified task. This is called from copy_process, so no lock is |
| 727 | * needed. */ | 740 | * needed. |
| 741 | */ | ||
| 728 | int audit_alloc(struct task_struct *tsk) | 742 | int audit_alloc(struct task_struct *tsk) |
| 729 | { | 743 | { |
| 730 | struct audit_context *context; | 744 | struct audit_context *context; |
| @@ -911,8 +925,12 @@ static void audit_log_exit(struct audit_context *context, gfp_t gfp_mask) | |||
| 911 | } | 925 | } |
| 912 | } | 926 | } |
| 913 | 927 | ||
| 914 | /* Free a per-task audit context. Called from copy_process and | 928 | /** |
| 915 | * __put_task_struct. */ | 929 | * audit_free - free a per-task audit context |
| 930 | * @tsk: task whose audit context block to free | ||
| 931 | * | ||
| 932 | * Called from copy_process and __put_task_struct. | ||
| 933 | */ | ||
| 916 | void audit_free(struct task_struct *tsk) | 934 | void audit_free(struct task_struct *tsk) |
| 917 | { | 935 | { |
| 918 | struct audit_context *context; | 936 | struct audit_context *context; |
| @@ -934,13 +952,24 @@ void audit_free(struct task_struct *tsk) | |||
| 934 | audit_free_context(context); | 952 | audit_free_context(context); |
| 935 | } | 953 | } |
| 936 | 954 | ||
| 937 | /* Fill in audit context at syscall entry. This only happens if the | 955 | /** |
| 956 | * audit_syscall_entry - fill in an audit record at syscall entry | ||
| 957 | * @tsk: task being audited | ||
| 958 | * @arch: architecture type | ||
| 959 | * @major: major syscall type (function) | ||
| 960 | * @a1: additional syscall register 1 | ||
| 961 | * @a2: additional syscall register 2 | ||
| 962 | * @a3: additional syscall register 3 | ||
| 963 | * @a4: additional syscall register 4 | ||
| 964 | * | ||
| 965 | * Fill in audit context at syscall entry. This only happens if the | ||
| 938 | * audit context was created when the task was created and the state or | 966 | * audit context was created when the task was created and the state or |
| 939 | * filters demand the audit context be built. If the state from the | 967 | * filters demand the audit context be built. If the state from the |
| 940 | * per-task filter or from the per-syscall filter is AUDIT_RECORD_CONTEXT, | 968 | * per-task filter or from the per-syscall filter is AUDIT_RECORD_CONTEXT, |
| 941 | * then the record will be written at syscall exit time (otherwise, it | 969 | * then the record will be written at syscall exit time (otherwise, it |
| 942 | * will only be written if another part of the kernel requests that it | 970 | * will only be written if another part of the kernel requests that it |
| 943 | * be written). */ | 971 | * be written). |
| 972 | */ | ||
| 944 | void audit_syscall_entry(struct task_struct *tsk, int arch, int major, | 973 | void audit_syscall_entry(struct task_struct *tsk, int arch, int major, |
| 945 | unsigned long a1, unsigned long a2, | 974 | unsigned long a1, unsigned long a2, |
| 946 | unsigned long a3, unsigned long a4) | 975 | unsigned long a3, unsigned long a4) |
| @@ -950,7 +979,8 @@ void audit_syscall_entry(struct task_struct *tsk, int arch, int major, | |||
| 950 | 979 | ||
| 951 | BUG_ON(!context); | 980 | BUG_ON(!context); |
| 952 | 981 | ||
| 953 | /* This happens only on certain architectures that make system | 982 | /* |
| 983 | * This happens only on certain architectures that make system | ||
| 954 | * calls in kernel_thread via the entry.S interface, instead of | 984 | * calls in kernel_thread via the entry.S interface, instead of |
| 955 | * with direct calls. (If you are porting to a new | 985 | * with direct calls. (If you are porting to a new |
| 956 | * architecture, hitting this condition can indicate that you | 986 | * architecture, hitting this condition can indicate that you |
| @@ -1009,11 +1039,18 @@ void audit_syscall_entry(struct task_struct *tsk, int arch, int major, | |||
| 1009 | context->auditable = !!(state == AUDIT_RECORD_CONTEXT); | 1039 | context->auditable = !!(state == AUDIT_RECORD_CONTEXT); |
| 1010 | } | 1040 | } |
| 1011 | 1041 | ||
| 1012 | /* Tear down after system call. If the audit context has been marked as | 1042 | /** |
| 1043 | * audit_syscall_exit - deallocate audit context after a system call | ||
| 1044 | * @tsk: task being audited | ||
| 1045 | * @valid: success/failure flag | ||
| 1046 | * @return_code: syscall return value | ||
| 1047 | * | ||
| 1048 | * Tear down after system call. If the audit context has been marked as | ||
| 1013 | * auditable (either because of the AUDIT_RECORD_CONTEXT state from | 1049 | * auditable (either because of the AUDIT_RECORD_CONTEXT state from |
| 1014 | * filtering, or because some other part of the kernel write an audit | 1050 | * filtering, or because some other part of the kernel write an audit |
| 1015 | * message), then write out the syscall information. In call cases, | 1051 | * message), then write out the syscall information. In call cases, |
| 1016 | * free the names stored from getname(). */ | 1052 | * free the names stored from getname(). |
| 1053 | */ | ||
| 1017 | void audit_syscall_exit(struct task_struct *tsk, int valid, long return_code) | 1054 | void audit_syscall_exit(struct task_struct *tsk, int valid, long return_code) |
| 1018 | { | 1055 | { |
| 1019 | struct audit_context *context; | 1056 | struct audit_context *context; |
| @@ -1048,7 +1085,13 @@ void audit_syscall_exit(struct task_struct *tsk, int valid, long return_code) | |||
| 1048 | put_task_struct(tsk); | 1085 | put_task_struct(tsk); |
| 1049 | } | 1086 | } |
| 1050 | 1087 | ||
| 1051 | /* Add a name to the list. Called from fs/namei.c:getname(). */ | 1088 | /** |
| 1089 | * audit_getname - add a name to the list | ||
| 1090 | * @name: name to add | ||
| 1091 | * | ||
| 1092 | * Add a name to the list of audit names for this context. | ||
| 1093 | * Called from fs/namei.c:getname(). | ||
| 1094 | */ | ||
| 1052 | void audit_getname(const char *name) | 1095 | void audit_getname(const char *name) |
| 1053 | { | 1096 | { |
| 1054 | struct audit_context *context = current->audit_context; | 1097 | struct audit_context *context = current->audit_context; |
| @@ -1077,10 +1120,13 @@ void audit_getname(const char *name) | |||
| 1077 | 1120 | ||
| 1078 | } | 1121 | } |
| 1079 | 1122 | ||
| 1080 | /* Intercept a putname request. Called from | 1123 | /* audit_putname - intercept a putname request |
| 1081 | * include/linux/fs.h:putname(). If we have stored the name from | 1124 | * @name: name to intercept and delay for putname |
| 1082 | * getname in the audit context, then we delay the putname until syscall | 1125 | * |
| 1083 | * exit. */ | 1126 | * If we have stored the name from getname in the audit context, |
| 1127 | * then we delay the putname until syscall exit. | ||
| 1128 | * Called from include/linux/fs.h:putname(). | ||
| 1129 | */ | ||
| 1084 | void audit_putname(const char *name) | 1130 | void audit_putname(const char *name) |
| 1085 | { | 1131 | { |
| 1086 | struct audit_context *context = current->audit_context; | 1132 | struct audit_context *context = current->audit_context; |
| @@ -1117,8 +1163,14 @@ void audit_putname(const char *name) | |||
| 1117 | #endif | 1163 | #endif |
| 1118 | } | 1164 | } |
| 1119 | 1165 | ||
| 1120 | /* Store the inode and device from a lookup. Called from | 1166 | /** |
| 1121 | * fs/namei.c:path_lookup(). */ | 1167 | * audit_inode - store the inode and device from a lookup |
| 1168 | * @name: name being audited | ||
| 1169 | * @inode: inode being audited | ||
| 1170 | * @flags: lookup flags (as used in path_lookup()) | ||
| 1171 | * | ||
| 1172 | * Called from fs/namei.c:path_lookup(). | ||
| 1173 | */ | ||
| 1122 | void audit_inode(const char *name, const struct inode *inode, unsigned flags) | 1174 | void audit_inode(const char *name, const struct inode *inode, unsigned flags) |
| 1123 | { | 1175 | { |
| 1124 | int idx; | 1176 | int idx; |
| @@ -1154,6 +1206,14 @@ void audit_inode(const char *name, const struct inode *inode, unsigned flags) | |||
| 1154 | context->names[idx].rdev = inode->i_rdev; | 1206 | context->names[idx].rdev = inode->i_rdev; |
| 1155 | } | 1207 | } |
| 1156 | 1208 | ||
| 1209 | /** | ||
| 1210 | * auditsc_get_stamp - get local copies of audit_context values | ||
| 1211 | * @ctx: audit_context for the task | ||
| 1212 | * @t: timespec to store time recorded in the audit_context | ||
| 1213 | * @serial: serial value that is recorded in the audit_context | ||
| 1214 | * | ||
| 1215 | * Also sets the context as auditable. | ||
| 1216 | */ | ||
| 1157 | void auditsc_get_stamp(struct audit_context *ctx, | 1217 | void auditsc_get_stamp(struct audit_context *ctx, |
| 1158 | struct timespec *t, unsigned int *serial) | 1218 | struct timespec *t, unsigned int *serial) |
| 1159 | { | 1219 | { |
| @@ -1165,6 +1225,15 @@ void auditsc_get_stamp(struct audit_context *ctx, | |||
| 1165 | ctx->auditable = 1; | 1225 | ctx->auditable = 1; |
| 1166 | } | 1226 | } |
| 1167 | 1227 | ||
| 1228 | /** | ||
| 1229 | * audit_set_loginuid - set a task's audit_context loginuid | ||
| 1230 | * @task: task whose audit context is being modified | ||
| 1231 | * @loginuid: loginuid value | ||
| 1232 | * | ||
| 1233 | * Returns 0. | ||
| 1234 | * | ||
| 1235 | * Called (set) from fs/proc/base.c::proc_loginuid_write(). | ||
| 1236 | */ | ||
| 1168 | int audit_set_loginuid(struct task_struct *task, uid_t loginuid) | 1237 | int audit_set_loginuid(struct task_struct *task, uid_t loginuid) |
| 1169 | { | 1238 | { |
| 1170 | if (task->audit_context) { | 1239 | if (task->audit_context) { |
| @@ -1183,11 +1252,26 @@ int audit_set_loginuid(struct task_struct *task, uid_t loginuid) | |||
| 1183 | return 0; | 1252 | return 0; |
| 1184 | } | 1253 | } |
| 1185 | 1254 | ||
| 1255 | /** | ||
| 1256 | * audit_get_loginuid - get the loginuid for an audit_context | ||
| 1257 | * @ctx: the audit_context | ||
| 1258 | * | ||
| 1259 | * Returns the context's loginuid or -1 if @ctx is NULL. | ||
| 1260 | */ | ||
| 1186 | uid_t audit_get_loginuid(struct audit_context *ctx) | 1261 | uid_t audit_get_loginuid(struct audit_context *ctx) |
| 1187 | { | 1262 | { |
| 1188 | return ctx ? ctx->loginuid : -1; | 1263 | return ctx ? ctx->loginuid : -1; |
| 1189 | } | 1264 | } |
| 1190 | 1265 | ||
| 1266 | /** | ||
| 1267 | * audit_ipc_perms - record audit data for ipc | ||
| 1268 | * @qbytes: msgq bytes | ||
| 1269 | * @uid: msgq user id | ||
| 1270 | * @gid: msgq group id | ||
| 1271 | * @mode: msgq mode (permissions) | ||
| 1272 | * | ||
| 1273 | * Returns 0 for success or NULL context or < 0 on error. | ||
| 1274 | */ | ||
| 1191 | int audit_ipc_perms(unsigned long qbytes, uid_t uid, gid_t gid, mode_t mode) | 1275 | int audit_ipc_perms(unsigned long qbytes, uid_t uid, gid_t gid, mode_t mode) |
| 1192 | { | 1276 | { |
| 1193 | struct audit_aux_data_ipcctl *ax; | 1277 | struct audit_aux_data_ipcctl *ax; |
| @@ -1211,6 +1295,13 @@ int audit_ipc_perms(unsigned long qbytes, uid_t uid, gid_t gid, mode_t mode) | |||
| 1211 | return 0; | 1295 | return 0; |
| 1212 | } | 1296 | } |
| 1213 | 1297 | ||
| 1298 | /** | ||
| 1299 | * audit_socketcall - record audit data for sys_socketcall | ||
| 1300 | * @nargs: number of args | ||
| 1301 | * @args: args array | ||
| 1302 | * | ||
| 1303 | * Returns 0 for success or NULL context or < 0 on error. | ||
| 1304 | */ | ||
| 1214 | int audit_socketcall(int nargs, unsigned long *args) | 1305 | int audit_socketcall(int nargs, unsigned long *args) |
| 1215 | { | 1306 | { |
| 1216 | struct audit_aux_data_socketcall *ax; | 1307 | struct audit_aux_data_socketcall *ax; |
| @@ -1232,6 +1323,13 @@ int audit_socketcall(int nargs, unsigned long *args) | |||
| 1232 | return 0; | 1323 | return 0; |
| 1233 | } | 1324 | } |
| 1234 | 1325 | ||
| 1326 | /** | ||
| 1327 | * audit_sockaddr - record audit data for sys_bind, sys_connect, sys_sendto | ||
| 1328 | * @len: data length in user space | ||
| 1329 | * @a: data address in kernel space | ||
| 1330 | * | ||
| 1331 | * Returns 0 for success or NULL context or < 0 on error. | ||
| 1332 | */ | ||
| 1235 | int audit_sockaddr(int len, void *a) | 1333 | int audit_sockaddr(int len, void *a) |
| 1236 | { | 1334 | { |
| 1237 | struct audit_aux_data_sockaddr *ax; | 1335 | struct audit_aux_data_sockaddr *ax; |
| @@ -1253,6 +1351,15 @@ int audit_sockaddr(int len, void *a) | |||
| 1253 | return 0; | 1351 | return 0; |
| 1254 | } | 1352 | } |
| 1255 | 1353 | ||
| 1354 | /** | ||
| 1355 | * audit_avc_path - record the granting or denial of permissions | ||
| 1356 | * @dentry: dentry to record | ||
| 1357 | * @mnt: mnt to record | ||
| 1358 | * | ||
| 1359 | * Returns 0 for success or NULL context or < 0 on error. | ||
| 1360 | * | ||
| 1361 | * Called from security/selinux/avc.c::avc_audit() | ||
| 1362 | */ | ||
| 1256 | int audit_avc_path(struct dentry *dentry, struct vfsmount *mnt) | 1363 | int audit_avc_path(struct dentry *dentry, struct vfsmount *mnt) |
| 1257 | { | 1364 | { |
| 1258 | struct audit_aux_data_path *ax; | 1365 | struct audit_aux_data_path *ax; |
| @@ -1274,6 +1381,14 @@ int audit_avc_path(struct dentry *dentry, struct vfsmount *mnt) | |||
| 1274 | return 0; | 1381 | return 0; |
| 1275 | } | 1382 | } |
| 1276 | 1383 | ||
| 1384 | /** | ||
| 1385 | * audit_signal_info - record signal info for shutting down audit subsystem | ||
| 1386 | * @sig: signal value | ||
| 1387 | * @t: task being signaled | ||
| 1388 | * | ||
| 1389 | * If the audit subsystem is being terminated, record the task (pid) | ||
| 1390 | * and uid that is doing that. | ||
| 1391 | */ | ||
| 1277 | void audit_signal_info(int sig, struct task_struct *t) | 1392 | void audit_signal_info(int sig, struct task_struct *t) |
| 1278 | { | 1393 | { |
| 1279 | extern pid_t audit_sig_pid; | 1394 | extern pid_t audit_sig_pid; |
| @@ -1290,4 +1405,3 @@ void audit_signal_info(int sig, struct task_struct *t) | |||
| 1290 | } | 1405 | } |
| 1291 | } | 1406 | } |
| 1292 | } | 1407 | } |
| 1293 | |||
