diff options
Diffstat (limited to 'kernel/audit.c')
-rw-r--r-- | kernel/audit.c | 191 |
1 files changed, 60 insertions, 131 deletions
diff --git a/kernel/audit.c b/kernel/audit.c index 26ff925e13f2..7e29372da284 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
@@ -66,9 +66,9 @@ | |||
66 | * (Initialization happens after skb_init is called.) */ | 66 | * (Initialization happens after skb_init is called.) */ |
67 | static int audit_initialized; | 67 | static int audit_initialized; |
68 | 68 | ||
69 | /* 0 - no auditing | 69 | #define AUDIT_OFF 0 |
70 | * 1 - auditing enabled | 70 | #define AUDIT_ON 1 |
71 | * 2 - auditing enabled and configuration is locked/unchangeable. */ | 71 | #define AUDIT_LOCKED 2 |
72 | int audit_enabled; | 72 | int audit_enabled; |
73 | 73 | ||
74 | /* Default state when kernel boots without any parameters. */ | 74 | /* Default state when kernel boots without any parameters. */ |
@@ -240,152 +240,90 @@ void audit_log_lost(const char *message) | |||
240 | } | 240 | } |
241 | } | 241 | } |
242 | 242 | ||
243 | static int audit_set_rate_limit(int limit, uid_t loginuid, u32 sid) | 243 | static int audit_log_config_change(char *function_name, int new, int old, |
244 | uid_t loginuid, u32 sid, int allow_changes) | ||
244 | { | 245 | { |
245 | int res, rc = 0, old = audit_rate_limit; | 246 | struct audit_buffer *ab; |
246 | 247 | int rc = 0; | |
247 | /* check if we are locked */ | ||
248 | if (audit_enabled == 2) | ||
249 | res = 0; | ||
250 | else | ||
251 | res = 1; | ||
252 | 248 | ||
249 | ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); | ||
250 | audit_log_format(ab, "%s=%d old=%d by auid=%u", function_name, new, | ||
251 | old, loginuid); | ||
253 | if (sid) { | 252 | if (sid) { |
254 | char *ctx = NULL; | 253 | char *ctx = NULL; |
255 | u32 len; | 254 | u32 len; |
256 | if ((rc = selinux_sid_to_string(sid, &ctx, &len)) == 0) { | 255 | |
257 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | 256 | rc = selinux_sid_to_string(sid, &ctx, &len); |
258 | "audit_rate_limit=%d old=%d by auid=%u" | 257 | if (rc) { |
259 | " subj=%s res=%d", | 258 | audit_log_format(ab, " sid=%u", sid); |
260 | limit, old, loginuid, ctx, res); | 259 | allow_changes = 0; /* Something weird, deny request */ |
260 | } else { | ||
261 | audit_log_format(ab, " subj=%s", ctx); | ||
261 | kfree(ctx); | 262 | kfree(ctx); |
262 | } else | 263 | } |
263 | res = 0; /* Something weird, deny request */ | ||
264 | } | 264 | } |
265 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | 265 | audit_log_format(ab, " res=%d", allow_changes); |
266 | "audit_rate_limit=%d old=%d by auid=%u res=%d", | 266 | audit_log_end(ab); |
267 | limit, old, loginuid, res); | ||
268 | |||
269 | /* If we are allowed, make the change */ | ||
270 | if (res == 1) | ||
271 | audit_rate_limit = limit; | ||
272 | /* Not allowed, update reason */ | ||
273 | else if (rc == 0) | ||
274 | rc = -EPERM; | ||
275 | return rc; | 267 | return rc; |
276 | } | 268 | } |
277 | 269 | ||
278 | static int audit_set_backlog_limit(int limit, uid_t loginuid, u32 sid) | 270 | static int audit_do_config_change(char *function_name, int *to_change, |
271 | int new, uid_t loginuid, u32 sid) | ||
279 | { | 272 | { |
280 | int res, rc = 0, old = audit_backlog_limit; | 273 | int allow_changes, rc = 0, old = *to_change; |
281 | 274 | ||
282 | /* check if we are locked */ | 275 | /* check if we are locked */ |
283 | if (audit_enabled == 2) | 276 | if (audit_enabled == AUDIT_LOCKED) |
284 | res = 0; | 277 | allow_changes = 0; |
285 | else | 278 | else |
286 | res = 1; | 279 | allow_changes = 1; |
287 | 280 | ||
288 | if (sid) { | 281 | if (audit_enabled != AUDIT_OFF) { |
289 | char *ctx = NULL; | 282 | rc = audit_log_config_change(function_name, new, old, |
290 | u32 len; | 283 | loginuid, sid, allow_changes); |
291 | if ((rc = selinux_sid_to_string(sid, &ctx, &len)) == 0) { | 284 | if (rc) |
292 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | 285 | allow_changes = 0; |
293 | "audit_backlog_limit=%d old=%d by auid=%u" | ||
294 | " subj=%s res=%d", | ||
295 | limit, old, loginuid, ctx, res); | ||
296 | kfree(ctx); | ||
297 | } else | ||
298 | res = 0; /* Something weird, deny request */ | ||
299 | } | 286 | } |
300 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | ||
301 | "audit_backlog_limit=%d old=%d by auid=%u res=%d", | ||
302 | limit, old, loginuid, res); | ||
303 | 287 | ||
304 | /* If we are allowed, make the change */ | 288 | /* If we are allowed, make the change */ |
305 | if (res == 1) | 289 | if (allow_changes == 1) |
306 | audit_backlog_limit = limit; | 290 | *to_change = new; |
307 | /* Not allowed, update reason */ | 291 | /* Not allowed, update reason */ |
308 | else if (rc == 0) | 292 | else if (rc == 0) |
309 | rc = -EPERM; | 293 | rc = -EPERM; |
310 | return rc; | 294 | return rc; |
311 | } | 295 | } |
312 | 296 | ||
313 | static int audit_set_enabled(int state, uid_t loginuid, u32 sid) | 297 | static int audit_set_rate_limit(int limit, uid_t loginuid, u32 sid) |
314 | { | 298 | { |
315 | int res, rc = 0, old = audit_enabled; | 299 | return audit_do_config_change("audit_rate_limit", &audit_rate_limit, |
316 | 300 | limit, loginuid, sid); | |
317 | if (state < 0 || state > 2) | 301 | } |
318 | return -EINVAL; | ||
319 | 302 | ||
320 | /* check if we are locked */ | 303 | static int audit_set_backlog_limit(int limit, uid_t loginuid, u32 sid) |
321 | if (audit_enabled == 2) | 304 | { |
322 | res = 0; | 305 | return audit_do_config_change("audit_backlog_limit", &audit_backlog_limit, |
323 | else | 306 | limit, loginuid, sid); |
324 | res = 1; | 307 | } |
325 | 308 | ||
326 | if (sid) { | 309 | static int audit_set_enabled(int state, uid_t loginuid, u32 sid) |
327 | char *ctx = NULL; | 310 | { |
328 | u32 len; | 311 | if (state < AUDIT_OFF || state > AUDIT_LOCKED) |
329 | if ((rc = selinux_sid_to_string(sid, &ctx, &len)) == 0) { | 312 | return -EINVAL; |
330 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | ||
331 | "audit_enabled=%d old=%d by auid=%u" | ||
332 | " subj=%s res=%d", | ||
333 | state, old, loginuid, ctx, res); | ||
334 | kfree(ctx); | ||
335 | } else | ||
336 | res = 0; /* Something weird, deny request */ | ||
337 | } | ||
338 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | ||
339 | "audit_enabled=%d old=%d by auid=%u res=%d", | ||
340 | state, old, loginuid, res); | ||
341 | 313 | ||
342 | /* If we are allowed, make the change */ | 314 | return audit_do_config_change("audit_enabled", &audit_enabled, state, |
343 | if (res == 1) | 315 | loginuid, sid); |
344 | audit_enabled = state; | ||
345 | /* Not allowed, update reason */ | ||
346 | else if (rc == 0) | ||
347 | rc = -EPERM; | ||
348 | return rc; | ||
349 | } | 316 | } |
350 | 317 | ||
351 | static int audit_set_failure(int state, uid_t loginuid, u32 sid) | 318 | static int audit_set_failure(int state, uid_t loginuid, u32 sid) |
352 | { | 319 | { |
353 | int res, rc = 0, old = audit_failure; | ||
354 | |||
355 | if (state != AUDIT_FAIL_SILENT | 320 | if (state != AUDIT_FAIL_SILENT |
356 | && state != AUDIT_FAIL_PRINTK | 321 | && state != AUDIT_FAIL_PRINTK |
357 | && state != AUDIT_FAIL_PANIC) | 322 | && state != AUDIT_FAIL_PANIC) |
358 | return -EINVAL; | 323 | return -EINVAL; |
359 | 324 | ||
360 | /* check if we are locked */ | 325 | return audit_do_config_change("audit_failure", &audit_failure, state, |
361 | if (audit_enabled == 2) | 326 | loginuid, sid); |
362 | res = 0; | ||
363 | else | ||
364 | res = 1; | ||
365 | |||
366 | if (sid) { | ||
367 | char *ctx = NULL; | ||
368 | u32 len; | ||
369 | if ((rc = selinux_sid_to_string(sid, &ctx, &len)) == 0) { | ||
370 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | ||
371 | "audit_failure=%d old=%d by auid=%u" | ||
372 | " subj=%s res=%d", | ||
373 | state, old, loginuid, ctx, res); | ||
374 | kfree(ctx); | ||
375 | } else | ||
376 | res = 0; /* Something weird, deny request */ | ||
377 | } | ||
378 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | ||
379 | "audit_failure=%d old=%d by auid=%u res=%d", | ||
380 | state, old, loginuid, res); | ||
381 | |||
382 | /* If we are allowed, make the change */ | ||
383 | if (res == 1) | ||
384 | audit_failure = state; | ||
385 | /* Not allowed, update reason */ | ||
386 | else if (rc == 0) | ||
387 | rc = -EPERM; | ||
388 | return rc; | ||
389 | } | 327 | } |
390 | 328 | ||
391 | static int kauditd_thread(void *dummy) | 329 | static int kauditd_thread(void *dummy) |
@@ -634,23 +572,14 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
634 | if (err < 0) return err; | 572 | if (err < 0) return err; |
635 | } | 573 | } |
636 | if (status_get->mask & AUDIT_STATUS_PID) { | 574 | if (status_get->mask & AUDIT_STATUS_PID) { |
637 | int old = audit_pid; | 575 | int new_pid = status_get->pid; |
638 | if (sid) { | 576 | |
639 | if ((err = selinux_sid_to_string( | 577 | if (audit_enabled != AUDIT_OFF) |
640 | sid, &ctx, &len))) | 578 | audit_log_config_change("audit_pid", new_pid, |
641 | return err; | 579 | audit_pid, loginuid, |
642 | else | 580 | sid, 1); |
643 | audit_log(NULL, GFP_KERNEL, | 581 | |
644 | AUDIT_CONFIG_CHANGE, | 582 | audit_pid = new_pid; |
645 | "audit_pid=%d old=%d by auid=%u subj=%s", | ||
646 | status_get->pid, old, | ||
647 | loginuid, ctx); | ||
648 | kfree(ctx); | ||
649 | } else | ||
650 | audit_log(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE, | ||
651 | "audit_pid=%d old=%d by auid=%u", | ||
652 | status_get->pid, old, loginuid); | ||
653 | audit_pid = status_get->pid; | ||
654 | } | 583 | } |
655 | if (status_get->mask & AUDIT_STATUS_RATE_LIMIT) | 584 | if (status_get->mask & AUDIT_STATUS_RATE_LIMIT) |
656 | err = audit_set_rate_limit(status_get->rate_limit, | 585 | err = audit_set_rate_limit(status_get->rate_limit, |
@@ -709,7 +638,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
709 | case AUDIT_DEL: | 638 | case AUDIT_DEL: |
710 | if (nlmsg_len(nlh) < sizeof(struct audit_rule)) | 639 | if (nlmsg_len(nlh) < sizeof(struct audit_rule)) |
711 | return -EINVAL; | 640 | return -EINVAL; |
712 | if (audit_enabled == 2) { | 641 | if (audit_enabled == AUDIT_LOCKED) { |
713 | ab = audit_log_start(NULL, GFP_KERNEL, | 642 | ab = audit_log_start(NULL, GFP_KERNEL, |
714 | AUDIT_CONFIG_CHANGE); | 643 | AUDIT_CONFIG_CHANGE); |
715 | if (ab) { | 644 | if (ab) { |
@@ -743,7 +672,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
743 | case AUDIT_DEL_RULE: | 672 | case AUDIT_DEL_RULE: |
744 | if (nlmsg_len(nlh) < sizeof(struct audit_rule_data)) | 673 | if (nlmsg_len(nlh) < sizeof(struct audit_rule_data)) |
745 | return -EINVAL; | 674 | return -EINVAL; |
746 | if (audit_enabled == 2) { | 675 | if (audit_enabled == AUDIT_LOCKED) { |
747 | ab = audit_log_start(NULL, GFP_KERNEL, | 676 | ab = audit_log_start(NULL, GFP_KERNEL, |
748 | AUDIT_CONFIG_CHANGE); | 677 | AUDIT_CONFIG_CHANGE); |
749 | if (ab) { | 678 | if (ab) { |