diff options
Diffstat (limited to 'kernel/audit.c')
-rw-r--r-- | kernel/audit.c | 121 |
1 files changed, 48 insertions, 73 deletions
diff --git a/kernel/audit.c b/kernel/audit.c index ea3b7b6191c7..511488a7bc71 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
@@ -61,6 +61,7 @@ | |||
61 | #include <linux/netlink.h> | 61 | #include <linux/netlink.h> |
62 | #include <linux/freezer.h> | 62 | #include <linux/freezer.h> |
63 | #include <linux/tty.h> | 63 | #include <linux/tty.h> |
64 | #include <linux/pid_namespace.h> | ||
64 | 65 | ||
65 | #include "audit.h" | 66 | #include "audit.h" |
66 | 67 | ||
@@ -104,7 +105,7 @@ static int audit_backlog_wait_time = 60 * HZ; | |||
104 | static int audit_backlog_wait_overflow = 0; | 105 | static int audit_backlog_wait_overflow = 0; |
105 | 106 | ||
106 | /* The identity of the user shutting down the audit system. */ | 107 | /* The identity of the user shutting down the audit system. */ |
107 | uid_t audit_sig_uid = -1; | 108 | kuid_t audit_sig_uid = INVALID_UID; |
108 | pid_t audit_sig_pid = -1; | 109 | pid_t audit_sig_pid = -1; |
109 | u32 audit_sig_sid = 0; | 110 | u32 audit_sig_sid = 0; |
110 | 111 | ||
@@ -264,7 +265,7 @@ void audit_log_lost(const char *message) | |||
264 | } | 265 | } |
265 | 266 | ||
266 | static int audit_log_config_change(char *function_name, int new, int old, | 267 | static int audit_log_config_change(char *function_name, int new, int old, |
267 | uid_t loginuid, u32 sessionid, u32 sid, | 268 | kuid_t loginuid, u32 sessionid, u32 sid, |
268 | int allow_changes) | 269 | int allow_changes) |
269 | { | 270 | { |
270 | struct audit_buffer *ab; | 271 | struct audit_buffer *ab; |
@@ -272,7 +273,7 @@ static int audit_log_config_change(char *function_name, int new, int old, | |||
272 | 273 | ||
273 | ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); | 274 | ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); |
274 | audit_log_format(ab, "%s=%d old=%d auid=%u ses=%u", function_name, new, | 275 | audit_log_format(ab, "%s=%d old=%d auid=%u ses=%u", function_name, new, |
275 | old, loginuid, sessionid); | 276 | old, from_kuid(&init_user_ns, loginuid), sessionid); |
276 | if (sid) { | 277 | if (sid) { |
277 | char *ctx = NULL; | 278 | char *ctx = NULL; |
278 | u32 len; | 279 | u32 len; |
@@ -292,7 +293,7 @@ static int audit_log_config_change(char *function_name, int new, int old, | |||
292 | } | 293 | } |
293 | 294 | ||
294 | static int audit_do_config_change(char *function_name, int *to_change, | 295 | static int audit_do_config_change(char *function_name, int *to_change, |
295 | int new, uid_t loginuid, u32 sessionid, | 296 | int new, kuid_t loginuid, u32 sessionid, |
296 | u32 sid) | 297 | u32 sid) |
297 | { | 298 | { |
298 | int allow_changes, rc = 0, old = *to_change; | 299 | int allow_changes, rc = 0, old = *to_change; |
@@ -319,21 +320,21 @@ static int audit_do_config_change(char *function_name, int *to_change, | |||
319 | return rc; | 320 | return rc; |
320 | } | 321 | } |
321 | 322 | ||
322 | static int audit_set_rate_limit(int limit, uid_t loginuid, u32 sessionid, | 323 | static int audit_set_rate_limit(int limit, kuid_t loginuid, u32 sessionid, |
323 | u32 sid) | 324 | u32 sid) |
324 | { | 325 | { |
325 | return audit_do_config_change("audit_rate_limit", &audit_rate_limit, | 326 | return audit_do_config_change("audit_rate_limit", &audit_rate_limit, |
326 | limit, loginuid, sessionid, sid); | 327 | limit, loginuid, sessionid, sid); |
327 | } | 328 | } |
328 | 329 | ||
329 | static int audit_set_backlog_limit(int limit, uid_t loginuid, u32 sessionid, | 330 | static int audit_set_backlog_limit(int limit, kuid_t loginuid, u32 sessionid, |
330 | u32 sid) | 331 | u32 sid) |
331 | { | 332 | { |
332 | return audit_do_config_change("audit_backlog_limit", &audit_backlog_limit, | 333 | return audit_do_config_change("audit_backlog_limit", &audit_backlog_limit, |
333 | limit, loginuid, sessionid, sid); | 334 | limit, loginuid, sessionid, sid); |
334 | } | 335 | } |
335 | 336 | ||
336 | static int audit_set_enabled(int state, uid_t loginuid, u32 sessionid, u32 sid) | 337 | static int audit_set_enabled(int state, kuid_t loginuid, u32 sessionid, u32 sid) |
337 | { | 338 | { |
338 | int rc; | 339 | int rc; |
339 | if (state < AUDIT_OFF || state > AUDIT_LOCKED) | 340 | if (state < AUDIT_OFF || state > AUDIT_LOCKED) |
@@ -348,7 +349,7 @@ static int audit_set_enabled(int state, uid_t loginuid, u32 sessionid, u32 sid) | |||
348 | return rc; | 349 | return rc; |
349 | } | 350 | } |
350 | 351 | ||
351 | static int audit_set_failure(int state, uid_t loginuid, u32 sessionid, u32 sid) | 352 | static int audit_set_failure(int state, kuid_t loginuid, u32 sessionid, u32 sid) |
352 | { | 353 | { |
353 | if (state != AUDIT_FAIL_SILENT | 354 | if (state != AUDIT_FAIL_SILENT |
354 | && state != AUDIT_FAIL_PRINTK | 355 | && state != AUDIT_FAIL_PRINTK |
@@ -467,24 +468,6 @@ static int kauditd_thread(void *dummy) | |||
467 | return 0; | 468 | return 0; |
468 | } | 469 | } |
469 | 470 | ||
470 | static int audit_prepare_user_tty(pid_t pid, uid_t loginuid, u32 sessionid) | ||
471 | { | ||
472 | struct task_struct *tsk; | ||
473 | int err; | ||
474 | |||
475 | rcu_read_lock(); | ||
476 | tsk = find_task_by_vpid(pid); | ||
477 | if (!tsk) { | ||
478 | rcu_read_unlock(); | ||
479 | return -ESRCH; | ||
480 | } | ||
481 | get_task_struct(tsk); | ||
482 | rcu_read_unlock(); | ||
483 | err = tty_audit_push_task(tsk, loginuid, sessionid); | ||
484 | put_task_struct(tsk); | ||
485 | return err; | ||
486 | } | ||
487 | |||
488 | int audit_send_list(void *_dest) | 471 | int audit_send_list(void *_dest) |
489 | { | 472 | { |
490 | struct audit_netlink_list *dest = _dest; | 473 | struct audit_netlink_list *dest = _dest; |
@@ -588,6 +571,11 @@ static int audit_netlink_ok(struct sk_buff *skb, u16 msg_type) | |||
588 | { | 571 | { |
589 | int err = 0; | 572 | int err = 0; |
590 | 573 | ||
574 | /* Only support the initial namespaces for now. */ | ||
575 | if ((current_user_ns() != &init_user_ns) || | ||
576 | (task_active_pid_ns(current) != &init_pid_ns)) | ||
577 | return -EPERM; | ||
578 | |||
591 | switch (msg_type) { | 579 | switch (msg_type) { |
592 | case AUDIT_GET: | 580 | case AUDIT_GET: |
593 | case AUDIT_LIST: | 581 | case AUDIT_LIST: |
@@ -619,8 +607,7 @@ static int audit_netlink_ok(struct sk_buff *skb, u16 msg_type) | |||
619 | } | 607 | } |
620 | 608 | ||
621 | static int audit_log_common_recv_msg(struct audit_buffer **ab, u16 msg_type, | 609 | static int audit_log_common_recv_msg(struct audit_buffer **ab, u16 msg_type, |
622 | u32 pid, u32 uid, uid_t auid, u32 ses, | 610 | kuid_t auid, u32 ses, u32 sid) |
623 | u32 sid) | ||
624 | { | 611 | { |
625 | int rc = 0; | 612 | int rc = 0; |
626 | char *ctx = NULL; | 613 | char *ctx = NULL; |
@@ -633,7 +620,9 @@ static int audit_log_common_recv_msg(struct audit_buffer **ab, u16 msg_type, | |||
633 | 620 | ||
634 | *ab = audit_log_start(NULL, GFP_KERNEL, msg_type); | 621 | *ab = audit_log_start(NULL, GFP_KERNEL, msg_type); |
635 | audit_log_format(*ab, "pid=%d uid=%u auid=%u ses=%u", | 622 | audit_log_format(*ab, "pid=%d uid=%u auid=%u ses=%u", |
636 | pid, uid, auid, ses); | 623 | task_tgid_vnr(current), |
624 | from_kuid(&init_user_ns, current_uid()), | ||
625 | from_kuid(&init_user_ns, auid), ses); | ||
637 | if (sid) { | 626 | if (sid) { |
638 | rc = security_secid_to_secctx(sid, &ctx, &len); | 627 | rc = security_secid_to_secctx(sid, &ctx, &len); |
639 | if (rc) | 628 | if (rc) |
@@ -649,13 +638,13 @@ static int audit_log_common_recv_msg(struct audit_buffer **ab, u16 msg_type, | |||
649 | 638 | ||
650 | static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | 639 | static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) |
651 | { | 640 | { |
652 | u32 uid, pid, seq, sid; | 641 | u32 seq, sid; |
653 | void *data; | 642 | void *data; |
654 | struct audit_status *status_get, status_set; | 643 | struct audit_status *status_get, status_set; |
655 | int err; | 644 | int err; |
656 | struct audit_buffer *ab; | 645 | struct audit_buffer *ab; |
657 | u16 msg_type = nlh->nlmsg_type; | 646 | u16 msg_type = nlh->nlmsg_type; |
658 | uid_t loginuid; /* loginuid of sender */ | 647 | kuid_t loginuid; /* loginuid of sender */ |
659 | u32 sessionid; | 648 | u32 sessionid; |
660 | struct audit_sig_info *sig_data; | 649 | struct audit_sig_info *sig_data; |
661 | char *ctx = NULL; | 650 | char *ctx = NULL; |
@@ -675,8 +664,6 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
675 | return err; | 664 | return err; |
676 | } | 665 | } |
677 | 666 | ||
678 | pid = NETLINK_CREDS(skb)->pid; | ||
679 | uid = NETLINK_CREDS(skb)->uid; | ||
680 | loginuid = audit_get_loginuid(current); | 667 | loginuid = audit_get_loginuid(current); |
681 | sessionid = audit_get_sessionid(current); | 668 | sessionid = audit_get_sessionid(current); |
682 | security_task_getsecid(current, &sid); | 669 | security_task_getsecid(current, &sid); |
@@ -738,16 +725,16 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
738 | if (!audit_enabled && msg_type != AUDIT_USER_AVC) | 725 | if (!audit_enabled && msg_type != AUDIT_USER_AVC) |
739 | return 0; | 726 | return 0; |
740 | 727 | ||
741 | err = audit_filter_user(&NETLINK_CB(skb)); | 728 | err = audit_filter_user(); |
742 | if (err == 1) { | 729 | if (err == 1) { |
743 | err = 0; | 730 | err = 0; |
744 | if (msg_type == AUDIT_USER_TTY) { | 731 | if (msg_type == AUDIT_USER_TTY) { |
745 | err = audit_prepare_user_tty(pid, loginuid, | 732 | err = tty_audit_push_task(current, loginuid, |
746 | sessionid); | 733 | sessionid); |
747 | if (err) | 734 | if (err) |
748 | break; | 735 | break; |
749 | } | 736 | } |
750 | audit_log_common_recv_msg(&ab, msg_type, pid, uid, | 737 | audit_log_common_recv_msg(&ab, msg_type, |
751 | loginuid, sessionid, sid); | 738 | loginuid, sessionid, sid); |
752 | 739 | ||
753 | if (msg_type != AUDIT_USER_TTY) | 740 | if (msg_type != AUDIT_USER_TTY) |
@@ -763,7 +750,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
763 | size--; | 750 | size--; |
764 | audit_log_n_untrustedstring(ab, data, size); | 751 | audit_log_n_untrustedstring(ab, data, size); |
765 | } | 752 | } |
766 | audit_set_pid(ab, pid); | 753 | audit_set_pid(ab, NETLINK_CB(skb).pid); |
767 | audit_log_end(ab); | 754 | audit_log_end(ab); |
768 | } | 755 | } |
769 | break; | 756 | break; |
@@ -772,8 +759,8 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
772 | if (nlmsg_len(nlh) < sizeof(struct audit_rule)) | 759 | if (nlmsg_len(nlh) < sizeof(struct audit_rule)) |
773 | return -EINVAL; | 760 | return -EINVAL; |
774 | if (audit_enabled == AUDIT_LOCKED) { | 761 | if (audit_enabled == AUDIT_LOCKED) { |
775 | audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE, pid, | 762 | audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE, |
776 | uid, loginuid, sessionid, sid); | 763 | loginuid, sessionid, sid); |
777 | 764 | ||
778 | audit_log_format(ab, " audit_enabled=%d res=0", | 765 | audit_log_format(ab, " audit_enabled=%d res=0", |
779 | audit_enabled); | 766 | audit_enabled); |
@@ -783,7 +770,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
783 | /* fallthrough */ | 770 | /* fallthrough */ |
784 | case AUDIT_LIST: | 771 | case AUDIT_LIST: |
785 | err = audit_receive_filter(msg_type, NETLINK_CB(skb).pid, | 772 | err = audit_receive_filter(msg_type, NETLINK_CB(skb).pid, |
786 | uid, seq, data, nlmsg_len(nlh), | 773 | seq, data, nlmsg_len(nlh), |
787 | loginuid, sessionid, sid); | 774 | loginuid, sessionid, sid); |
788 | break; | 775 | break; |
789 | case AUDIT_ADD_RULE: | 776 | case AUDIT_ADD_RULE: |
@@ -791,8 +778,8 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
791 | if (nlmsg_len(nlh) < sizeof(struct audit_rule_data)) | 778 | if (nlmsg_len(nlh) < sizeof(struct audit_rule_data)) |
792 | return -EINVAL; | 779 | return -EINVAL; |
793 | if (audit_enabled == AUDIT_LOCKED) { | 780 | if (audit_enabled == AUDIT_LOCKED) { |
794 | audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE, pid, | 781 | audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE, |
795 | uid, loginuid, sessionid, sid); | 782 | loginuid, sessionid, sid); |
796 | 783 | ||
797 | audit_log_format(ab, " audit_enabled=%d res=0", | 784 | audit_log_format(ab, " audit_enabled=%d res=0", |
798 | audit_enabled); | 785 | audit_enabled); |
@@ -802,14 +789,14 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
802 | /* fallthrough */ | 789 | /* fallthrough */ |
803 | case AUDIT_LIST_RULES: | 790 | case AUDIT_LIST_RULES: |
804 | err = audit_receive_filter(msg_type, NETLINK_CB(skb).pid, | 791 | err = audit_receive_filter(msg_type, NETLINK_CB(skb).pid, |
805 | uid, seq, data, nlmsg_len(nlh), | 792 | seq, data, nlmsg_len(nlh), |
806 | loginuid, sessionid, sid); | 793 | loginuid, sessionid, sid); |
807 | break; | 794 | break; |
808 | case AUDIT_TRIM: | 795 | case AUDIT_TRIM: |
809 | audit_trim_trees(); | 796 | audit_trim_trees(); |
810 | 797 | ||
811 | audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE, pid, | 798 | audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE, |
812 | uid, loginuid, sessionid, sid); | 799 | loginuid, sessionid, sid); |
813 | 800 | ||
814 | audit_log_format(ab, " op=trim res=1"); | 801 | audit_log_format(ab, " op=trim res=1"); |
815 | audit_log_end(ab); | 802 | audit_log_end(ab); |
@@ -840,8 +827,8 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
840 | /* OK, here comes... */ | 827 | /* OK, here comes... */ |
841 | err = audit_tag_tree(old, new); | 828 | err = audit_tag_tree(old, new); |
842 | 829 | ||
843 | audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE, pid, | 830 | audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE, |
844 | uid, loginuid, sessionid, sid); | 831 | loginuid, sessionid, sid); |
845 | 832 | ||
846 | audit_log_format(ab, " op=make_equiv old="); | 833 | audit_log_format(ab, " op=make_equiv old="); |
847 | audit_log_untrustedstring(ab, old); | 834 | audit_log_untrustedstring(ab, old); |
@@ -866,7 +853,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
866 | security_release_secctx(ctx, len); | 853 | security_release_secctx(ctx, len); |
867 | return -ENOMEM; | 854 | return -ENOMEM; |
868 | } | 855 | } |
869 | sig_data->uid = audit_sig_uid; | 856 | sig_data->uid = from_kuid(&init_user_ns, audit_sig_uid); |
870 | sig_data->pid = audit_sig_pid; | 857 | sig_data->pid = audit_sig_pid; |
871 | if (audit_sig_sid) { | 858 | if (audit_sig_sid) { |
872 | memcpy(sig_data->ctx, ctx, len); | 859 | memcpy(sig_data->ctx, ctx, len); |
@@ -878,41 +865,29 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
878 | break; | 865 | break; |
879 | case AUDIT_TTY_GET: { | 866 | case AUDIT_TTY_GET: { |
880 | struct audit_tty_status s; | 867 | struct audit_tty_status s; |
881 | struct task_struct *tsk; | 868 | struct task_struct *tsk = current; |
882 | unsigned long flags; | 869 | |
883 | 870 | spin_lock_irq(&tsk->sighand->siglock); | |
884 | rcu_read_lock(); | 871 | s.enabled = tsk->signal->audit_tty != 0; |
885 | tsk = find_task_by_vpid(pid); | 872 | spin_unlock_irq(&tsk->sighand->siglock); |
886 | if (tsk && lock_task_sighand(tsk, &flags)) { | 873 | |
887 | s.enabled = tsk->signal->audit_tty != 0; | 874 | audit_send_reply(NETLINK_CB(skb).pid, seq, |
888 | unlock_task_sighand(tsk, &flags); | 875 | AUDIT_TTY_GET, 0, 0, &s, sizeof(s)); |
889 | } else | ||
890 | err = -ESRCH; | ||
891 | rcu_read_unlock(); | ||
892 | |||
893 | if (!err) | ||
894 | audit_send_reply(NETLINK_CB(skb).pid, seq, | ||
895 | AUDIT_TTY_GET, 0, 0, &s, sizeof(s)); | ||
896 | break; | 876 | break; |
897 | } | 877 | } |
898 | case AUDIT_TTY_SET: { | 878 | case AUDIT_TTY_SET: { |
899 | struct audit_tty_status *s; | 879 | struct audit_tty_status *s; |
900 | struct task_struct *tsk; | 880 | struct task_struct *tsk = current; |
901 | unsigned long flags; | ||
902 | 881 | ||
903 | if (nlh->nlmsg_len < sizeof(struct audit_tty_status)) | 882 | if (nlh->nlmsg_len < sizeof(struct audit_tty_status)) |
904 | return -EINVAL; | 883 | return -EINVAL; |
905 | s = data; | 884 | s = data; |
906 | if (s->enabled != 0 && s->enabled != 1) | 885 | if (s->enabled != 0 && s->enabled != 1) |
907 | return -EINVAL; | 886 | return -EINVAL; |
908 | rcu_read_lock(); | 887 | |
909 | tsk = find_task_by_vpid(pid); | 888 | spin_lock_irq(&tsk->sighand->siglock); |
910 | if (tsk && lock_task_sighand(tsk, &flags)) { | 889 | tsk->signal->audit_tty = s->enabled != 0; |
911 | tsk->signal->audit_tty = s->enabled != 0; | 890 | spin_unlock_irq(&tsk->sighand->siglock); |
912 | unlock_task_sighand(tsk, &flags); | ||
913 | } else | ||
914 | err = -ESRCH; | ||
915 | rcu_read_unlock(); | ||
916 | break; | 891 | break; |
917 | } | 892 | } |
918 | default: | 893 | default: |