diff options
Diffstat (limited to 'kernel/auditsc.c')
-rw-r--r-- | kernel/auditsc.c | 47 |
1 files changed, 31 insertions, 16 deletions
diff --git a/kernel/auditsc.c b/kernel/auditsc.c index 6f1931381bc9..37b3ac94bc47 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* auditsc.c -- System-call auditing support -*- linux-c -*- | 1 | /* auditsc.c -- System-call auditing support |
2 | * Handles all system-call specific auditing features. | 2 | * Handles all system-call specific auditing features. |
3 | * | 3 | * |
4 | * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina. | 4 | * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina. |
@@ -123,7 +123,7 @@ struct audit_context { | |||
123 | int major; /* syscall number */ | 123 | int major; /* syscall number */ |
124 | unsigned long argv[4]; /* syscall arguments */ | 124 | unsigned long argv[4]; /* syscall arguments */ |
125 | int return_valid; /* return code is valid */ | 125 | int return_valid; /* return code is valid */ |
126 | int return_code;/* syscall return code */ | 126 | long return_code;/* syscall return code */ |
127 | int auditable; /* 1 if record should be written */ | 127 | int auditable; /* 1 if record should be written */ |
128 | int name_count; | 128 | int name_count; |
129 | struct audit_names names[AUDIT_NAMES]; | 129 | struct audit_names names[AUDIT_NAMES]; |
@@ -135,6 +135,7 @@ struct audit_context { | |||
135 | uid_t uid, euid, suid, fsuid; | 135 | uid_t uid, euid, suid, fsuid; |
136 | gid_t gid, egid, sgid, fsgid; | 136 | gid_t gid, egid, sgid, fsgid; |
137 | unsigned long personality; | 137 | unsigned long personality; |
138 | int arch; | ||
138 | 139 | ||
139 | #if AUDIT_DEBUG | 140 | #if AUDIT_DEBUG |
140 | int put_count; | 141 | int put_count; |
@@ -250,7 +251,8 @@ static int audit_copy_rule(struct audit_rule *d, struct audit_rule *s) | |||
250 | return 0; | 251 | return 0; |
251 | } | 252 | } |
252 | 253 | ||
253 | int audit_receive_filter(int type, int pid, int uid, int seq, void *data) | 254 | int audit_receive_filter(int type, int pid, int uid, int seq, void *data, |
255 | uid_t loginuid) | ||
254 | { | 256 | { |
255 | u32 flags; | 257 | u32 flags; |
256 | struct audit_entry *entry; | 258 | struct audit_entry *entry; |
@@ -285,6 +287,7 @@ int audit_receive_filter(int type, int pid, int uid, int seq, void *data) | |||
285 | err = audit_add_rule(entry, &audit_entlist); | 287 | err = audit_add_rule(entry, &audit_entlist); |
286 | if (!err && (flags & AUDIT_AT_EXIT)) | 288 | if (!err && (flags & AUDIT_AT_EXIT)) |
287 | err = audit_add_rule(entry, &audit_extlist); | 289 | err = audit_add_rule(entry, &audit_extlist); |
290 | audit_log(NULL, "auid %u added an audit rule\n", loginuid); | ||
288 | break; | 291 | break; |
289 | case AUDIT_DEL: | 292 | case AUDIT_DEL: |
290 | flags =((struct audit_rule *)data)->flags; | 293 | flags =((struct audit_rule *)data)->flags; |
@@ -294,6 +297,7 @@ int audit_receive_filter(int type, int pid, int uid, int seq, void *data) | |||
294 | err = audit_del_rule(data, &audit_entlist); | 297 | err = audit_del_rule(data, &audit_entlist); |
295 | if (!err && (flags & AUDIT_AT_EXIT)) | 298 | if (!err && (flags & AUDIT_AT_EXIT)) |
296 | err = audit_del_rule(data, &audit_extlist); | 299 | err = audit_del_rule(data, &audit_extlist); |
300 | audit_log(NULL, "auid %u removed an audit rule\n", loginuid); | ||
297 | break; | 301 | break; |
298 | default: | 302 | default: |
299 | return -EINVAL; | 303 | return -EINVAL; |
@@ -348,6 +352,10 @@ static int audit_filter_rules(struct task_struct *tsk, | |||
348 | case AUDIT_PERS: | 352 | case AUDIT_PERS: |
349 | result = (tsk->personality == value); | 353 | result = (tsk->personality == value); |
350 | break; | 354 | break; |
355 | case AUDIT_ARCH: | ||
356 | if (ctx) | ||
357 | result = (ctx->arch == value); | ||
358 | break; | ||
351 | 359 | ||
352 | case AUDIT_EXIT: | 360 | case AUDIT_EXIT: |
353 | if (ctx && ctx->return_valid) | 361 | if (ctx && ctx->return_valid) |
@@ -355,7 +363,7 @@ static int audit_filter_rules(struct task_struct *tsk, | |||
355 | break; | 363 | break; |
356 | case AUDIT_SUCCESS: | 364 | case AUDIT_SUCCESS: |
357 | if (ctx && ctx->return_valid) | 365 | if (ctx && ctx->return_valid) |
358 | result = (ctx->return_code >= 0); | 366 | result = (ctx->return_valid == AUDITSC_SUCCESS); |
359 | break; | 367 | break; |
360 | case AUDIT_DEVMAJOR: | 368 | case AUDIT_DEVMAJOR: |
361 | if (ctx) { | 369 | if (ctx) { |
@@ -648,8 +656,11 @@ static void audit_log_exit(struct audit_context *context) | |||
648 | audit_log_format(ab, "syscall=%d", context->major); | 656 | audit_log_format(ab, "syscall=%d", context->major); |
649 | if (context->personality != PER_LINUX) | 657 | if (context->personality != PER_LINUX) |
650 | audit_log_format(ab, " per=%lx", context->personality); | 658 | audit_log_format(ab, " per=%lx", context->personality); |
659 | audit_log_format(ab, " arch=%x", context->arch); | ||
651 | if (context->return_valid) | 660 | if (context->return_valid) |
652 | audit_log_format(ab, " exit=%d", context->return_code); | 661 | audit_log_format(ab, " success=%s exit=%ld", |
662 | (context->return_valid==AUDITSC_SUCCESS)?"yes":"no", | ||
663 | context->return_code); | ||
653 | audit_log_format(ab, | 664 | audit_log_format(ab, |
654 | " a0=%lx a1=%lx a2=%lx a3=%lx items=%d" | 665 | " a0=%lx a1=%lx a2=%lx a3=%lx items=%d" |
655 | " pid=%d loginuid=%d uid=%d gid=%d" | 666 | " pid=%d loginuid=%d uid=%d gid=%d" |
@@ -696,9 +707,10 @@ static void audit_log_exit(struct audit_context *context) | |||
696 | if (!ab) | 707 | if (!ab) |
697 | continue; /* audit_panic has been called */ | 708 | continue; /* audit_panic has been called */ |
698 | audit_log_format(ab, "item=%d", i); | 709 | audit_log_format(ab, "item=%d", i); |
699 | if (context->names[i].name) | 710 | if (context->names[i].name) { |
700 | audit_log_format(ab, " name=%s", | 711 | audit_log_format(ab, " name="); |
701 | context->names[i].name); | 712 | audit_log_untrustedstring(ab, context->names[i].name); |
713 | } | ||
702 | if (context->names[i].ino != (unsigned long)-1) | 714 | if (context->names[i].ino != (unsigned long)-1) |
703 | audit_log_format(ab, " inode=%lu dev=%02x:%02x mode=%#o" | 715 | audit_log_format(ab, " inode=%lu dev=%02x:%02x mode=%#o" |
704 | " uid=%d gid=%d rdev=%02x:%02x", | 716 | " uid=%d gid=%d rdev=%02x:%02x", |
@@ -772,7 +784,7 @@ static inline unsigned int audit_serial(void) | |||
772 | * then the record will be written at syscall exit time (otherwise, it | 784 | * then the record will be written at syscall exit time (otherwise, it |
773 | * will only be written if another part of the kernel requests that it | 785 | * will only be written if another part of the kernel requests that it |
774 | * be written). */ | 786 | * be written). */ |
775 | void audit_syscall_entry(struct task_struct *tsk, int major, | 787 | void audit_syscall_entry(struct task_struct *tsk, int arch, int major, |
776 | unsigned long a1, unsigned long a2, | 788 | unsigned long a1, unsigned long a2, |
777 | unsigned long a3, unsigned long a4) | 789 | unsigned long a3, unsigned long a4) |
778 | { | 790 | { |
@@ -826,6 +838,7 @@ void audit_syscall_entry(struct task_struct *tsk, int major, | |||
826 | if (!audit_enabled) | 838 | if (!audit_enabled) |
827 | return; | 839 | return; |
828 | 840 | ||
841 | context->arch = arch; | ||
829 | context->major = major; | 842 | context->major = major; |
830 | context->argv[0] = a1; | 843 | context->argv[0] = a1; |
831 | context->argv[1] = a2; | 844 | context->argv[1] = a2; |
@@ -849,13 +862,13 @@ void audit_syscall_entry(struct task_struct *tsk, int major, | |||
849 | * filtering, or because some other part of the kernel write an audit | 862 | * filtering, or because some other part of the kernel write an audit |
850 | * message), then write out the syscall information. In call cases, | 863 | * message), then write out the syscall information. In call cases, |
851 | * free the names stored from getname(). */ | 864 | * free the names stored from getname(). */ |
852 | void audit_syscall_exit(struct task_struct *tsk, int return_code) | 865 | void audit_syscall_exit(struct task_struct *tsk, int valid, long return_code) |
853 | { | 866 | { |
854 | struct audit_context *context; | 867 | struct audit_context *context; |
855 | 868 | ||
856 | get_task_struct(tsk); | 869 | get_task_struct(tsk); |
857 | task_lock(tsk); | 870 | task_lock(tsk); |
858 | context = audit_get_context(tsk, 1, return_code); | 871 | context = audit_get_context(tsk, valid, return_code); |
859 | task_unlock(tsk); | 872 | task_unlock(tsk); |
860 | 873 | ||
861 | /* Not having a context here is ok, since the parent may have | 874 | /* Not having a context here is ok, since the parent may have |
@@ -868,6 +881,7 @@ void audit_syscall_exit(struct task_struct *tsk, int return_code) | |||
868 | 881 | ||
869 | context->in_syscall = 0; | 882 | context->in_syscall = 0; |
870 | context->auditable = 0; | 883 | context->auditable = 0; |
884 | |||
871 | if (context->previous) { | 885 | if (context->previous) { |
872 | struct audit_context *new_context = context->previous; | 886 | struct audit_context *new_context = context->previous; |
873 | context->previous = NULL; | 887 | context->previous = NULL; |
@@ -981,7 +995,7 @@ void audit_inode(const char *name, const struct inode *inode) | |||
981 | } | 995 | } |
982 | 996 | ||
983 | void audit_get_stamp(struct audit_context *ctx, | 997 | void audit_get_stamp(struct audit_context *ctx, |
984 | struct timespec *t, int *serial) | 998 | struct timespec *t, unsigned int *serial) |
985 | { | 999 | { |
986 | if (ctx) { | 1000 | if (ctx) { |
987 | t->tv_sec = ctx->ctime.tv_sec; | 1001 | t->tv_sec = ctx->ctime.tv_sec; |
@@ -996,20 +1010,21 @@ void audit_get_stamp(struct audit_context *ctx, | |||
996 | 1010 | ||
997 | extern int audit_set_type(struct audit_buffer *ab, int type); | 1011 | extern int audit_set_type(struct audit_buffer *ab, int type); |
998 | 1012 | ||
999 | int audit_set_loginuid(struct audit_context *ctx, uid_t loginuid) | 1013 | int audit_set_loginuid(struct task_struct *task, uid_t loginuid) |
1000 | { | 1014 | { |
1001 | if (ctx) { | 1015 | if (task->audit_context) { |
1002 | struct audit_buffer *ab; | 1016 | struct audit_buffer *ab; |
1003 | 1017 | ||
1004 | ab = audit_log_start(NULL); | 1018 | ab = audit_log_start(NULL); |
1005 | if (ab) { | 1019 | if (ab) { |
1006 | audit_log_format(ab, "login pid=%d uid=%u " | 1020 | audit_log_format(ab, "login pid=%d uid=%u " |
1007 | "old loginuid=%u new loginuid=%u", | 1021 | "old loginuid=%u new loginuid=%u", |
1008 | ctx->pid, ctx->uid, ctx->loginuid, loginuid); | 1022 | task->pid, task->uid, |
1023 | task->audit_context->loginuid, loginuid); | ||
1009 | audit_set_type(ab, AUDIT_LOGIN); | 1024 | audit_set_type(ab, AUDIT_LOGIN); |
1010 | audit_log_end(ab); | 1025 | audit_log_end(ab); |
1011 | } | 1026 | } |
1012 | ctx->loginuid = loginuid; | 1027 | task->audit_context->loginuid = loginuid; |
1013 | } | 1028 | } |
1014 | return 0; | 1029 | return 0; |
1015 | } | 1030 | } |