Commit 8b5c6a3a authored by Linus Torvalds's avatar Linus Torvalds

Merge tag 'audit-pr-20180605' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit

Pull audit updates from Paul Moore:
 "Another reasonable chunk of audit changes for v4.18, thirteen patches
  in total.

  The thirteen patches can mostly be broken down into one of four
  categories: general bug fixes, accessor functions for audit state
  stored in the task_struct, negative filter matches on executable
  names, and extending the (relatively) new seccomp logging knobs to the
  audit subsystem.

  The main driver for the accessor functions from Richard are the
  changes we're working on to associate audit events with containers,
  but I think they have some standalone value too so I figured it would
  be good to get them in now.

  The seccomp/audit patches from Tyler apply the seccomp logging
  improvements from a few releases ago to audit's seccomp logging;
  starting with this patchset the changes in
  /proc/sys/kernel/seccomp/actions_logged should apply to both the
  standard kernel logging and audit.

  As usual, everything passes the audit-testsuite and it happens to
  merge cleanly with your tree"

[ Heh, except it had trivial merge conflicts with the SELinux tree that
  also came in from Paul   - Linus ]

* tag 'audit-pr-20180605' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit:
  audit: Fix wrong task in comparison of session ID
  audit: use existing session info function
  audit: normalize loginuid read access
  audit: use new audit_context access funciton for seccomp_actions_logged
  audit: use inline function to set audit context
  audit: use inline function to get audit context
  audit: convert sessionid unset to a macro
  seccomp: Don't special case audited processes when logging
  seccomp: Audit attempts to modify the actions_logged sysctl
  seccomp: Configurable separator for the actions_logged string
  seccomp: Separate read and write code for actions_logged sysctl
  audit: allow not equal op for audit by executable
  audit: add syscall information to FEATURE_CHANGE records
parents 8b70543e 5b713886
...@@ -207,13 +207,6 @@ directory. Here's a description of each file in that directory: ...@@ -207,13 +207,6 @@ directory. Here's a description of each file in that directory:
to the file do not need to be in ordered form but reads from the file to the file do not need to be in ordered form but reads from the file
will be ordered in the same way as the actions_avail sysctl. will be ordered in the same way as the actions_avail sysctl.
It is important to note that the value of ``actions_logged`` does not
prevent certain actions from being logged when the audit subsystem is
configured to audit a task. If the action is not found in
``actions_logged`` list, the final decision on whether to audit the
action for that task is ultimately left up to the audit subsystem to
decide for all seccomp return values other than ``SECCOMP_RET_ALLOW``.
The ``allow`` string is not accepted in the ``actions_logged`` sysctl The ``allow`` string is not accepted in the ``actions_logged`` sysctl
as it is not possible to log ``SECCOMP_RET_ALLOW`` actions. Attempting as it is not possible to log ``SECCOMP_RET_ALLOW`` actions. Attempting
to write ``allow`` to the sysctl will result in an EINVAL being to write ``allow`` to the sysctl will result in an EINVAL being
......
...@@ -232,12 +232,24 @@ extern void __audit_file(const struct file *); ...@@ -232,12 +232,24 @@ extern void __audit_file(const struct file *);
extern void __audit_inode_child(struct inode *parent, extern void __audit_inode_child(struct inode *parent,
const struct dentry *dentry, const struct dentry *dentry,
const unsigned char type); const unsigned char type);
extern void __audit_seccomp(unsigned long syscall, long signr, int code); extern void audit_seccomp(unsigned long syscall, long signr, int code);
extern void audit_seccomp_actions_logged(const char *names,
const char *old_names, int res);
extern void __audit_ptrace(struct task_struct *t); extern void __audit_ptrace(struct task_struct *t);
static inline void audit_set_context(struct task_struct *task, struct audit_context *ctx)
{
task->audit_context = ctx;
}
static inline struct audit_context *audit_context(void)
{
return current->audit_context;
}
static inline bool audit_dummy_context(void) static inline bool audit_dummy_context(void)
{ {
void *p = current->audit_context; void *p = audit_context();
return !p || *(int *)p; return !p || *(int *)p;
} }
static inline void audit_free(struct task_struct *task) static inline void audit_free(struct task_struct *task)
...@@ -249,12 +261,12 @@ static inline void audit_syscall_entry(int major, unsigned long a0, ...@@ -249,12 +261,12 @@ static inline void audit_syscall_entry(int major, unsigned long a0,
unsigned long a1, unsigned long a2, unsigned long a1, unsigned long a2,
unsigned long a3) unsigned long a3)
{ {
if (unlikely(current->audit_context)) if (unlikely(audit_context()))
__audit_syscall_entry(major, a0, a1, a2, a3); __audit_syscall_entry(major, a0, a1, a2, a3);
} }
static inline void audit_syscall_exit(void *pt_regs) static inline void audit_syscall_exit(void *pt_regs)
{ {
if (unlikely(current->audit_context)) { if (unlikely(audit_context())) {
int success = is_syscall_success(pt_regs); int success = is_syscall_success(pt_regs);
long return_code = regs_return_value(pt_regs); long return_code = regs_return_value(pt_regs);
...@@ -302,12 +314,6 @@ static inline void audit_inode_child(struct inode *parent, ...@@ -302,12 +314,6 @@ static inline void audit_inode_child(struct inode *parent,
} }
void audit_core_dumps(long signr); void audit_core_dumps(long signr);
static inline void audit_seccomp(unsigned long syscall, long signr, int code)
{
if (audit_enabled && unlikely(!audit_dummy_context()))
__audit_seccomp(syscall, signr, code);
}
static inline void audit_ptrace(struct task_struct *t) static inline void audit_ptrace(struct task_struct *t)
{ {
if (unlikely(!audit_dummy_context())) if (unlikely(!audit_dummy_context()))
...@@ -468,6 +474,12 @@ static inline bool audit_dummy_context(void) ...@@ -468,6 +474,12 @@ static inline bool audit_dummy_context(void)
{ {
return true; return true;
} }
static inline void audit_set_context(struct task_struct *task, struct audit_context *ctx)
{ }
static inline struct audit_context *audit_context(void)
{
return NULL;
}
static inline struct filename *audit_reusename(const __user char *name) static inline struct filename *audit_reusename(const __user char *name)
{ {
return NULL; return NULL;
...@@ -498,10 +510,11 @@ static inline void audit_inode_child(struct inode *parent, ...@@ -498,10 +510,11 @@ static inline void audit_inode_child(struct inode *parent,
{ } { }
static inline void audit_core_dumps(long signr) static inline void audit_core_dumps(long signr)
{ } { }
static inline void __audit_seccomp(unsigned long syscall, long signr, int code)
{ }
static inline void audit_seccomp(unsigned long syscall, long signr, int code) static inline void audit_seccomp(unsigned long syscall, long signr, int code)
{ } { }
static inline void audit_seccomp_actions_logged(const char *names,
const char *old_names, int res)
{ }
static inline int auditsc_get_stamp(struct audit_context *ctx, static inline int auditsc_get_stamp(struct audit_context *ctx,
struct timespec64 *t, unsigned int *serial) struct timespec64 *t, unsigned int *serial)
{ {
...@@ -513,7 +526,7 @@ static inline kuid_t audit_get_loginuid(struct task_struct *tsk) ...@@ -513,7 +526,7 @@ static inline kuid_t audit_get_loginuid(struct task_struct *tsk)
} }
static inline unsigned int audit_get_sessionid(struct task_struct *tsk) static inline unsigned int audit_get_sessionid(struct task_struct *tsk)
{ {
return -1; return AUDIT_SID_UNSET;
} }
static inline void audit_ipc_obj(struct kern_ipc_perm *ipcp) static inline void audit_ipc_obj(struct kern_ipc_perm *ipcp)
{ } { }
......
...@@ -737,7 +737,7 @@ static inline struct audit_buffer *xfrm_audit_start(const char *op) ...@@ -737,7 +737,7 @@ static inline struct audit_buffer *xfrm_audit_start(const char *op)
if (audit_enabled == 0) if (audit_enabled == 0)
return NULL; return NULL;
audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, audit_buf = audit_log_start(audit_context(), GFP_ATOMIC,
AUDIT_MAC_IPSEC_EVENT); AUDIT_MAC_IPSEC_EVENT);
if (audit_buf == NULL) if (audit_buf == NULL)
return NULL; return NULL;
...@@ -752,7 +752,7 @@ static inline void xfrm_audit_helper_usrinfo(bool task_valid, ...@@ -752,7 +752,7 @@ static inline void xfrm_audit_helper_usrinfo(bool task_valid,
audit_get_loginuid(current) : audit_get_loginuid(current) :
INVALID_UID); INVALID_UID);
const unsigned int ses = task_valid ? audit_get_sessionid(current) : const unsigned int ses = task_valid ? audit_get_sessionid(current) :
(unsigned int) -1; AUDIT_SID_UNSET;
audit_log_format(audit_buf, " auid=%u ses=%u", auid, ses); audit_log_format(audit_buf, " auid=%u ses=%u", auid, ses);
audit_log_task_context(audit_buf); audit_log_task_context(audit_buf);
......
...@@ -465,6 +465,7 @@ struct audit_tty_status { ...@@ -465,6 +465,7 @@ struct audit_tty_status {
}; };
#define AUDIT_UID_UNSET (unsigned int)-1 #define AUDIT_UID_UNSET (unsigned int)-1
#define AUDIT_SID_UNSET ((unsigned int)-1)
/* audit_rule_data supports filter rules with both integer and string /* audit_rule_data supports filter rules with both integer and string
* fields. It corresponds with AUDIT_ADD_RULE, AUDIT_DEL_RULE and * fields. It corresponds with AUDIT_ADD_RULE, AUDIT_DEL_RULE and
......
...@@ -9,6 +9,7 @@ ...@@ -9,6 +9,7 @@
#include <linux/init.h> #include <linux/init.h>
#include <linux/fs.h> #include <linux/fs.h>
#include <linux/mm.h> #include <linux/mm.h>
#include <linux/audit.h>
#include <asm/pgtable.h> #include <asm/pgtable.h>
#include <linux/uaccess.h> #include <linux/uaccess.h>
...@@ -119,7 +120,7 @@ struct task_struct init_task ...@@ -119,7 +120,7 @@ struct task_struct init_task
.thread_node = LIST_HEAD_INIT(init_signals.thread_head), .thread_node = LIST_HEAD_INIT(init_signals.thread_head),
#ifdef CONFIG_AUDITSYSCALL #ifdef CONFIG_AUDITSYSCALL
.loginuid = INVALID_UID, .loginuid = INVALID_UID,
.sessionid = (unsigned int)-1, .sessionid = AUDIT_SID_UNSET,
#endif #endif
#ifdef CONFIG_PERF_EVENTS #ifdef CONFIG_PERF_EVENTS
.perf_event_mutex = __MUTEX_INITIALIZER(init_task.perf_event_mutex), .perf_event_mutex = __MUTEX_INITIALIZER(init_task.perf_event_mutex),
......
...@@ -1099,8 +1099,7 @@ static void audit_log_feature_change(int which, u32 old_feature, u32 new_feature ...@@ -1099,8 +1099,7 @@ static void audit_log_feature_change(int which, u32 old_feature, u32 new_feature
if (audit_enabled == AUDIT_OFF) if (audit_enabled == AUDIT_OFF)
return; return;
ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_FEATURE_CHANGE);
ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_FEATURE_CHANGE);
if (!ab) if (!ab)
return; return;
audit_log_task_info(ab, current); audit_log_task_info(ab, current);
...@@ -2317,8 +2316,7 @@ void audit_log_link_denied(const char *operation) ...@@ -2317,8 +2316,7 @@ void audit_log_link_denied(const char *operation)
return; return;
/* Generate AUDIT_ANOM_LINK with subject, operation, outcome. */ /* Generate AUDIT_ANOM_LINK with subject, operation, outcome. */
ab = audit_log_start(current->audit_context, GFP_KERNEL, ab = audit_log_start(audit_context(), GFP_KERNEL, AUDIT_ANOM_LINK);
AUDIT_ANOM_LINK);
if (!ab) if (!ab)
return; return;
audit_log_format(ab, "op=%s", operation); audit_log_format(ab, "op=%s", operation);
......
...@@ -274,7 +274,7 @@ static void audit_update_watch(struct audit_parent *parent, ...@@ -274,7 +274,7 @@ static void audit_update_watch(struct audit_parent *parent,
/* If the update involves invalidating rules, do the inode-based /* If the update involves invalidating rules, do the inode-based
* filtering now, so we don't omit records. */ * filtering now, so we don't omit records. */
if (invalidating && !audit_dummy_context()) if (invalidating && !audit_dummy_context())
audit_filter_inodes(current, current->audit_context); audit_filter_inodes(current, audit_context());
/* updating ino will likely change which audit_hash_list we /* updating ino will likely change which audit_hash_list we
* are on so we need a new watch for the new list */ * are on so we need a new watch for the new list */
......
...@@ -426,7 +426,7 @@ static int audit_field_valid(struct audit_entry *entry, struct audit_field *f) ...@@ -426,7 +426,7 @@ static int audit_field_valid(struct audit_entry *entry, struct audit_field *f)
return -EINVAL; return -EINVAL;
break; break;
case AUDIT_EXE: case AUDIT_EXE:
if (f->op != Audit_equal) if (f->op != Audit_not_equal && f->op != Audit_equal)
return -EINVAL; return -EINVAL;
if (entry->rule.listnr != AUDIT_FILTER_EXIT) if (entry->rule.listnr != AUDIT_FILTER_EXIT)
return -EINVAL; return -EINVAL;
...@@ -1089,8 +1089,6 @@ static void audit_list_rules(int seq, struct sk_buff_head *q) ...@@ -1089,8 +1089,6 @@ static void audit_list_rules(int seq, struct sk_buff_head *q)
static void audit_log_rule_change(char *action, struct audit_krule *rule, int res) static void audit_log_rule_change(char *action, struct audit_krule *rule, int res)
{ {
struct audit_buffer *ab; struct audit_buffer *ab;
uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(current));
unsigned int sessionid = audit_get_sessionid(current);
if (!audit_enabled) if (!audit_enabled)
return; return;
...@@ -1098,7 +1096,7 @@ static void audit_log_rule_change(char *action, struct audit_krule *rule, int re ...@@ -1098,7 +1096,7 @@ static void audit_log_rule_change(char *action, struct audit_krule *rule, int re
ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE);
if (!ab) if (!ab)
return; return;
audit_log_format(ab, "auid=%u ses=%u" ,loginuid, sessionid); audit_log_session_info(ab);
audit_log_task_context(ab); audit_log_task_context(ab);
audit_log_format(ab, " op=%s", action); audit_log_format(ab, " op=%s", action);
audit_log_key(ab, rule->filterkey); audit_log_key(ab, rule->filterkey);
......
...@@ -374,7 +374,7 @@ static int audit_field_compare(struct task_struct *tsk, ...@@ -374,7 +374,7 @@ static int audit_field_compare(struct task_struct *tsk,
case AUDIT_COMPARE_EGID_TO_OBJ_GID: case AUDIT_COMPARE_EGID_TO_OBJ_GID:
return audit_compare_gid(cred->egid, name, f, ctx); return audit_compare_gid(cred->egid, name, f, ctx);
case AUDIT_COMPARE_AUID_TO_OBJ_UID: case AUDIT_COMPARE_AUID_TO_OBJ_UID:
return audit_compare_uid(tsk->loginuid, name, f, ctx); return audit_compare_uid(audit_get_loginuid(tsk), name, f, ctx);
case AUDIT_COMPARE_SUID_TO_OBJ_UID: case AUDIT_COMPARE_SUID_TO_OBJ_UID:
return audit_compare_uid(cred->suid, name, f, ctx); return audit_compare_uid(cred->suid, name, f, ctx);
case AUDIT_COMPARE_SGID_TO_OBJ_GID: case AUDIT_COMPARE_SGID_TO_OBJ_GID:
...@@ -385,7 +385,8 @@ static int audit_field_compare(struct task_struct *tsk, ...@@ -385,7 +385,8 @@ static int audit_field_compare(struct task_struct *tsk,
return audit_compare_gid(cred->fsgid, name, f, ctx); return audit_compare_gid(cred->fsgid, name, f, ctx);
/* uid comparisons */ /* uid comparisons */
case AUDIT_COMPARE_UID_TO_AUID: case AUDIT_COMPARE_UID_TO_AUID:
return audit_uid_comparator(cred->uid, f->op, tsk->loginuid); return audit_uid_comparator(cred->uid, f->op,
audit_get_loginuid(tsk));
case AUDIT_COMPARE_UID_TO_EUID: case AUDIT_COMPARE_UID_TO_EUID:
return audit_uid_comparator(cred->uid, f->op, cred->euid); return audit_uid_comparator(cred->uid, f->op, cred->euid);
case AUDIT_COMPARE_UID_TO_SUID: case AUDIT_COMPARE_UID_TO_SUID:
...@@ -394,11 +395,14 @@ static int audit_field_compare(struct task_struct *tsk, ...@@ -394,11 +395,14 @@ static int audit_field_compare(struct task_struct *tsk,
return audit_uid_comparator(cred->uid, f->op, cred->fsuid); return audit_uid_comparator(cred->uid, f->op, cred->fsuid);
/* auid comparisons */ /* auid comparisons */
case AUDIT_COMPARE_AUID_TO_EUID: case AUDIT_COMPARE_AUID_TO_EUID:
return audit_uid_comparator(tsk->loginuid, f->op, cred->euid); return audit_uid_comparator(audit_get_loginuid(tsk), f->op,
cred->euid);
case AUDIT_COMPARE_AUID_TO_SUID: case AUDIT_COMPARE_AUID_TO_SUID:
return audit_uid_comparator(tsk->loginuid, f->op, cred->suid); return audit_uid_comparator(audit_get_loginuid(tsk), f->op,
cred->suid);
case AUDIT_COMPARE_AUID_TO_FSUID: case AUDIT_COMPARE_AUID_TO_FSUID:
return audit_uid_comparator(tsk->loginuid, f->op, cred->fsuid); return audit_uid_comparator(audit_get_loginuid(tsk), f->op,
cred->fsuid);
/* euid comparisons */ /* euid comparisons */
case AUDIT_COMPARE_EUID_TO_SUID: case AUDIT_COMPARE_EUID_TO_SUID:
return audit_uid_comparator(cred->euid, f->op, cred->suid); return audit_uid_comparator(cred->euid, f->op, cred->suid);
...@@ -471,6 +475,8 @@ static int audit_filter_rules(struct task_struct *tsk, ...@@ -471,6 +475,8 @@ static int audit_filter_rules(struct task_struct *tsk,
break; break;
case AUDIT_EXE: case AUDIT_EXE:
result = audit_exe_compare(tsk, rule->exe); result = audit_exe_compare(tsk, rule->exe);
if (f->op == Audit_not_equal)
result = !result;
break; break;
case AUDIT_UID: case AUDIT_UID:
result = audit_uid_comparator(cred->uid, f->op, f->uid); result = audit_uid_comparator(cred->uid, f->op, f->uid);
...@@ -511,7 +517,7 @@ static int audit_filter_rules(struct task_struct *tsk, ...@@ -511,7 +517,7 @@ static int audit_filter_rules(struct task_struct *tsk,
result = audit_gid_comparator(cred->fsgid, f->op, f->gid); result = audit_gid_comparator(cred->fsgid, f->op, f->gid);
break; break;
case AUDIT_SESSIONID: case AUDIT_SESSIONID:
sessionid = audit_get_sessionid(current); sessionid = audit_get_sessionid(tsk);
result = audit_comparator(sessionid, f->op, f->val); result = audit_comparator(sessionid, f->op, f->val);
break; break;
case AUDIT_PERS: case AUDIT_PERS:
...@@ -609,7 +615,8 @@ static int audit_filter_rules(struct task_struct *tsk, ...@@ -609,7 +615,8 @@ static int audit_filter_rules(struct task_struct *tsk,
result = match_tree_refs(ctx, rule->tree); result = match_tree_refs(ctx, rule->tree);
break; break;
case AUDIT_LOGINUID: case AUDIT_LOGINUID:
result = audit_uid_comparator(tsk->loginuid, f->op, f->uid); result = audit_uid_comparator(audit_get_loginuid(tsk),
f->op, f->uid);
break; break;
case AUDIT_LOGINUID_SET: case AUDIT_LOGINUID_SET:
result = audit_comparator(audit_loginuid_set(tsk), f->op, f->val); result = audit_comparator(audit_loginuid_set(tsk), f->op, f->val);
...@@ -863,7 +870,7 @@ static inline struct audit_context *audit_take_context(struct task_struct *tsk, ...@@ -863,7 +870,7 @@ static inline struct audit_context *audit_take_context(struct task_struct *tsk,
audit_filter_inodes(tsk, context); audit_filter_inodes(tsk, context);
} }
tsk->audit_context = NULL; audit_set_context(tsk, NULL);
return context; return context;
} }
...@@ -950,7 +957,7 @@ int audit_alloc(struct task_struct *tsk) ...@@ -950,7 +957,7 @@ int audit_alloc(struct task_struct *tsk)
} }
context->filterkey = key; context->filterkey = key;
tsk->audit_context = context; audit_set_context(tsk, context);
set_tsk_thread_flag(tsk, TIF_SYSCALL_AUDIT); set_tsk_thread_flag(tsk, TIF_SYSCALL_AUDIT);
return 0; return 0;
} }
...@@ -1507,8 +1514,7 @@ void __audit_free(struct task_struct *tsk) ...@@ -1507,8 +1514,7 @@ void __audit_free(struct task_struct *tsk)
void __audit_syscall_entry(int major, unsigned long a1, unsigned long a2, void __audit_syscall_entry(int major, unsigned long a1, unsigned long a2,
unsigned long a3, unsigned long a4) unsigned long a3, unsigned long a4)
{ {
struct task_struct *tsk = current; struct audit_context *context = audit_context();
struct audit_context *context = tsk->audit_context;
enum audit_state state; enum audit_state state;
if (!audit_enabled || !context) if (!audit_enabled || !context)
...@@ -1523,7 +1529,7 @@ void __audit_syscall_entry(int major, unsigned long a1, unsigned long a2, ...@@ -1523,7 +1529,7 @@ void __audit_syscall_entry(int major, unsigned long a1, unsigned long a2,
context->dummy = !audit_n_rules; context->dummy = !audit_n_rules;
if (!context->dummy && state == AUDIT_BUILD_CONTEXT) { if (!context->dummy && state == AUDIT_BUILD_CONTEXT) {
context->prio = 0; context->prio = 0;
if (auditd_test_task(tsk)) if (auditd_test_task(current))
return; return;
} }
...@@ -1553,7 +1559,6 @@ void __audit_syscall_entry(int major, unsigned long a1, unsigned long a2, ...@@ -1553,7 +1559,6 @@ void __audit_syscall_entry(int major, unsigned long a1, unsigned long a2,
*/ */
void __audit_syscall_exit(int success, long return_code) void __audit_syscall_exit(int success, long return_code)
{ {
struct task_struct *tsk = current;
struct audit_context *context; struct audit_context *context;
if (success) if (success)
...@@ -1561,12 +1566,12 @@ void __audit_syscall_exit(int success, long return_code) ...@@ -1561,12 +1566,12 @@ void __audit_syscall_exit(int success, long return_code)
else else
success = AUDITSC_FAILURE; success = AUDITSC_FAILURE;
context = audit_take_context(tsk, success, return_code); context = audit_take_context(current, success, return_code);
if (!context) if (!context)
return; return;
if (context->in_syscall && context->current_state == AUDIT_RECORD_CONTEXT) if (context->in_syscall && context->current_state == AUDIT_RECORD_CONTEXT)
audit_log_exit(context, tsk); audit_log_exit(context, current);
context->in_syscall = 0; context->in_syscall = 0;
context->prio = context->state == AUDIT_RECORD_CONTEXT ? ~0ULL : 0; context->prio = context->state == AUDIT_RECORD_CONTEXT ? ~0ULL : 0;
...@@ -1588,7 +1593,7 @@ void __audit_syscall_exit(int success, long return_code) ...@@ -1588,7 +1593,7 @@ void __audit_syscall_exit(int success, long return_code)
kfree(context->filterkey); kfree(context->filterkey);
context->filterkey = NULL; context->filterkey = NULL;
} }
tsk->audit_context = context; audit_set_context(current, context);
} }
static inline void handle_one(const struct inode *inode) static inline void handle_one(const struct inode *inode)
...@@ -1600,7 +1605,7 @@ static inline void handle_one(const struct inode *inode) ...@@ -1600,7 +1605,7 @@ static inline void handle_one(const struct inode *inode)
int count; int count;
if (likely(!inode->i_fsnotify_marks)) if (likely(!inode->i_fsnotify_marks))
return; return;
context = current->audit_context; context = audit_context();
p = context->trees; p = context->trees;
count = context->tree_count; count = context->tree_count;
rcu_read_lock(); rcu_read_lock();
...@@ -1631,7 +1636,7 @@ static void handle_path(const struct dentry *dentry) ...@@ -1631,7 +1636,7 @@ static void handle_path(const struct dentry *dentry)
unsigned long seq; unsigned long seq;
int count; int count;
context = current->audit_context; context = audit_context();
p = context->trees; p = context->trees;
count = context->tree_count; count = context->tree_count;
retry: retry:
...@@ -1713,7 +1718,7 @@ static struct audit_names *audit_alloc_name(struct audit_context *context, ...@@ -1713,7 +1718,7 @@ static struct audit_names *audit_alloc_name(struct audit_context *context,
struct filename * struct filename *
__audit_reusename(const __user char *uptr) __audit_reusename(const __user char *uptr)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
struct audit_names *n; struct audit_names *n;
list_for_each_entry(n, &context->names_list, list) { list_for_each_entry(n, &context->names_list, list) {
...@@ -1736,7 +1741,7 @@ __audit_reusename(const __user char *uptr) ...@@ -1736,7 +1741,7 @@ __audit_reusename(const __user char *uptr)
*/ */
void __audit_getname(struct filename *name) void __audit_getname(struct filename *name)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
struct audit_names *n; struct audit_names *n;
if (!context->in_syscall) if (!context->in_syscall)
...@@ -1764,7 +1769,7 @@ void __audit_getname(struct filename *name) ...@@ -1764,7 +1769,7 @@ void __audit_getname(struct filename *name)
void __audit_inode(struct filename *name, const struct dentry *dentry, void __audit_inode(struct filename *name, const struct dentry *dentry,
unsigned int flags) unsigned int flags)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
struct inode *inode = d_backing_inode(dentry); struct inode *inode = d_backing_inode(dentry);
struct audit_names *n; struct audit_names *n;
bool parent = flags & AUDIT_INODE_PARENT; bool parent = flags & AUDIT_INODE_PARENT;
...@@ -1863,7 +1868,7 @@ void __audit_inode_child(struct inode *parent, ...@@ -1863,7 +1868,7 @@ void __audit_inode_child(struct inode *parent,
const struct dentry *dentry, const struct dentry *dentry,
const unsigned char type) const unsigned char type)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
struct inode *inode = d_backing_inode(dentry); struct inode *inode = d_backing_inode(dentry);
const char *dname = dentry->d_name.name; const char *dname = dentry->d_name.name;
struct audit_names *n, *found_parent = NULL, *found_child = NULL; struct audit_names *n, *found_parent = NULL, *found_child = NULL;
...@@ -2048,7 +2053,7 @@ static void audit_log_set_loginuid(kuid_t koldloginuid, kuid_t kloginuid, ...@@ -2048,7 +2053,7 @@ static void audit_log_set_loginuid(kuid_t koldloginuid, kuid_t kloginuid,
int audit_set_loginuid(kuid_t loginuid) int audit_set_loginuid(kuid_t loginuid)
{ {
struct task_struct *task = current; struct task_struct *task = current;
unsigned int oldsessionid, sessionid = (unsigned int)-1; unsigned int oldsessionid, sessionid = AUDIT_SID_UNSET;
kuid_t oldloginuid; kuid_t oldloginuid;
int rc; int rc;
...@@ -2062,7 +2067,7 @@ int audit_set_loginuid(kuid_t loginuid) ...@@ -2062,7 +2067,7 @@ int audit_set_loginuid(kuid_t loginuid)
/* are we setting or clearing? */ /* are we setting or clearing? */
if (uid_valid(loginuid)) { if (uid_valid(loginuid)) {
sessionid = (unsigned int)atomic_inc_return(&session_id); sessionid = (unsigned int)atomic_inc_return(&session_id);
if (unlikely(sessionid == (unsigned int)-1)) if (unlikely(sessionid == AUDIT_SID_UNSET))
sessionid = (unsigned int)atomic_inc_return(&session_id); sessionid = (unsigned int)atomic_inc_return(&session_id);
} }
...@@ -2082,7 +2087,7 @@ int audit_set_loginuid(kuid_t loginuid) ...@@ -2082,7 +2087,7 @@ int audit_set_loginuid(kuid_t loginuid)
*/ */
void __audit_mq_open(int oflag, umode_t mode, struct mq_attr *attr) void __audit_mq_open(int oflag, umode_t mode, struct mq_attr *attr)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
if (attr) if (attr)
memcpy(&context->mq_open.attr, attr, sizeof(struct mq_attr)); memcpy(&context->mq_open.attr, attr, sizeof(struct mq_attr));
...@@ -2106,7 +2111,7 @@ void __audit_mq_open(int oflag, umode_t mode, struct mq_attr *attr) ...@@ -2106,7 +2111,7 @@ void __audit_mq_open(int oflag, umode_t mode, struct mq_attr *attr)
void __audit_mq_sendrecv(mqd_t mqdes, size_t msg_len, unsigned int msg_prio, void __audit_mq_sendrecv(mqd_t mqdes, size_t msg_len, unsigned int msg_prio,
const struct timespec64 *abs_timeout) const struct timespec64 *abs_timeout)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
struct timespec64 *p = &context->mq_sendrecv.abs_timeout; struct timespec64 *p = &context->mq_sendrecv.abs_timeout;
if (abs_timeout) if (abs_timeout)
...@@ -2130,7 +2135,7 @@ void __audit_mq_sendrecv(mqd_t mqdes, size_t msg_len, unsigned int msg_prio, ...@@ -2130,7 +2135,7 @@ void __audit_mq_sendrecv(mqd_t mqdes, size_t msg_len, unsigned int msg_prio,
void __audit_mq_notify(mqd_t mqdes, const struct sigevent *notification) void __audit_mq_notify(mqd_t mqdes, const struct sigevent *notification)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
if (notification) if (notification)
context->mq_notify.sigev_signo = notification->sigev_signo; context->mq_notify.sigev_signo = notification->sigev_signo;
...@@ -2149,7 +2154,7 @@ void __audit_mq_notify(mqd_t mqdes, const struct sigevent *notification) ...@@ -2149,7 +2154,7 @@ void __audit_mq_notify(mqd_t mqdes, const struct sigevent *notification)
*/ */
void __audit_mq_getsetattr(mqd_t mqdes, struct mq_attr *mqstat) void __audit_mq_getsetattr(mqd_t mqdes, struct mq_attr *mqstat)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->mq_getsetattr.mqdes = mqdes; context->mq_getsetattr.mqdes = mqdes;
context->mq_getsetattr.mqstat = *mqstat; context->mq_getsetattr.mqstat = *mqstat;
context->type = AUDIT_MQ_GETSETATTR; context->type = AUDIT_MQ_GETSETATTR;
...@@ -2162,7 +2167,7 @@ void __audit_mq_getsetattr(mqd_t mqdes, struct mq_attr *mqstat) ...@@ -2162,7 +2167,7 @@ void __audit_mq_getsetattr(mqd_t mqdes, struct mq_attr *mqstat)
*/ */
void __audit_ipc_obj(struct kern_ipc_perm *ipcp) void __audit_ipc_obj(struct kern_ipc_perm *ipcp)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->ipc.uid = ipcp->uid; context->ipc.uid = ipcp->uid;
context->ipc.gid = ipcp->gid; context->ipc.gid = ipcp->gid;
context->ipc.mode = ipcp->mode; context->ipc.mode = ipcp->mode;
...@@ -2182,7 +2187,7 @@ void __audit_ipc_obj(struct kern_ipc_perm *ipcp) ...@@ -2182,7 +2187,7 @@ void __audit_ipc_obj(struct kern_ipc_perm *ipcp)
*/ */
void __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mode) void __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mode)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->ipc.qbytes = qbytes; context->ipc.qbytes = qbytes;
context->ipc.perm_uid = uid; context->ipc.perm_uid = uid;
...@@ -2193,7 +2198,7 @@ void __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mo ...@@ -2193,7 +2198,7 @@ void __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mo
void __audit_bprm(struct linux_binprm *bprm) void __audit_bprm(struct linux_binprm *bprm)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->type = AUDIT_EXECVE; context->type = AUDIT_EXECVE;
context->execve.argc = bprm->argc; context->execve.argc = bprm->argc;
...@@ -2208,7 +2213,7 @@ void __audit_bprm(struct linux_binprm *bprm) ...@@ -2208,7 +2213,7 @@ void __audit_bprm(struct linux_binprm *bprm)
*/ */
int __audit_socketcall(int nargs, unsigned long *args) int __audit_socketcall(int nargs, unsigned long *args)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
if (nargs <= 0 || nargs > AUDITSC_ARGS || !args) if (nargs <= 0 || nargs > AUDITSC_ARGS || !args)
return -EINVAL; return -EINVAL;
...@@ -2226,7 +2231,7 @@ int __audit_socketcall(int nargs, unsigned long *args) ...@@ -2226,7 +2231,7 @@ int __audit_socketcall(int nargs, unsigned long *args)
*/ */
void __audit_fd_pair(int fd1, int fd2) void __audit_fd_pair(int fd1, int fd2)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->fds[0] = fd1; context->fds[0] = fd1;
context->fds[1] = fd2; context->fds[1] = fd2;
} }
...@@ -2240,7 +2245,7 @@ void __audit_fd_pair(int fd1, int fd2) ...@@ -2240,7 +2245,7 @@ void __audit_fd_pair(int fd1, int fd2)
*/ */
int __audit_sockaddr(int len, void *a) int __audit_sockaddr(int len, void *a)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
if (!context->sockaddr) { if (!context->sockaddr) {
void *p = kmalloc(sizeof(struct sockaddr_storage), GFP_KERNEL); void *p = kmalloc(sizeof(struct sockaddr_storage), GFP_KERNEL);
...@@ -2256,7 +2261,7 @@ int __audit_sockaddr(int len, void *a) ...@@ -2256,7 +2261,7 @@ int __audit_sockaddr(int len, void *a)
void __audit_ptrace(struct task_struct *t) void __audit_ptrace(struct task_struct *t)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->target_pid = task_tgid_nr(t); context->target_pid = task_tgid_nr(t);
context->target_auid = audit_get_loginuid(t); context->target_auid = audit_get_loginuid(t);
...@@ -2277,19 +2282,19 @@ void __audit_ptrace(struct task_struct *t) ...@@ -2277,19 +2282,19 @@ void __audit_ptrace(struct task_struct *t)
int audit_signal_info(int sig, struct task_struct *t) int audit_signal_info(int sig, struct task_struct *t)
{ {
struct audit_aux_data_pids *axp; struct audit_aux_data_pids *axp;
struct task_struct *tsk = current; struct audit_context *ctx = audit_context();
struct audit_context *ctx = tsk->audit_context; kuid_t uid = current_uid(), auid, t_uid = task_uid(t);
kuid_t uid = current_uid(), t_uid = task_uid(t);
if (auditd_test_task(t) && if (auditd_test_task(t) &&
(sig == SIGTERM || sig == SIGHUP || (sig == SIGTERM || sig == SIGHUP ||
sig == SIGUSR1 || sig == SIGUSR2)) { sig == SIGUSR1 || sig == SIGUSR2)) {
audit_sig_pid = task_tgid_nr(tsk); audit_sig_pid = task_tgid_nr(current);
if (uid_valid(tsk->loginuid)) auid = audit_get_loginuid(current);
audit_sig_uid = tsk->loginuid; if (uid_valid(auid))
audit_sig_uid = auid;
else else
audit_sig_uid = uid; audit_sig_uid = uid;
security_task_getsecid(tsk, &audit_sig_sid); security_task_getsecid(current, &audit_sig_sid);
} }
if (!audit_signals || audit_dummy_context()) if (!audit_signals || audit_dummy_context())
...@@ -2345,7 +2350,7 @@ int __audit_log_bprm_fcaps(struct linux_binprm *bprm, ...@@ -2345,7 +2350,7 @@ int __audit_log_bprm_fcaps(struct linux_binprm *bprm,
const struct cred *new, const struct cred *old) const struct cred *new, const struct cred *old)
{ {
struct audit_aux_data_bprm_fcaps *ax; struct audit_aux_data_bprm_fcaps *ax;
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
struct cpu_vfs_cap_data vcaps; struct cpu_vfs_cap_data vcaps;
ax = kmalloc(sizeof(*ax), GFP_KERNEL); ax = kmalloc(sizeof(*ax), GFP_KERNEL);
...@@ -2385,7 +2390,7 @@ int __audit_log_bprm_fcaps(struct linux_binprm *bprm, ...@@ -2385,7 +2390,7 @@ int __audit_log_bprm_fcaps(struct linux_binprm *bprm,
*/ */
void __audit_log_capset(const struct cred *new, const struct cred *old) void __audit_log_capset(const struct cred *new, const struct cred *old)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->capset.pid = task_tgid_nr(current); context->capset.pid = task_tgid_nr(current);
context->capset.cap.effective = new->cap_effective; context->capset.cap.effective = new->cap_effective;
context->capset.cap.inheritable = new->cap_effective; context->capset.cap.inheritable = new->cap_effective;
...@@ -2396,7 +2401,7 @@ void __audit_log_capset(const struct cred *new, const struct cred *old) ...@@ -2396,7 +2401,7 @@ void __audit_log_capset(const struct cred *new, const struct cred *old)
void __audit_mmap_fd(int fd, int flags) void __audit_mmap_fd(int fd, int flags)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->mmap.fd = fd; context->mmap.fd = fd;
context->mmap.flags = flags; context->mmap.flags = flags;
context->type = AUDIT_MMAP; context->type = AUDIT_MMAP;
...@@ -2404,7 +2409,7 @@ void __audit_mmap_fd(int fd, int flags) ...@@ -2404,7 +2409,7 @@ void __audit_mmap_fd(int fd, int flags)
void __audit_log_kern_module(char *name) void __audit_log_kern_module(char *name)
{ {
struct audit_context *context = current->audit_context; struct audit_context *context = audit_context();
context->module.name = kmalloc(strlen(name) + 1, GFP_KERNEL); context->module.name = kmalloc(strlen(name) + 1, GFP_KERNEL);
strcpy(context->module.name, name); strcpy(context->module.name, name);
...@@ -2413,7 +2418,7 @@ void __audit_log_kern_module(char *name) ...@@ -2413,7 +2418,7 @@ void __audit_log_kern_module(char *name)
void __audit_fanotify(unsigned int response) void __audit_fanotify(unsigned int response)
{ {
audit_log(current->audit_context, GFP_KERNEL, audit_log(audit_context(), GFP_KERNEL,
AUDIT_FANOTIFY, "resp=%u", response); AUDIT_FANOTIFY, "resp=%u", response);
} }
...@@ -2464,7 +2469,19 @@ void audit_core_dumps(long signr) ...@@ -2464,7 +2469,19 @@ void audit_core_dumps(long signr)
audit_log_end(ab); audit_log_end(ab);
} }
void __audit_seccomp(unsigned long syscall, long signr, int code) /**
* audit_seccomp - record information about a seccomp action
* @syscall: syscall number
* @signr: signal value
* @code: the seccomp action
*
* Record the information associated with a seccomp action. Event filtering for
* seccomp actions that are not to be logged is done in seccomp_log().
* Therefore, this function forces auditing independent of the audit_enabled
* and dummy context state because seccomp actions should be logged even when
* audit is not in use.
*/
void audit_seccomp(unsigned long syscall, long signr, int code)
{ {
struct audit_buffer *ab; struct audit_buffer *ab;
...@@ -2478,9 +2495,29 @@ void __audit_seccomp(unsigned long syscall, long signr, int code) ...@@ -2478,9 +2495,29 @@ void __audit_seccomp(unsigned long syscall, long signr, int code)
audit_log_end(ab); audit_log_end(ab);
} }
void audit_seccomp_actions_logged(const char *names, const char *old_names,
int res)
{
struct audit_buffer *ab;
if (!audit_enabled)
return;
ab = audit_log_start(audit_context(), GFP_KERNEL,
AUDIT_CONFIG_CHANGE);
if (unlikely(!ab))
return;
audit_log_format(ab, "op=seccomp-logging");
audit_log_format(ab, " actions=%s", names);
audit_log_format(ab, " old-actions=%s", old_names);
audit_log_format(ab, " res=%d", res);
audit_log_end(ab);
}
struct list_head *audit_killed_trees(void) struct list_head *audit_killed_trees(void)
{ {
struct audit_context *ctx = current->audit_context; struct audit_context *ctx = audit_context();
if (likely(!ctx || !ctx->in_syscall)) if (likely(!ctx || !ctx->in_syscall))
return NULL; return NULL;
return &ctx->killed_trees; return &ctx->killed_trees;
......
...@@ -1712,7 +1712,7 @@ static __latent_entropy struct task_struct *copy_process( ...@@ -1712,7 +1712,7 @@ static __latent_entropy struct task_struct *copy_process(
p->start_time = ktime_get_ns(); p->start_time = ktime_get_ns();
p->real_start_time = ktime_get_boot_ns(); p->real_start_time = ktime_get_boot_ns();
p->io_context = NULL; p->io_context = NULL;
p->audit_context = NULL; audit_set_context(p, NULL);
cgroup_fork(p); cgroup_fork(p);
#ifdef CONFIG_NUMA #ifdef CONFIG_NUMA
p->mempolicy = mpol_dup(p->mempolicy); p->mempolicy = mpol_dup(p->mempolicy);
......
...@@ -593,18 +593,15 @@ static inline void seccomp_log(unsigned long syscall, long signr, u32 action, ...@@ -593,18 +593,15 @@ static inline void seccomp_log(unsigned long syscall, long signr, u32 action,
} }
/* /*
* Force an audit message to be emitted when the action is RET_KILL_*, * Emit an audit message when the action is RET_KILL_*, RET_LOG, or the
* RET_LOG, or the FILTER_FLAG_LOG bit was set and the action is * FILTER_FLAG_LOG bit was set. The admin has the ability to silence
* allowed to be logged by the admin. * any action from being logged by removing the action name from the
* seccomp_actions_logged sysctl.
*/ */
if (log) if (!log)
return __audit_seccomp(syscall, signr, action); return;
/* audit_seccomp(syscall, signr, action);
* Let the audit subsystem decide if the action should be audited based
* on whether the current task itself is being audited.
*/
return audit_seccomp(syscall, signr, action);
} }
/* /*
...@@ -1144,10 +1141,11 @@ static const struct seccomp_log_name seccomp_log_names[] = { ...@@ -1144,10 +1141,11 @@ static const struct seccomp_log_name seccomp_log_names[] = {
}; };
static bool seccomp_names_from_actions_logged(char *names, size_t size, static bool seccomp_names_from_actions_logged(char *names, size_t size,
u32 actions_logged) u32 actions_logged,
const char *sep)
{ {
const struct seccomp_log_name *cur; const struct seccomp_log_name *cur;
bool append_space = false; bool append_sep = false;
for (cur = seccomp_log_names; cur->name && size; cur++) { for (cur = seccomp_log_names; cur->name && size; cur++) {
ssize_t ret; ssize_t ret;
...@@ -1155,15 +1153,15 @@ static bool seccomp_names_from_actions_logged(char *names, size_t size, ...@@ -1155,15 +1153,15 @@ static bool seccomp_names_from_actions_logged(char *names, size_t size,
if (!(actions_logged & cur->log)) if (!(actions_logged & cur->log))
continue; continue;
if (append_space) { if (append_sep) {
ret = strscpy(names, " ", size); ret = strscpy(names, sep, size);
if (ret < 0) if (ret < 0)
return false; return false;
names += ret; names += ret;
size -= ret; size -= ret;
} else } else
append_space = true; append_sep = true;
ret = strscpy(names, cur->name, size); ret = strscpy(names, cur->name, size);
if (ret < 0) if (ret < 0)
...@@ -1208,48 +1206,104 @@ static bool seccomp_actions_logged_from_names(u32 *actions_logged, char *names) ...@@ -1208,48 +1206,104 @@ static bool seccomp_actions_logged_from_names(u32 *actions_logged, char *names)
return true; return true;
} }
static int seccomp_actions_logged_handler(struct ctl_table *ro_table, int write, static int read_actions_logged(struct ctl_table *ro_table, void __user *buffer,
void __user *buffer, size_t *lenp, size_t *lenp, loff_t *ppos)
loff_t *ppos)
{ {
char names[sizeof(seccomp_actions_avail)]; char names[sizeof(seccomp_actions_avail)];
struct ctl_table table; struct ctl_table table;
int ret;
if (write && !capable(CAP_SYS_ADMIN))
return -EPERM;
memset(names, 0, sizeof(names)); memset(names, 0, sizeof(names));
if (!write) {
if (!seccomp_names_from_actions_logged(names, sizeof(names), if (!seccomp_names_from_actions_logged(names, sizeof(names),
seccomp_actions_logged)) seccomp_actions_logged, " "))
return -EINVAL; return -EINVAL;
}
table = *ro_table; table = *ro_table;
table.data = names; table.data = names;
table.maxlen = sizeof(names); table.maxlen = sizeof(names);
ret = proc_dostring(&table, write, buffer, lenp, ppos); return proc_dostring(&table, 0, buffer, lenp, ppos);
}
static int write_actions_logged(struct ctl_table *ro_table, void __user *buffer,
size_t *lenp, loff_t *ppos, u32 *actions_logged)
{
char names[sizeof(seccomp_actions_avail)];
struct ctl_table table;
int ret;
if (!capable(CAP_SYS_ADMIN))
return -EPERM;
memset(names, 0, sizeof(names));
table = *ro_table;
table.data = names;
table.maxlen = sizeof(names);
ret = proc_dostring(&table, 1, buffer, lenp, ppos);
if (ret) if (ret)
return ret; return ret;
if (write) { if (!seccomp_actions_logged_from_names(actions_logged, table.data))
u32 actions_logged;
if (!seccomp_actions_logged_from_names(&actions_logged,
table.data))
return -EINVAL; return -EINVAL;
if (actions_logged & SECCOMP_LOG_ALLOW) if (*actions_logged & SECCOMP_LOG_ALLOW)
return -EINVAL; return -EINVAL;
seccomp_actions_logged = actions_logged; seccomp_actions_logged = *actions_logged;
}
return 0; return 0;
} }
static void audit_actions_logged(u32 actions_logged, u32 old_actions_logged,
int ret)
{
char names[sizeof(seccomp_actions_avail)];
char old_names[sizeof(seccomp_actions_avail)];
const char *new = names;
const char *old = old_names;
if (!audit_enabled)
return;
memset(names, 0, sizeof(names));
memset(old_names, 0, sizeof(old_names));
if (ret)
new = "?";
else if (!actions_logged)
new = "(none)";
else if (!seccomp_names_from_actions_logged(names, sizeof(names),
actions_logged, ","))
new = "?";
if (!old_actions_logged)
old = "(none)";
else if (!seccomp_names_from_actions_logged(old_names,
sizeof(old_names),
old_actions_logged, ","))
old = "?";
return audit_seccomp_actions_logged(new, old, !ret);
}
static int seccomp_actions_logged_handler(struct ctl_table *ro_table, int write,
void __user *buffer, size_t *lenp,
loff_t *ppos)
{
int ret;
if (write) {
u32 actions_logged = 0;
u32 old_actions_logged = seccomp_actions_logged;
ret = write_actions_logged(ro_table, buffer, lenp, ppos,
&actions_logged);
audit_actions_logged(actions_logged, old_actions_logged, ret);
} else
ret = read_actions_logged(ro_table, buffer, lenp, ppos);
return ret;
}
static struct ctl_path seccomp_sysctl_path[] = { static struct ctl_path seccomp_sysctl_path[] = {
{ .procname = "kernel", }, { .procname = "kernel", },
{ .procname = "seccomp", }, { .procname = "seccomp", },
......
...@@ -1062,7 +1062,7 @@ static int do_replace_finish(struct net *net, struct ebt_replace *repl, ...@@ -1062,7 +1062,7 @@ static int do_replace_finish(struct net *net, struct ebt_replace *repl,
#ifdef CONFIG_AUDIT #ifdef CONFIG_AUDIT
if (audit_enabled) { if (audit_enabled) {
audit_log(current->audit_context, GFP_KERNEL, audit_log(audit_context(), GFP_KERNEL,
AUDIT_NETFILTER_CFG, AUDIT_NETFILTER_CFG,
"table=%s family=%u entries=%u", "table=%s family=%u entries=%u",
repl->name, AF_BRIDGE, repl->nentries); repl->name, AF_BRIDGE, repl->nentries);
......
...@@ -6731,7 +6731,7 @@ static int __dev_set_promiscuity(struct net_device *dev, int inc, bool notify) ...@@ -6731,7 +6731,7 @@ static int __dev_set_promiscuity(struct net_device *dev, int inc, bool notify)
dev->flags & IFF_PROMISC ? "entered" : "left"); dev->flags & IFF_PROMISC ? "entered" : "left");
if (audit_enabled) { if (audit_enabled) {
current_uid_gid(&uid, &gid); current_uid_gid(&uid, &gid);
audit_log(current->audit_context, GFP_ATOMIC, audit_log(audit_context(), GFP_ATOMIC,
AUDIT_ANOM_PROMISCUOUS, AUDIT_ANOM_PROMISCUOUS,
"dev=%s prom=%d old_prom=%d auid=%u uid=%u gid=%u ses=%u", "dev=%s prom=%d old_prom=%d auid=%u uid=%u gid=%u ses=%u",
dev->name, (dev->flags & IFF_PROMISC), dev->name, (dev->flags & IFF_PROMISC),
......
...@@ -1420,7 +1420,7 @@ xt_replace_table(struct xt_table *table, ...@@ -1420,7 +1420,7 @@ xt_replace_table(struct xt_table *table,
#ifdef CONFIG_AUDIT #ifdef CONFIG_AUDIT
if (audit_enabled) { if (audit_enabled) {
audit_log(current->audit_context, GFP_KERNEL, audit_log(audit_context(), GFP_KERNEL,
AUDIT_NETFILTER_CFG, AUDIT_NETFILTER_CFG,
"table=%s family=%u entries=%u", "table=%s family=%u entries=%u",
table->name, table->af, private->number); table->name, table->af, private->number);
......
...@@ -104,7 +104,7 @@ struct audit_buffer *netlbl_audit_start_common(int type, ...@@ -104,7 +104,7 @@ struct audit_buffer *netlbl_audit_start_common(int type,
if (audit_enabled == 0) if (audit_enabled == 0)
return NULL; return NULL;
audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, type); audit_buf = audit_log_start(audit_context(), GFP_ATOMIC, type);
if (audit_buf == NULL) if (audit_buf == NULL)
return NULL; return NULL;
......
...@@ -326,7 +326,7 @@ void ima_audit_measurement(struct integrity_iint_cache *iint, ...@@ -326,7 +326,7 @@ void ima_audit_measurement(struct integrity_iint_cache *iint,
hex_byte_pack(hash + (i * 2), iint->ima_hash->digest[i]); hex_byte_pack(hash + (i * 2), iint->ima_hash->digest[i]);
hash[i * 2] = '\0'; hash[i * 2] = '\0';
ab = audit_log_start(current->audit_context, GFP_KERNEL, ab = audit_log_start(audit_context(), GFP_KERNEL,
AUDIT_INTEGRITY_RULE); AUDIT_INTEGRITY_RULE);
if (!ab) if (!ab)
goto out; goto out;
......
...@@ -38,7 +38,7 @@ void integrity_audit_msg(int audit_msgno, struct inode *inode, ...@@ -38,7 +38,7 @@ void integrity_audit_msg(int audit_msgno, struct inode *inode,
if (!integrity_audit_info && audit_info == 1) /* Skip info messages */ if (!integrity_audit_info && audit_info == 1) /* Skip info messages */
return; return;
ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno); ab = audit_log_start(audit_context(), GFP_KERNEL, audit_msgno);
audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u", audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u",
task_pid_nr(current), task_pid_nr(current),
from_kuid(&init_user_ns, current_cred()->uid), from_kuid(&init_user_ns, current_cred()->uid),
......
...@@ -447,7 +447,7 @@ void common_lsm_audit(struct common_audit_data *a, ...@@ -447,7 +447,7 @@ void common_lsm_audit(struct common_audit_data *a,
if (a == NULL) if (a == NULL)
return; return;
/* we use GFP_ATOMIC so we won't sleep */ /* we use GFP_ATOMIC so we won't sleep */
ab = audit_log_start(current->audit_context, GFP_ATOMIC | __GFP_NOWARN, ab = audit_log_start(audit_context(), GFP_ATOMIC | __GFP_NOWARN,
AUDIT_AVC); AUDIT_AVC);
if (ab == NULL) if (ab == NULL)
......
...@@ -3305,7 +3305,8 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name, ...@@ -3305,7 +3305,8 @@ static int selinux_inode_setxattr(struct dentry *dentry, const char *name,
} else { } else {
audit_size = 0; audit_size = 0;
} }
ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR); ab = audit_log_start(audit_context(),
GFP_ATOMIC, AUDIT_SELINUX_ERR);
audit_log_format(ab, "op=setxattr invalid_context="); audit_log_format(ab, "op=setxattr invalid_context=");
audit_log_n_untrustedstring(ab, value, audit_size); audit_log_n_untrustedstring(ab, value, audit_size);
audit_log_end(ab); audit_log_end(ab);
...@@ -6460,7 +6461,9 @@ static int selinux_setprocattr(const char *name, void *value, size_t size) ...@@ -6460,7 +6461,9 @@ static int selinux_setprocattr(const char *name, void *value, size_t size)
audit_size = size - 1; audit_size = size - 1;
else else
audit_size = size; audit_size = size;
ab = audit_log_start(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR); ab = audit_log_start(audit_context(),
GFP_ATOMIC,
AUDIT_SELINUX_ERR);
audit_log_format(ab, "op=fscreate invalid_context="); audit_log_format(ab, "op=fscreate invalid_context=");
audit_log_n_untrustedstring(ab, value, audit_size); audit_log_n_untrustedstring(ab, value, audit_size);
audit_log_end(ab); audit_log_end(ab);
......
...@@ -167,7 +167,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf, ...@@ -167,7 +167,7 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
NULL); NULL);
if (length) if (length)
goto out; goto out;
audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS, audit_log(audit_context(), GFP_KERNEL, AUDIT_MAC_STATUS,
"enforcing=%d old_enforcing=%d auid=%u ses=%u" "enforcing=%d old_enforcing=%d auid=%u ses=%u"
" enabled=%d old-enabled=%d lsm=selinux res=1", " enabled=%d old-enabled=%d lsm=selinux res=1",
new_value, old_value, new_value, old_value,
...@@ -303,7 +303,7 @@ static ssize_t sel_write_disable(struct file *file, const char __user *buf, ...@@ -303,7 +303,7 @@ static ssize_t sel_write_disable(struct file *file, const char __user *buf,
length = selinux_disable(fsi->state); length = selinux_disable(fsi->state);
if (length) if (length)
goto out; goto out;
audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS, audit_log(audit_context(), GFP_KERNEL, AUDIT_MAC_STATUS,
"enforcing=%d old_enforcing=%d auid=%u ses=%u" "enforcing=%d old_enforcing=%d auid=%u ses=%u"
" enabled=%d old-enabled=%d lsm=selinux res=1", " enabled=%d old-enabled=%d lsm=selinux res=1",
enforcing, enforcing, enforcing, enforcing,
...@@ -581,7 +581,7 @@ static ssize_t sel_write_load(struct file *file, const char __user *buf, ...@@ -581,7 +581,7 @@ static ssize_t sel_write_load(struct file *file, const char __user *buf,
length = count; length = count;
out1: out1:
audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD, audit_log(audit_context(), GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
"auid=%u ses=%u lsm=selinux res=1", "auid=%u ses=%u lsm=selinux res=1",
from_kuid(&init_user_ns, audit_get_loginuid(current)), from_kuid(&init_user_ns, audit_get_loginuid(current)),
audit_get_sessionid(current)); audit_get_sessionid(current));
......
...@@ -501,7 +501,7 @@ static void security_dump_masked_av(struct policydb *policydb, ...@@ -501,7 +501,7 @@ static void security_dump_masked_av(struct policydb *policydb,
goto out; goto out;
/* audit a message */ /* audit a message */
ab = audit_log_start(current->audit_context, ab = audit_log_start(audit_context(),
GFP_ATOMIC, AUDIT_SELINUX_ERR); GFP_ATOMIC, AUDIT_SELINUX_ERR);
if (!ab) if (!ab)
goto out; goto out;
...@@ -743,7 +743,7 @@ static int security_validtrans_handle_fail(struct selinux_state *state, ...@@ -743,7 +743,7 @@ static int security_validtrans_handle_fail(struct selinux_state *state,
goto out; goto out;
if (context_struct_to_string(p, tcontext, &t, &tlen)) if (context_struct_to_string(p, tcontext, &t, &tlen))
goto out; goto out;
audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, audit_log(audit_context(), GFP_ATOMIC, AUDIT_SELINUX_ERR,
"op=security_validate_transition seresult=denied" "op=security_validate_transition seresult=denied"
" oldcontext=%s newcontext=%s taskcontext=%s tclass=%s", " oldcontext=%s newcontext=%s taskcontext=%s tclass=%s",
o, n, t, sym_name(p, SYM_CLASSES, tclass-1)); o, n, t, sym_name(p, SYM_CLASSES, tclass-1));
...@@ -929,7 +929,7 @@ int security_bounded_transition(struct selinux_state *state, ...@@ -929,7 +929,7 @@ int security_bounded_transition(struct selinux_state *state,
&old_name, &length) && &old_name, &length) &&
!context_struct_to_string(policydb, new_context, !context_struct_to_string(policydb, new_context,
&new_name, &length)) { &new_name, &length)) {
audit_log(current->audit_context, audit_log(audit_context(),
GFP_ATOMIC, AUDIT_SELINUX_ERR, GFP_ATOMIC, AUDIT_SELINUX_ERR,
"op=security_bounded_transition " "op=security_bounded_transition "
"seresult=denied " "seresult=denied "
...@@ -1586,7 +1586,7 @@ static int compute_sid_handle_invalid_context( ...@@ -1586,7 +1586,7 @@ static int compute_sid_handle_invalid_context(
goto out; goto out;
if (context_struct_to_string(policydb, newcontext, &n, &nlen)) if (context_struct_to_string(policydb, newcontext, &n, &nlen))
goto out; goto out;
audit_log(current->audit_context, GFP_ATOMIC, AUDIT_SELINUX_ERR, audit_log(audit_context(), GFP_ATOMIC, AUDIT_SELINUX_ERR,
"op=security_compute_sid invalid_context=%s" "op=security_compute_sid invalid_context=%s"
" scontext=%s" " scontext=%s"
" tcontext=%s" " tcontext=%s"
...@@ -2882,7 +2882,7 @@ int security_set_bools(struct selinux_state *state, int len, int *values) ...@@ -2882,7 +2882,7 @@ int security_set_bools(struct selinux_state *state, int len, int *values)
for (i = 0; i < len; i++) { for (i = 0; i < len; i++) {
if (!!values[i] != policydb->bool_val_to_struct[i]->state) { if (!!values[i] != policydb->bool_val_to_struct[i]->state) {
audit_log(current->audit_context, GFP_ATOMIC, audit_log(audit_context(), GFP_ATOMIC,
AUDIT_MAC_CONFIG_CHANGE, AUDIT_MAC_CONFIG_CHANGE,
"bool=%s val=%d old_val=%d auid=%u ses=%u", "bool=%s val=%d old_val=%d auid=%u ses=%u",
sym_name(policydb, SYM_BOOLS, i), sym_name(policydb, SYM_BOOLS, i),
...@@ -3025,7 +3025,7 @@ int security_sid_mls_copy(struct selinux_state *state, ...@@ -3025,7 +3025,7 @@ int security_sid_mls_copy(struct selinux_state *state,
if (rc) { if (rc) {
if (!context_struct_to_string(policydb, &newcon, &s, if (!context_struct_to_string(policydb, &newcon, &s,
&len)) { &len)) {
audit_log(current->audit_context, audit_log(audit_context(),
GFP_ATOMIC, AUDIT_SELINUX_ERR, GFP_ATOMIC, AUDIT_SELINUX_ERR,
"op=security_sid_mls_copy " "op=security_sid_mls_copy "
"invalid_context=%s", s); "invalid_context=%s", s);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment