Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
linux
Commits
a5cb013d
Commit
a5cb013d
authored
Mar 20, 2007
by
Al Viro
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[PATCH] auditing ptrace
Signed-off-by:
Al Viro
<
viro@zeniv.linux.org.uk
>
parent
129a84de
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
42 additions
and
0 deletions
+42
-0
include/linux/audit.h
include/linux/audit.h
+10
-0
kernel/auditsc.c
kernel/auditsc.c
+29
-0
kernel/ptrace.c
kernel/ptrace.c
+3
-0
No files found.
include/linux/audit.h
View file @
a5cb013d
...
...
@@ -91,6 +91,7 @@
#define AUDIT_MQ_GETSETATTR 1315
/* POSIX MQ get/set attribute record type */
#define AUDIT_KERNEL_OTHER 1316
/* For use by 3rd party modules */
#define AUDIT_FD_PAIR 1317
/* audit record for pipe/socketpair */
#define AUDIT_OBJ_PID 1318
/* ptrace target */
#define AUDIT_AVC 1400
/* SE Linux avc denial or grant */
#define AUDIT_SELINUX_ERR 1401
/* Internal SE Linux Errors */
...
...
@@ -352,6 +353,8 @@ extern void __audit_inode(const char *name, const struct inode *inode);
extern
void
__audit_inode_child
(
const
char
*
dname
,
const
struct
inode
*
inode
,
const
struct
inode
*
parent
);
extern
void
__audit_inode_update
(
const
struct
inode
*
inode
);
extern
void
__audit_ptrace
(
struct
task_struct
*
t
);
static
inline
int
audit_dummy_context
(
void
)
{
void
*
p
=
current
->
audit_context
;
...
...
@@ -377,6 +380,12 @@ static inline void audit_inode_update(const struct inode *inode) {
__audit_inode_update
(
inode
);
}
static
inline
void
audit_ptrace
(
struct
task_struct
*
t
)
{
if
(
unlikely
(
!
audit_dummy_context
()))
__audit_ptrace
(
t
);
}
/* Private API (for audit.c only) */
extern
unsigned
int
audit_serial
(
void
);
extern
void
auditsc_get_stamp
(
struct
audit_context
*
ctx
,
...
...
@@ -477,6 +486,7 @@ extern int audit_n_rules;
#define audit_mq_timedreceive(d,l,p,t) ({ 0; })
#define audit_mq_notify(d,n) ({ 0; })
#define audit_mq_getsetattr(d,s) ({ 0; })
#define audit_ptrace(t) ((void)0)
#define audit_n_rules 0
#endif
...
...
kernel/auditsc.c
View file @
a5cb013d
...
...
@@ -209,6 +209,9 @@ struct audit_context {
unsigned
long
personality
;
int
arch
;
pid_t
target_pid
;
u32
target_sid
;
#if AUDIT_DEBUG
int
put_count
;
int
ino_count
;
...
...
@@ -973,6 +976,23 @@ static void audit_log_exit(struct audit_context *context, struct task_struct *ts
audit_log_end
(
ab
);
}
if
(
context
->
target_pid
)
{
ab
=
audit_log_start
(
context
,
GFP_KERNEL
,
AUDIT_OBJ_PID
);
if
(
ab
)
{
char
*
s
=
NULL
,
*
t
;
u32
len
;
if
(
selinux_sid_to_string
(
context
->
target_sid
,
&
s
,
&
len
))
t
=
"(none)"
;
else
t
=
s
;
audit_log_format
(
ab
,
"opid=%d obj=%s"
,
context
->
target_pid
,
t
);
audit_log_end
(
ab
);
kfree
(
s
);
}
}
if
(
context
->
pwd
&&
context
->
pwdmnt
)
{
ab
=
audit_log_start
(
context
,
GFP_KERNEL
,
AUDIT_CWD
);
if
(
ab
)
{
...
...
@@ -1193,6 +1213,7 @@ void audit_syscall_exit(int valid, long return_code)
}
else
{
audit_free_names
(
context
);
audit_free_aux
(
context
);
context
->
target_pid
=
0
;
kfree
(
context
->
filterkey
);
context
->
filterkey
=
NULL
;
tsk
->
audit_context
=
context
;
...
...
@@ -1880,6 +1901,14 @@ int audit_sockaddr(int len, void *a)
return
0
;
}
void
__audit_ptrace
(
struct
task_struct
*
t
)
{
struct
audit_context
*
context
=
current
->
audit_context
;
context
->
target_pid
=
t
->
pid
;
selinux_get_task_sid
(
t
,
&
context
->
target_sid
);
}
/**
* audit_avc_path - record the granting or denial of permissions
* @dentry: dentry to record
...
...
kernel/ptrace.c
View file @
a5cb013d
...
...
@@ -18,6 +18,7 @@
#include <linux/ptrace.h>
#include <linux/security.h>
#include <linux/signal.h>
#include <linux/audit.h>
#include <asm/pgtable.h>
#include <asm/uaccess.h>
...
...
@@ -161,6 +162,8 @@ int ptrace_attach(struct task_struct *task)
{
int
retval
;
audit_ptrace
(
task
);
retval
=
-
EPERM
;
if
(
task
->
pid
<=
1
)
goto
out
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment