mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	audit: anchor all pid references in the initial pid namespace
Store and log all PIDs with reference to the initial PID namespace and use the access functions task_pid_nr() and task_tgid_nr() for task->pid and task->tgid. Cc: "Eric W. Biederman" <ebiederm@xmission.com> (informed by ebiederman's c776b5d2) Signed-off-by: Richard Guy Briggs <rgb@redhat.com>
This commit is contained in:
		
							parent
							
								
									c92cdeb45e
								
							
						
					
					
						commit
						f1dc4867ff
					
				
					 6 changed files with 38 additions and 16 deletions
				
			
		| 
						 | 
					@ -65,6 +65,7 @@ static void tty_audit_log(const char *description, int major, int minor,
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	struct audit_buffer *ab;
 | 
						struct audit_buffer *ab;
 | 
				
			||||||
	struct task_struct *tsk = current;
 | 
						struct task_struct *tsk = current;
 | 
				
			||||||
 | 
						pid_t pid = task_pid_nr(tsk);
 | 
				
			||||||
	uid_t uid = from_kuid(&init_user_ns, task_uid(tsk));
 | 
						uid_t uid = from_kuid(&init_user_ns, task_uid(tsk));
 | 
				
			||||||
	uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(tsk));
 | 
						uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(tsk));
 | 
				
			||||||
	unsigned int sessionid = audit_get_sessionid(tsk);
 | 
						unsigned int sessionid = audit_get_sessionid(tsk);
 | 
				
			||||||
| 
						 | 
					@ -74,7 +75,7 @@ static void tty_audit_log(const char *description, int major, int minor,
 | 
				
			||||||
		char name[sizeof(tsk->comm)];
 | 
							char name[sizeof(tsk->comm)];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		audit_log_format(ab, "%s pid=%u uid=%u auid=%u ses=%u major=%d"
 | 
							audit_log_format(ab, "%s pid=%u uid=%u auid=%u ses=%u major=%d"
 | 
				
			||||||
				 " minor=%d comm=", description, tsk->pid, uid,
 | 
									 " minor=%d comm=", description, pid, uid,
 | 
				
			||||||
				 loginuid, sessionid, major, minor);
 | 
									 loginuid, sessionid, major, minor);
 | 
				
			||||||
		get_task_comm(name, tsk);
 | 
							get_task_comm(name, tsk);
 | 
				
			||||||
		audit_log_untrustedstring(ab, name);
 | 
							audit_log_untrustedstring(ab, name);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -649,6 +649,7 @@ static int audit_log_common_recv_msg(struct audit_buffer **ab, u16 msg_type)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	int rc = 0;
 | 
						int rc = 0;
 | 
				
			||||||
	uid_t uid = from_kuid(&init_user_ns, current_uid());
 | 
						uid_t uid = from_kuid(&init_user_ns, current_uid());
 | 
				
			||||||
 | 
						pid_t pid = task_tgid_nr(current);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!audit_enabled && msg_type != AUDIT_USER_AVC) {
 | 
						if (!audit_enabled && msg_type != AUDIT_USER_AVC) {
 | 
				
			||||||
		*ab = NULL;
 | 
							*ab = NULL;
 | 
				
			||||||
| 
						 | 
					@ -658,7 +659,7 @@ static int audit_log_common_recv_msg(struct audit_buffer **ab, u16 msg_type)
 | 
				
			||||||
	*ab = audit_log_start(NULL, GFP_KERNEL, msg_type);
 | 
						*ab = audit_log_start(NULL, GFP_KERNEL, msg_type);
 | 
				
			||||||
	if (unlikely(!*ab))
 | 
						if (unlikely(!*ab))
 | 
				
			||||||
		return rc;
 | 
							return rc;
 | 
				
			||||||
	audit_log_format(*ab, "pid=%d uid=%u", task_tgid_vnr(current), uid);
 | 
						audit_log_format(*ab, "pid=%d uid=%u", pid, uid);
 | 
				
			||||||
	audit_log_session_info(*ab);
 | 
						audit_log_session_info(*ab);
 | 
				
			||||||
	audit_log_task_context(*ab);
 | 
						audit_log_task_context(*ab);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -1823,7 +1824,7 @@ void audit_log_task_info(struct audit_buffer *ab, struct task_struct *tsk)
 | 
				
			||||||
			 " euid=%u suid=%u fsuid=%u"
 | 
								 " euid=%u suid=%u fsuid=%u"
 | 
				
			||||||
			 " egid=%u sgid=%u fsgid=%u tty=%s ses=%u",
 | 
								 " egid=%u sgid=%u fsgid=%u tty=%s ses=%u",
 | 
				
			||||||
			 task_ppid_nr(tsk),
 | 
								 task_ppid_nr(tsk),
 | 
				
			||||||
			 tsk->pid,
 | 
								 task_pid_nr(tsk),
 | 
				
			||||||
			 from_kuid(&init_user_ns, audit_get_loginuid(tsk)),
 | 
								 from_kuid(&init_user_ns, audit_get_loginuid(tsk)),
 | 
				
			||||||
			 from_kuid(&init_user_ns, cred->uid),
 | 
								 from_kuid(&init_user_ns, cred->uid),
 | 
				
			||||||
			 from_kgid(&init_user_ns, cred->gid),
 | 
								 from_kgid(&init_user_ns, cred->gid),
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -433,6 +433,19 @@ static struct audit_entry *audit_data_to_entry(struct audit_rule_data *data,
 | 
				
			||||||
			f->val = 0;
 | 
								f->val = 0;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if ((f->type == AUDIT_PID) || (f->type == AUDIT_PPID)) {
 | 
				
			||||||
 | 
								struct pid *pid;
 | 
				
			||||||
 | 
								rcu_read_lock();
 | 
				
			||||||
 | 
								pid = find_vpid(f->val);
 | 
				
			||||||
 | 
								if (!pid) {
 | 
				
			||||||
 | 
									rcu_read_unlock();
 | 
				
			||||||
 | 
									err = -ESRCH;
 | 
				
			||||||
 | 
									goto exit_free;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								f->val = pid_nr(pid);
 | 
				
			||||||
 | 
								rcu_read_unlock();
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		err = audit_field_valid(entry, f);
 | 
							err = audit_field_valid(entry, f);
 | 
				
			||||||
		if (err)
 | 
							if (err)
 | 
				
			||||||
			goto exit_free;
 | 
								goto exit_free;
 | 
				
			||||||
| 
						 | 
					@ -1242,12 +1255,14 @@ static int audit_filter_user_rules(struct audit_krule *rule, int type,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	for (i = 0; i < rule->field_count; i++) {
 | 
						for (i = 0; i < rule->field_count; i++) {
 | 
				
			||||||
		struct audit_field *f = &rule->fields[i];
 | 
							struct audit_field *f = &rule->fields[i];
 | 
				
			||||||
 | 
							pid_t pid;
 | 
				
			||||||
		int result = 0;
 | 
							int result = 0;
 | 
				
			||||||
		u32 sid;
 | 
							u32 sid;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		switch (f->type) {
 | 
							switch (f->type) {
 | 
				
			||||||
		case AUDIT_PID:
 | 
							case AUDIT_PID:
 | 
				
			||||||
			result = audit_comparator(task_pid_vnr(current), f->op, f->val);
 | 
								pid = task_pid_nr(current);
 | 
				
			||||||
 | 
								result = audit_comparator(pid, f->op, f->val);
 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
		case AUDIT_UID:
 | 
							case AUDIT_UID:
 | 
				
			||||||
			result = audit_uid_comparator(current_uid(), f->op, f->uid);
 | 
								result = audit_uid_comparator(current_uid(), f->op, f->uid);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -457,10 +457,12 @@ static int audit_filter_rules(struct task_struct *tsk,
 | 
				
			||||||
		struct audit_field *f = &rule->fields[i];
 | 
							struct audit_field *f = &rule->fields[i];
 | 
				
			||||||
		struct audit_names *n;
 | 
							struct audit_names *n;
 | 
				
			||||||
		int result = 0;
 | 
							int result = 0;
 | 
				
			||||||
 | 
							pid_t pid;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		switch (f->type) {
 | 
							switch (f->type) {
 | 
				
			||||||
		case AUDIT_PID:
 | 
							case AUDIT_PID:
 | 
				
			||||||
			result = audit_comparator(tsk->pid, f->op, f->val);
 | 
								pid = task_pid_nr(tsk);
 | 
				
			||||||
 | 
								result = audit_comparator(pid, f->op, f->val);
 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
		case AUDIT_PPID:
 | 
							case AUDIT_PPID:
 | 
				
			||||||
			if (ctx) {
 | 
								if (ctx) {
 | 
				
			||||||
| 
						 | 
					@ -2051,7 +2053,7 @@ static void audit_log_set_loginuid(kuid_t koldloginuid, kuid_t kloginuid,
 | 
				
			||||||
	audit_log_format(ab, "pid=%d uid=%u"
 | 
						audit_log_format(ab, "pid=%d uid=%u"
 | 
				
			||||||
			 " old-auid=%u new-auid=%u old-ses=%u new-ses=%u"
 | 
								 " old-auid=%u new-auid=%u old-ses=%u new-ses=%u"
 | 
				
			||||||
			 " res=%d",
 | 
								 " res=%d",
 | 
				
			||||||
			 current->pid, uid,
 | 
								 task_pid_nr(current), uid,
 | 
				
			||||||
			 oldloginuid, loginuid, oldsessionid, sessionid,
 | 
								 oldloginuid, loginuid, oldsessionid, sessionid,
 | 
				
			||||||
			 !rc);
 | 
								 !rc);
 | 
				
			||||||
	audit_log_end(ab);
 | 
						audit_log_end(ab);
 | 
				
			||||||
| 
						 | 
					@ -2275,7 +2277,7 @@ void __audit_ptrace(struct task_struct *t)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	struct audit_context *context = current->audit_context;
 | 
						struct audit_context *context = current->audit_context;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	context->target_pid = t->pid;
 | 
						context->target_pid = task_pid_nr(t);
 | 
				
			||||||
	context->target_auid = audit_get_loginuid(t);
 | 
						context->target_auid = audit_get_loginuid(t);
 | 
				
			||||||
	context->target_uid = task_uid(t);
 | 
						context->target_uid = task_uid(t);
 | 
				
			||||||
	context->target_sessionid = audit_get_sessionid(t);
 | 
						context->target_sessionid = audit_get_sessionid(t);
 | 
				
			||||||
| 
						 | 
					@ -2300,7 +2302,7 @@ int __audit_signal_info(int sig, struct task_struct *t)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (audit_pid && t->tgid == audit_pid) {
 | 
						if (audit_pid && t->tgid == audit_pid) {
 | 
				
			||||||
		if (sig == SIGTERM || sig == SIGHUP || sig == SIGUSR1 || sig == SIGUSR2) {
 | 
							if (sig == SIGTERM || sig == SIGHUP || sig == SIGUSR1 || sig == SIGUSR2) {
 | 
				
			||||||
			audit_sig_pid = tsk->pid;
 | 
								audit_sig_pid = task_pid_nr(tsk);
 | 
				
			||||||
			if (uid_valid(tsk->loginuid))
 | 
								if (uid_valid(tsk->loginuid))
 | 
				
			||||||
				audit_sig_uid = tsk->loginuid;
 | 
									audit_sig_uid = tsk->loginuid;
 | 
				
			||||||
			else
 | 
								else
 | 
				
			||||||
| 
						 | 
					@ -2314,7 +2316,7 @@ int __audit_signal_info(int sig, struct task_struct *t)
 | 
				
			||||||
	/* optimize the common case by putting first signal recipient directly
 | 
						/* optimize the common case by putting first signal recipient directly
 | 
				
			||||||
	 * in audit_context */
 | 
						 * in audit_context */
 | 
				
			||||||
	if (!ctx->target_pid) {
 | 
						if (!ctx->target_pid) {
 | 
				
			||||||
		ctx->target_pid = t->tgid;
 | 
							ctx->target_pid = task_tgid_nr(t);
 | 
				
			||||||
		ctx->target_auid = audit_get_loginuid(t);
 | 
							ctx->target_auid = audit_get_loginuid(t);
 | 
				
			||||||
		ctx->target_uid = t_uid;
 | 
							ctx->target_uid = t_uid;
 | 
				
			||||||
		ctx->target_sessionid = audit_get_sessionid(t);
 | 
							ctx->target_sessionid = audit_get_sessionid(t);
 | 
				
			||||||
| 
						 | 
					@ -2335,7 +2337,7 @@ int __audit_signal_info(int sig, struct task_struct *t)
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	BUG_ON(axp->pid_count >= AUDIT_AUX_PIDS);
 | 
						BUG_ON(axp->pid_count >= AUDIT_AUX_PIDS);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	axp->target_pid[axp->pid_count] = t->tgid;
 | 
						axp->target_pid[axp->pid_count] = task_tgid_nr(t);
 | 
				
			||||||
	axp->target_auid[axp->pid_count] = audit_get_loginuid(t);
 | 
						axp->target_auid[axp->pid_count] = audit_get_loginuid(t);
 | 
				
			||||||
	axp->target_uid[axp->pid_count] = t_uid;
 | 
						axp->target_uid[axp->pid_count] = t_uid;
 | 
				
			||||||
	axp->target_sessionid[axp->pid_count] = audit_get_sessionid(t);
 | 
						axp->target_sessionid[axp->pid_count] = audit_get_sessionid(t);
 | 
				
			||||||
| 
						 | 
					@ -2435,7 +2437,7 @@ static void audit_log_task(struct audit_buffer *ab)
 | 
				
			||||||
			 from_kgid(&init_user_ns, gid),
 | 
								 from_kgid(&init_user_ns, gid),
 | 
				
			||||||
			 sessionid);
 | 
								 sessionid);
 | 
				
			||||||
	audit_log_task_context(ab);
 | 
						audit_log_task_context(ab);
 | 
				
			||||||
	audit_log_format(ab, " pid=%d comm=", current->pid);
 | 
						audit_log_format(ab, " pid=%d comm=", task_pid_nr(current));
 | 
				
			||||||
	audit_log_untrustedstring(ab, current->comm);
 | 
						audit_log_untrustedstring(ab, current->comm);
 | 
				
			||||||
	if (mm) {
 | 
						if (mm) {
 | 
				
			||||||
		down_read(&mm->mmap_sem);
 | 
							down_read(&mm->mmap_sem);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -39,7 +39,7 @@ void integrity_audit_msg(int audit_msgno, struct inode *inode,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno);
 | 
						ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno);
 | 
				
			||||||
	audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u",
 | 
						audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u",
 | 
				
			||||||
			 current->pid,
 | 
								 task_pid_nr(current),
 | 
				
			||||||
			 from_kuid(&init_user_ns, current_cred()->uid),
 | 
								 from_kuid(&init_user_ns, current_cred()->uid),
 | 
				
			||||||
			 from_kuid(&init_user_ns, audit_get_loginuid(current)),
 | 
								 from_kuid(&init_user_ns, audit_get_loginuid(current)),
 | 
				
			||||||
			 audit_get_sessionid(current));
 | 
								 audit_get_sessionid(current));
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -220,7 +220,7 @@ static void dump_common_audit_data(struct audit_buffer *ab,
 | 
				
			||||||
	 */
 | 
						 */
 | 
				
			||||||
	BUILD_BUG_ON(sizeof(a->u) > sizeof(void *)*2);
 | 
						BUILD_BUG_ON(sizeof(a->u) > sizeof(void *)*2);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	audit_log_format(ab, " pid=%d comm=", tsk->pid);
 | 
						audit_log_format(ab, " pid=%d comm=", task_pid_nr(tsk));
 | 
				
			||||||
	audit_log_untrustedstring(ab, tsk->comm);
 | 
						audit_log_untrustedstring(ab, tsk->comm);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	switch (a->type) {
 | 
						switch (a->type) {
 | 
				
			||||||
| 
						 | 
					@ -278,9 +278,12 @@ static void dump_common_audit_data(struct audit_buffer *ab,
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	case LSM_AUDIT_DATA_TASK:
 | 
						case LSM_AUDIT_DATA_TASK:
 | 
				
			||||||
		tsk = a->u.tsk;
 | 
							tsk = a->u.tsk;
 | 
				
			||||||
		if (tsk && tsk->pid) {
 | 
							if (tsk) {
 | 
				
			||||||
			audit_log_format(ab, " pid=%d comm=", tsk->pid);
 | 
								pid_t pid = task_pid_nr(tsk);
 | 
				
			||||||
			audit_log_untrustedstring(ab, tsk->comm);
 | 
								if (pid) {
 | 
				
			||||||
 | 
									audit_log_format(ab, " pid=%d comm=", pid);
 | 
				
			||||||
 | 
									audit_log_untrustedstring(ab, tsk->comm);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		break;
 | 
							break;
 | 
				
			||||||
	case LSM_AUDIT_DATA_NET:
 | 
						case LSM_AUDIT_DATA_NET:
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue