Blame view

security/tomoyo/audit.c 12 KB
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
1
2
3
  /*
   * security/tomoyo/audit.c
   *
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
4
   * Copyright (C) 2005-2011  NTT DATA CORPORATION
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
5
6
7
8
9
10
   */
  
  #include "common.h"
  #include <linux/slab.h>
  
  /**
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
   * tomoyo_print_bprm - Print "struct linux_binprm" for auditing.
   *
   * @bprm: Pointer to "struct linux_binprm".
   * @dump: Pointer to "struct tomoyo_page_dump".
   *
   * Returns the contents of @bprm on success, NULL otherwise.
   *
   * This function uses kzalloc(), so caller must kfree() if this function
   * didn't return NULL.
   */
  static char *tomoyo_print_bprm(struct linux_binprm *bprm,
  			       struct tomoyo_page_dump *dump)
  {
  	static const int tomoyo_buffer_len = 4096 * 2;
  	char *buffer = kzalloc(tomoyo_buffer_len, GFP_NOFS);
  	char *cp;
  	char *last_start;
  	int len;
  	unsigned long pos = bprm->p;
  	int offset = pos % PAGE_SIZE;
  	int argv_count = bprm->argc;
  	int envp_count = bprm->envc;
  	bool truncated = false;
  	if (!buffer)
  		return NULL;
  	len = snprintf(buffer, tomoyo_buffer_len - 1, "argv[]={ ");
  	cp = buffer + len;
  	if (!argv_count) {
  		memmove(cp, "} envp[]={ ", 11);
  		cp += 11;
  	}
  	last_start = cp;
  	while (argv_count || envp_count) {
  		if (!tomoyo_dump_page(bprm, pos, dump))
  			goto out;
  		pos += PAGE_SIZE - offset;
  		/* Read. */
  		while (offset < PAGE_SIZE) {
  			const char *kaddr = dump->data;
  			const unsigned char c = kaddr[offset++];
  			if (cp == last_start)
  				*cp++ = '"';
  			if (cp >= buffer + tomoyo_buffer_len - 32) {
  				/* Reserve some room for "..." string. */
  				truncated = true;
  			} else if (c == '\\') {
  				*cp++ = '\\';
  				*cp++ = '\\';
  			} else if (c > ' ' && c < 127) {
  				*cp++ = c;
  			} else if (!c) {
  				*cp++ = '"';
  				*cp++ = ' ';
  				last_start = cp;
  			} else {
  				*cp++ = '\\';
  				*cp++ = (c >> 6) + '0';
  				*cp++ = ((c >> 3) & 7) + '0';
  				*cp++ = (c & 7) + '0';
  			}
  			if (c)
  				continue;
  			if (argv_count) {
  				if (--argv_count == 0) {
  					if (truncated) {
  						cp = last_start;
  						memmove(cp, "... ", 4);
  						cp += 4;
  					}
  					memmove(cp, "} envp[]={ ", 11);
  					cp += 11;
  					last_start = cp;
  					truncated = false;
  				}
  			} else if (envp_count) {
  				if (--envp_count == 0) {
  					if (truncated) {
  						cp = last_start;
  						memmove(cp, "... ", 4);
  						cp += 4;
  					}
  				}
  			}
  			if (!argv_count && !envp_count)
  				break;
  		}
  		offset = 0;
  	}
  	*cp++ = '}';
  	*cp = '\0';
  	return buffer;
  out:
  	snprintf(buffer, tomoyo_buffer_len - 1,
  		 "argv[]={ ... } envp[]= { ... }");
  	return buffer;
  }
  
  /**
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
109
110
111
112
113
114
   * tomoyo_filetype - Get string representation of file type.
   *
   * @mode: Mode value for stat().
   *
   * Returns file type string.
   */
d179333f3   Al Viro   tomoyo_mini_stat:...
115
  static inline const char *tomoyo_filetype(const umode_t mode)
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
  {
  	switch (mode & S_IFMT) {
  	case S_IFREG:
  	case 0:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_FILE];
  	case S_IFDIR:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_DIRECTORY];
  	case S_IFLNK:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_SYMLINK];
  	case S_IFIFO:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_FIFO];
  	case S_IFSOCK:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_SOCKET];
  	case S_IFBLK:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_BLOCK_DEV];
  	case S_IFCHR:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_CHAR_DEV];
  	}
  	return "unknown"; /* This should not happen. */
  }
  
  /**
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
138
139
140
141
142
143
144
145
146
147
148
149
150
   * tomoyo_print_header - Get header line of audit log.
   *
   * @r: Pointer to "struct tomoyo_request_info".
   *
   * Returns string representation.
   *
   * This function uses kmalloc(), so caller must kfree() if this function
   * didn't return NULL.
   */
  static char *tomoyo_print_header(struct tomoyo_request_info *r)
  {
  	struct tomoyo_time stamp;
  	const pid_t gpid = task_pid_nr(current);
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
151
  	struct tomoyo_obj_info *obj = r->obj;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
152
153
  	static const int tomoyo_buffer_len = 4096;
  	char *buffer = kmalloc(tomoyo_buffer_len, GFP_NOFS);
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
154
  	int pos;
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
155
  	u8 i;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
156
157
158
159
160
161
162
  	if (!buffer)
  		return NULL;
  	{
  		struct timeval tv;
  		do_gettimeofday(&tv);
  		tomoyo_convert_time(tv.tv_sec, &stamp);
  	}
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
163
164
165
166
167
168
169
170
171
172
173
  	pos = snprintf(buffer, tomoyo_buffer_len - 1,
  		       "#%04u/%02u/%02u %02u:%02u:%02u# profile=%u mode=%s "
  		       "granted=%s (global-pid=%u) task={ pid=%u ppid=%u "
  		       "uid=%u gid=%u euid=%u egid=%u suid=%u sgid=%u "
  		       "fsuid=%u fsgid=%u }", stamp.year, stamp.month,
  		       stamp.day, stamp.hour, stamp.min, stamp.sec, r->profile,
  		       tomoyo_mode[r->mode], tomoyo_yesno(r->granted), gpid,
  		       tomoyo_sys_getpid(), tomoyo_sys_getppid(),
  		       current_uid(), current_gid(), current_euid(),
  		       current_egid(), current_suid(), current_sgid(),
  		       current_fsuid(), current_fsgid());
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
174
175
176
177
178
179
180
181
182
  	if (!obj)
  		goto no_obj_info;
  	if (!obj->validate_done) {
  		tomoyo_get_attributes(obj);
  		obj->validate_done = true;
  	}
  	for (i = 0; i < TOMOYO_MAX_PATH_STAT; i++) {
  		struct tomoyo_mini_stat *stat;
  		unsigned int dev;
d179333f3   Al Viro   tomoyo_mini_stat:...
183
  		umode_t mode;
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
  		if (!obj->stat_valid[i])
  			continue;
  		stat = &obj->stat[i];
  		dev = stat->dev;
  		mode = stat->mode;
  		if (i & 1) {
  			pos += snprintf(buffer + pos,
  					tomoyo_buffer_len - 1 - pos,
  					" path%u.parent={ uid=%u gid=%u "
  					"ino=%lu perm=0%o }", (i >> 1) + 1,
  					stat->uid, stat->gid, (unsigned long)
  					stat->ino, stat->mode & S_IALLUGO);
  			continue;
  		}
  		pos += snprintf(buffer + pos, tomoyo_buffer_len - 1 - pos,
  				" path%u={ uid=%u gid=%u ino=%lu major=%u"
  				" minor=%u perm=0%o type=%s", (i >> 1) + 1,
  				stat->uid, stat->gid, (unsigned long)
  				stat->ino, MAJOR(dev), MINOR(dev),
  				mode & S_IALLUGO, tomoyo_filetype(mode));
  		if (S_ISCHR(mode) || S_ISBLK(mode)) {
  			dev = stat->rdev;
  			pos += snprintf(buffer + pos,
  					tomoyo_buffer_len - 1 - pos,
  					" dev_major=%u dev_minor=%u",
  					MAJOR(dev), MINOR(dev));
  		}
  		pos += snprintf(buffer + pos, tomoyo_buffer_len - 1 - pos,
  				" }");
  	}
  no_obj_info:
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
215
216
217
218
  	if (pos < tomoyo_buffer_len - 1)
  		return buffer;
  	kfree(buffer);
  	return NULL;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
  }
  
  /**
   * tomoyo_init_log - Allocate buffer for audit logs.
   *
   * @r:    Pointer to "struct tomoyo_request_info".
   * @len:  Buffer size needed for @fmt and @args.
   * @fmt:  The printf()'s format string.
   * @args: va_list structure for @fmt.
   *
   * Returns pointer to allocated memory.
   *
   * This function uses kzalloc(), so caller must kfree() if this function
   * didn't return NULL.
   */
  char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
  		      va_list args)
  {
  	char *buf = NULL;
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
238
  	char *bprm_info = NULL;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
239
  	const char *header = NULL;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
240
241
  	char *realpath = NULL;
  	const char *symlink = NULL;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
242
  	int pos;
ea5048191   Tetsuo Handa   TOMOYO: Fix wrong...
243
  	const char *domainname = r->domain->domainname->name;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
244
245
246
247
248
249
  	header = tomoyo_print_header(r);
  	if (!header)
  		return NULL;
  	/* +10 is for '
  ' etc. and '\0'. */
  	len += strlen(domainname) + strlen(header) + 10;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
250
251
252
  	if (r->ee) {
  		struct file *file = r->ee->bprm->file;
  		realpath = tomoyo_realpath_from_path(&file->f_path);
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
253
254
  		bprm_info = tomoyo_print_bprm(r->ee->bprm, &r->ee->dump);
  		if (!realpath || !bprm_info)
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
255
  			goto out;
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
256
257
  		/* +80 is for " exec={ realpath=\"%s\" argc=%d envc=%d %s }" */
  		len += strlen(realpath) + 80 + strlen(bprm_info);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
258
259
260
261
262
  	} else if (r->obj && r->obj->symlink_target) {
  		symlink = r->obj->symlink_target->name;
  		/* +18 is for " symlink.target=\"%s\"" */
  		len += 18 + strlen(symlink);
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
263
264
265
266
267
268
  	len = tomoyo_round2(len);
  	buf = kzalloc(len, GFP_NOFS);
  	if (!buf)
  		goto out;
  	len--;
  	pos = snprintf(buf, len, "%s", header);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
269
  	if (realpath) {
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
270
  		struct linux_binprm *bprm = r->ee->bprm;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
271
  		pos += snprintf(buf + pos, len - pos,
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
272
273
  				" exec={ realpath=\"%s\" argc=%d envc=%d %s }",
  				realpath, bprm->argc, bprm->envc, bprm_info);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
274
275
276
  	} else if (symlink)
  		pos += snprintf(buf + pos, len - pos, " symlink.target=\"%s\"",
  				symlink);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
277
278
279
280
281
  	pos += snprintf(buf + pos, len - pos, "
  %s
  ", domainname);
  	vsnprintf(buf + pos, len - pos, fmt, args);
  out:
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
282
  	kfree(realpath);
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
283
  	kfree(bprm_info);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
  	kfree(header);
  	return buf;
  }
  
  /* Wait queue for /sys/kernel/security/tomoyo/audit. */
  static DECLARE_WAIT_QUEUE_HEAD(tomoyo_log_wait);
  
  /* Structure for audit log. */
  struct tomoyo_log {
  	struct list_head list;
  	char *log;
  	int size;
  };
  
  /* The list for "struct tomoyo_log". */
  static LIST_HEAD(tomoyo_log);
  
  /* Lock for "struct list_head tomoyo_log". */
  static DEFINE_SPINLOCK(tomoyo_log_lock);
  
  /* Length of "stuct list_head tomoyo_log". */
  static unsigned int tomoyo_log_count;
  
  /**
   * tomoyo_get_audit - Get audit mode.
   *
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
310
   * @ns:          Pointer to "struct tomoyo_policy_namespace".
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
311
312
313
314
315
316
   * @profile:     Profile number.
   * @index:       Index number of functionality.
   * @is_granted:  True if granted log, false otherwise.
   *
   * Returns true if this request should be audited, false otherwise.
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
317
318
  static bool tomoyo_get_audit(const struct tomoyo_policy_namespace *ns,
  			     const u8 profile, const u8 index,
1f067a682   Tetsuo Handa   TOMOYO: Allow con...
319
  			     const struct tomoyo_acl_info *matched_acl,
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
320
321
322
  			     const bool is_granted)
  {
  	u8 mode;
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
323
324
  	const u8 category = tomoyo_index2category[index] +
  		TOMOYO_MAX_MAC_INDEX;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
325
326
327
  	struct tomoyo_profile *p;
  	if (!tomoyo_policy_loaded)
  		return false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
328
  	p = tomoyo_profile(ns, profile);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
329
330
  	if (tomoyo_log_count >= p->pref[TOMOYO_PREF_MAX_AUDIT_LOG])
  		return false;
1f067a682   Tetsuo Handa   TOMOYO: Allow con...
331
332
333
  	if (is_granted && matched_acl && matched_acl->cond &&
  	    matched_acl->cond->grant_log != TOMOYO_GRANTLOG_AUTO)
  		return matched_acl->cond->grant_log == TOMOYO_GRANTLOG_YES;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
  	mode = p->config[index];
  	if (mode == TOMOYO_CONFIG_USE_DEFAULT)
  		mode = p->config[category];
  	if (mode == TOMOYO_CONFIG_USE_DEFAULT)
  		mode = p->default_config;
  	if (is_granted)
  		return mode & TOMOYO_CONFIG_WANT_GRANT_LOG;
  	return mode & TOMOYO_CONFIG_WANT_REJECT_LOG;
  }
  
  /**
   * tomoyo_write_log2 - Write an audit log.
   *
   * @r:    Pointer to "struct tomoyo_request_info".
   * @len:  Buffer size needed for @fmt and @args.
   * @fmt:  The printf()'s format string.
   * @args: va_list structure for @fmt.
   *
   * Returns nothing.
   */
  void tomoyo_write_log2(struct tomoyo_request_info *r, int len, const char *fmt,
  		       va_list args)
  {
  	char *buf;
  	struct tomoyo_log *entry;
  	bool quota_exceeded = false;
1f067a682   Tetsuo Handa   TOMOYO: Allow con...
360
361
  	if (!tomoyo_get_audit(r->domain->ns, r->profile, r->type,
  			      r->matched_acl, r->granted))
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
  		goto out;
  	buf = tomoyo_init_log(r, len, fmt, args);
  	if (!buf)
  		goto out;
  	entry = kzalloc(sizeof(*entry), GFP_NOFS);
  	if (!entry) {
  		kfree(buf);
  		goto out;
  	}
  	entry->log = buf;
  	len = tomoyo_round2(strlen(buf) + 1);
  	/*
  	 * The entry->size is used for memory quota checks.
  	 * Don't go beyond strlen(entry->log).
  	 */
  	entry->size = len + tomoyo_round2(sizeof(*entry));
  	spin_lock(&tomoyo_log_lock);
  	if (tomoyo_memory_quota[TOMOYO_MEMORY_AUDIT] &&
  	    tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] + entry->size >=
  	    tomoyo_memory_quota[TOMOYO_MEMORY_AUDIT]) {
  		quota_exceeded = true;
  	} else {
  		tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] += entry->size;
  		list_add_tail(&entry->list, &tomoyo_log);
  		tomoyo_log_count++;
  	}
  	spin_unlock(&tomoyo_log_lock);
  	if (quota_exceeded) {
  		kfree(buf);
  		kfree(entry);
  		goto out;
  	}
  	wake_up(&tomoyo_log_wait);
  out:
  	return;
  }
  
  /**
   * tomoyo_write_log - Write an audit log.
   *
   * @r:   Pointer to "struct tomoyo_request_info".
   * @fmt: The printf()'s format string, followed by parameters.
   *
   * Returns nothing.
   */
  void tomoyo_write_log(struct tomoyo_request_info *r, const char *fmt, ...)
  {
  	va_list args;
  	int len;
  	va_start(args, fmt);
  	len = vsnprintf((char *) &len, 1, fmt, args) + 1;
  	va_end(args);
  	va_start(args, fmt);
  	tomoyo_write_log2(r, len, fmt, args);
  	va_end(args);
  }
  
  /**
   * tomoyo_read_log - Read an audit log.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  void tomoyo_read_log(struct tomoyo_io_buffer *head)
  {
  	struct tomoyo_log *ptr = NULL;
  	if (head->r.w_pos)
  		return;
  	kfree(head->read_buf);
  	head->read_buf = NULL;
  	spin_lock(&tomoyo_log_lock);
  	if (!list_empty(&tomoyo_log)) {
  		ptr = list_entry(tomoyo_log.next, typeof(*ptr), list);
  		list_del(&ptr->list);
  		tomoyo_log_count--;
  		tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] -= ptr->size;
  	}
  	spin_unlock(&tomoyo_log_lock);
  	if (ptr) {
  		head->read_buf = ptr->log;
  		head->r.w[head->r.w_pos++] = head->read_buf;
  		kfree(ptr);
  	}
  }
  
  /**
   * tomoyo_poll_log - Wait for an audit log.
   *
   * @file: Pointer to "struct file".
   * @wait: Pointer to "poll_table".
   *
   * Returns POLLIN | POLLRDNORM when ready to read an audit log.
   */
  int tomoyo_poll_log(struct file *file, poll_table *wait)
  {
  	if (tomoyo_log_count)
  		return POLLIN | POLLRDNORM;
  	poll_wait(file, &tomoyo_log_wait, wait);
  	if (tomoyo_log_count)
  		return POLLIN | POLLRDNORM;
  	return 0;
  }