Received: by 10.223.185.116 with SMTP id b49csp7826312wrg; Thu, 1 Mar 2018 11:48:45 -0800 (PST) X-Google-Smtp-Source: AG47ELsniODPrNj2r3G9wKtmEfFyDNgixuGrJZlwp9qLzrxWtnOQSU8q9dpSnESMDN9rr5Hn/xao X-Received: by 10.101.78.5 with SMTP id r5mr2435232pgt.33.1519933725657; Thu, 01 Mar 2018 11:48:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519933725; cv=none; d=google.com; s=arc-20160816; b=WsOIQe08fSvsR4Rc/C3CRnFSje9SlLKnoVkHM2UC3VomyhYAw9tpKU9tMUwdcLJw/F hn/nNg0QHEpUXFMlEmTbOW5VOPW/HhuebEPX8uQ7AZFD3YWw0dmJGVmBjbjfkserq0vr A5UscTxo6kXglNrYb3czju8nlLhkNob6o97yRhC6B8v0OEo7Ul5zBCL+yXzJl4mZJIhw YqR/TyY8jnfuYf9HC6x10cNdYDgqoRXqWvXcPVMqxkVJmwnKp68ak/LInHBXvhQI+qMD VKiav1HkaSIP2p0bXcVgsvLFvqdx31FMZB9LOoWCgnSm5OvC2doJSPsEP+c6cniQiA+h M7FA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=jiFOjbAH0nrvKOW+bjIC/sID/OvANAy+PfPHGhNt1b4=; b=ugH9uemywbhB+n6o8Rc6+EU4Yg+eZCxpwjbiyoEySxc1OTSHHjIMaEHj6Ir8CJ1D1A wcLdV18iAb4lTVoCh5ihhDpdKFnW662RsN3UzPReQmm3YvA94kUEMj6i/4i38EARyMke eQBwlwOTPQeDNJIybqP0+6mGde9h1rGQNFqkXbh89H1Zdn9EvUx42TQn6M4kXOgiA8cz tWXFjJrtprxhvxsxWr+SkSjrxUWvIqE31gq9Wy5bu17lJnA2MhmugnMw1Of2Wkg8SQ9Q MNbZmO/s1fR2Z+4cHtYCk9uD/g+Gr8sprFDAYN0FK4kRvPc7miidCfSplr5bDI5IOIaY B8Fw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w3si2844133pgb.258.2018.03.01.11.48.30; Thu, 01 Mar 2018 11:48:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1034220AbeCATrf (ORCPT + 99 others); Thu, 1 Mar 2018 14:47:35 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:46820 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1033812AbeCATrc (ORCPT ); Thu, 1 Mar 2018 14:47:32 -0500 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5BF418D6FC; Thu, 1 Mar 2018 19:47:31 +0000 (UTC) Received: from madcap2.tricolour.ca (ovpn-112-12.rdu2.redhat.com [10.10.112.12]) by smtp.corp.redhat.com (Postfix) with ESMTP id 3CCD99C070; Thu, 1 Mar 2018 19:47:20 +0000 (UTC) From: Richard Guy Briggs To: cgroups@vger.kernel.org, containers@lists.linux-foundation.org, linux-api@vger.kernel.org, Linux-Audit Mailing List , linux-fsdevel@vger.kernel.org, LKML , netdev@vger.kernel.org Cc: mszeredi@redhat.com, luto@kernel.org, jlayton@redhat.com, carlos@redhat.com, viro@zeniv.linux.org.uk, dhowells@redhat.com, simo@redhat.com, trondmy@primarydata.com, eparis@parisplace.org, serge@hallyn.com, ebiederm@xmission.com, madzcar@gmail.com, Richard Guy Briggs Subject: [RFC PATCH V1 12/12] debug! audit: add container id Date: Thu, 1 Mar 2018 14:41:15 -0500 Message-Id: In-Reply-To: References: In-Reply-To: References: X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.2]); Thu, 01 Mar 2018 19:47:31 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.2]); Thu, 01 Mar 2018 19:47:31 +0000 (UTC) for IP:'10.11.54.5' DOMAIN:'int-mx05.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'rgb@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Debugging code for verbose output to aid in development. --- fs/proc/base.c | 10 ++++++++++ kernel/auditsc.c | 16 ++++++++++++++++ 2 files changed, 26 insertions(+) diff --git a/fs/proc/base.c b/fs/proc/base.c index f66d1e2..63d1ca4 100644 --- a/fs/proc/base.c +++ b/fs/proc/base.c @@ -1309,9 +1309,13 @@ static ssize_t proc_containerid_read(struct file *file, char __user *buf, char tmpbuf[TMPBUFLEN*2]; if (!task) + { + pr_info("no inode owner"); return -ESRCH; + } length = scnprintf(tmpbuf, TMPBUFLEN*2, "%llu", audit_get_containerid(task)); put_task_struct(task); + pr_info("read: pid=%d opid=%d contid=%llu", pid_nr(task_tgid(current)), pid_nr(task_tgid(task)), audit_get_containerid(task)); return simple_read_from_buffer(buf, count, ppos, tmpbuf, length); } @@ -1324,14 +1328,19 @@ static ssize_t proc_containerid_write(struct file *file, const char __user *buf, struct task_struct *task = get_proc_task(inode); if (!task) + { + pr_info("no inode owner"); return -ESRCH; + } if (*ppos != 0) { /* No partial writes. */ put_task_struct(task); + pr_info("no partial writes"); return -EINVAL; } rv = kstrtou64_from_user(buf, count, 10, &containerid); + pr_info("write: pid=%d rv=%d count=%ld opid=%d contid=%llu", task_tgid_nr(current), rv, count, task_tgid_nr(task), containerid); if (rv < 0) { put_task_struct(task); return rv; @@ -1339,6 +1348,7 @@ static ssize_t proc_containerid_write(struct file *file, const char __user *buf, rv = audit_set_containerid(task, containerid); put_task_struct(task); + //pr_info("audit_set_containerid: rv=%d", rv); if (rv < 0) return rv; return count; diff --git a/kernel/auditsc.c b/kernel/auditsc.c index fcee34e..39e7dc10 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c @@ -2111,16 +2111,28 @@ static int audit_set_containerid_perm(struct task_struct *task, u64 containerid) /* Don't allow to set our own containerid */ if (current == task) + { + pr_info("pid=%d can't set own containerid", task_tgid_nr(task)); return -EPERM; + } /* Don't allow the containerid to be unset */ if (!cid_valid(containerid)) + { + pr_info("can't unset containerid"); return -EINVAL; + } /* if we don't have caps, reject */ if (!capable(CAP_AUDIT_CONTROL)) + { + pr_info("don't have CAP_AUDIT_CONTROL"); return -EPERM; + } /* if containerid is unset, allow */ if (!audit_containerid_set(task)) + { + //pr_info("unset, allow"); return 0; + } /* it is already set, and not inherited from the parent, reject */ ccontainerid = audit_get_containerid(task); rcu_read_lock(); @@ -2131,7 +2143,11 @@ static int audit_set_containerid_perm(struct task_struct *task, u64 containerid) ppid = task_tgid_nr(parent); task_unlock(parent); if (ccontainerid != pcontainerid) + { + pr_info("pid=%d already has contid=%llu set, not inherited from ppid=%d with contid=%llu, can't set containerid %llu", + task_tgid_nr(task), ccontainerid, ppid, pcontainerid, containerid); return -EPERM; + } return 0; } -- 1.8.3.1