Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3358075imm; Fri, 20 Jul 2018 15:16:49 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdtP3j0obm+THaBAkm7CKkhfL2ArwWootf21yIsN3LiwQQ6vy+DrHBntS/6jq+6IgtQytdu X-Received: by 2002:a17:902:7888:: with SMTP id q8-v6mr3711854pll.79.1532125009373; Fri, 20 Jul 2018 15:16:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532125009; cv=none; d=google.com; s=arc-20160816; b=Twm90Fk8mSYxbZCIVjiPUcTVrSkXehCP8pXyVdht8bIwtI7ji6EVv+Gw0zK36Fu1f1 9NO9rBKM+/T5VDOxJf/d1bTfY9KxrsTtUu/qXBXvF0B84Y6uijnmUYgbHVBhuYq6Kc70 Pecs9u1ioiPkhL6EJ7CicP9Jkzw2myFM6FrPTa5DjdTn95TTeI7mbhdTY2BRbPnKArWS Z3Kr4Y6M2estVjP3Jet7gE0AY1F2kOM+hujj5c8PDoObcui/1pUBqRE7k5YnCNfpwp4M zMYi8x3PPGCxRhSGhDJuBNnA1L9nhsN7mpC1Qtn6DA2Ox4B+eqT4TJ9I+js2KB7vHATK yDuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=kzP1NsOac3dbG4Mpi2Mh71tJSHJT0SHO2mpMlmcXpw4=; b=yGTJX6rvcJr54obV90o1IIKZt4zIJ8g+MUR9HoPcAN38oRH4rFSf2YGTiJ2OgIt2mW CLFd9G6lA7nU7pGAGfFgyGmANGkt3gfh9cGCxCO/k5fjybme436pKdA0QD6XVf99iNXL fpZq0zAS/pX4xYO5Q4Zn7FjOmQi8HA/gUrQNzRxNXW59T+ozWi4e23MBPrvvDxt3Nrc7 Jbdz2eoOBR35Ne1uhR2mhzG0m4f9+JuH5HRyLJgCaBQcl5aNyWRzXD0/v080BeLvzwg6 4qMwXwVvO0wsfTpubZcTBrxLxM74hXWXCPyVl+xdG3ajxogwloT9JD8hIEDHd/XbDzbz uJrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b="Dygq/Tiv"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3-v6si2803601pgc.122.2018.07.20.15.16.34; Fri, 20 Jul 2018 15:16:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@paul-moore-com.20150623.gappssmtp.com header.s=20150623 header.b="Dygq/Tiv"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731798AbeGTXFB (ORCPT + 99 others); Fri, 20 Jul 2018 19:05:01 -0400 Received: from mail-lj1-f196.google.com ([209.85.208.196]:38633 "EHLO mail-lj1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728374AbeGTXFB (ORCPT ); Fri, 20 Jul 2018 19:05:01 -0400 Received: by mail-lj1-f196.google.com with SMTP id p6-v6so12264655ljc.5 for ; Fri, 20 Jul 2018 15:14:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=paul-moore-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=kzP1NsOac3dbG4Mpi2Mh71tJSHJT0SHO2mpMlmcXpw4=; b=Dygq/TivMF3IabmyXdCB0IWagj/4o0ifpkPCznMaR/haiVlKUzlEUP/mMtrBDyZg3R 3obc1AwIa9l7xUnf3bTIWn+Mk98QzEV/ttrEFza0rVz5ZKGLRpvzFlFIa0hJVFXbkHM/ BXqpkOVInSGvnp084QTGzW5u4RxO2nfRfoGzTWiG28CG3TPMDIWi04NNDUH/Zg+l7m89 k8RPsHglU3xl65PHPttsXOmIx5PnO+HeHyCRbscKYm77qsu3QBgL9V2As0VW+/d3r7y6 JuDIC6zV0zGt5gYM17zMCdBeajKdO/wBaQKIxwDQgD9FIcoZ3WIhIiDeNfj7u4ylTgWF PpIQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=kzP1NsOac3dbG4Mpi2Mh71tJSHJT0SHO2mpMlmcXpw4=; b=tIqbp5Y4A5hvQ8vlQoWaSA2Bvgp8D5DRSZjqYQHS1la2FuF0gGYwaERfokBW9iDceu m+2gLuhEUm+Fsaac4LuhkSOcFW5J3E+87Z395WMnjbHa6ssumxO2AN/VWK6Tnb9VOs0x mvdvGrl028Jk7vYsA96ymzUKvRhuSHlZpuZhgqb/q58TcpnF+koYGnPSV09Bcc4RdunK aROmiTu+uI5zzouysm9gSRwI/JJvmZbJWfxB7hRkS41wWoOHuUkjzkwfv+jcFTcbWcem MZJBpWfOrXtv8QqrS7ppXAzfTHAuWeCveNqFxZTxauZo5SlzIH2ZxX9I+jI0Yen5Uapx +6aw== X-Gm-Message-State: AOUpUlFTsUMub98t8KhHeYrErJUIXSXh2U+6vmkzfzxzCAXBxj+pJBfx 3mV0LZqe+rZF/oLju78A5XP8vGJ1EEMeD4fPWDC2 X-Received: by 2002:a2e:40c:: with SMTP id 12-v6mr2849192lje.146.1532124885200; Fri, 20 Jul 2018 15:14:45 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Paul Moore Date: Fri, 20 Jul 2018 18:14:34 -0400 Message-ID: Subject: Re: [RFC PATCH ghak90 (was ghak32) V3 06/10] audit: add containerid filtering To: rgb@redhat.com Cc: cgroups@vger.kernel.org, containers@lists.linux-foundation.org, linux-api@vger.kernel.org, linux-audit@redhat.com, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, ebiederm@xmission.com, luto@kernel.org, jlayton@redhat.com, carlos@redhat.com, dhowells@redhat.com, viro@zeniv.linux.org.uk, simo@redhat.com, Eric Paris , serge@hallyn.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 6, 2018 at 1:03 PM Richard Guy Briggs wrote: > Implement audit container identifier filtering using the AUDIT_CONTID > field name to send an 8-character string representing a u64 since the > value field is only u32. > > Sending it as two u32 was considered, but gathering and comparing two > fields was more complex. > > The feature indicator is AUDIT_FEATURE_BITMAP_CONTAINERID_FILTER. We've had some discussions about starting to be a bit more "stingy" with our feature bitmap fields, and normally I'm not sure I would want to burn one on a new filter (we should be able to fail safely here), but considering the significance of the audit container ID work I think it might be okay to burn a bit :) How about renaming this to just AUDIT_FEATURE_BITMAP_CONTAINERID? > See: https://github.com/linux-audit/audit-kernel/issues/91 > See: https://github.com/linux-audit/audit-userspace/issues/40 > See: https://github.com/linux-audit/audit-testsuite/issues/64 > See: https://github.com/linux-audit/audit-kernel/wiki/RFE-Audit-Container-ID > Signed-off-by: Richard Guy Briggs > --- > include/linux/audit.h | 1 + > include/uapi/linux/audit.h | 5 ++++- > kernel/audit.h | 1 + > kernel/auditfilter.c | 47 ++++++++++++++++++++++++++++++++++++++++++++++ > kernel/auditsc.c | 3 +++ > 5 files changed, 56 insertions(+), 1 deletion(-) > > diff --git a/include/linux/audit.h b/include/linux/audit.h > index f549121..1e37abf 100644 > --- a/include/linux/audit.h > +++ b/include/linux/audit.h > @@ -76,6 +76,7 @@ struct audit_field { > u32 type; > union { > u32 val; > + u64 val64; > kuid_t uid; > kgid_t gid; > struct { > diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h > index 469ab25..b440558 100644 > --- a/include/uapi/linux/audit.h > +++ b/include/uapi/linux/audit.h > @@ -262,6 +262,7 @@ > #define AUDIT_LOGINUID_SET 24 > #define AUDIT_SESSIONID 25 /* Session ID */ > #define AUDIT_FSTYPE 26 /* FileSystem Type */ > +#define AUDIT_CONTID 27 /* Container ID */ > > /* These are ONLY useful when checking > * at syscall exit time (AUDIT_AT_EXIT). */ > @@ -342,6 +343,7 @@ enum { > #define AUDIT_FEATURE_BITMAP_SESSIONID_FILTER 0x00000010 > #define AUDIT_FEATURE_BITMAP_LOST_RESET 0x00000020 > #define AUDIT_FEATURE_BITMAP_FILTER_FS 0x00000040 > +#define AUDIT_FEATURE_BITMAP_CONTAINERID_FILTER 0x00000080 > > #define AUDIT_FEATURE_BITMAP_ALL (AUDIT_FEATURE_BITMAP_BACKLOG_LIMIT | \ > AUDIT_FEATURE_BITMAP_BACKLOG_WAIT_TIME | \ > @@ -349,7 +351,8 @@ enum { > AUDIT_FEATURE_BITMAP_EXCLUDE_EXTEND | \ > AUDIT_FEATURE_BITMAP_SESSIONID_FILTER | \ > AUDIT_FEATURE_BITMAP_LOST_RESET | \ > - AUDIT_FEATURE_BITMAP_FILTER_FS) > + AUDIT_FEATURE_BITMAP_FILTER_FS | \ > + AUDIT_FEATURE_BITMAP_CONTAINERID_FILTER) > > /* deprecated: AUDIT_VERSION_* */ > #define AUDIT_VERSION_LATEST AUDIT_FEATURE_BITMAP_ALL > diff --git a/kernel/audit.h b/kernel/audit.h > index 1cf1c35..743d445 100644 > --- a/kernel/audit.h > +++ b/kernel/audit.h > @@ -235,6 +235,7 @@ static inline int audit_hash_ino(u32 ino) > > extern int audit_match_class(int class, unsigned syscall); > extern int audit_comparator(const u32 left, const u32 op, const u32 right); > +extern int audit_comparator64(const u64 left, const u32 op, const u64 right); > extern int audit_uid_comparator(kuid_t left, u32 op, kuid_t right); > extern int audit_gid_comparator(kgid_t left, u32 op, kgid_t right); > extern int parent_len(const char *path); > diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c > index eaa3201..a5f60ce 100644 > --- a/kernel/auditfilter.c > +++ b/kernel/auditfilter.c > @@ -410,6 +410,7 @@ static int audit_field_valid(struct audit_entry *entry, struct audit_field *f) > /* FALL THROUGH */ > case AUDIT_ARCH: > case AUDIT_FSTYPE: > + case AUDIT_CONTID: > if (f->op != Audit_not_equal && f->op != Audit_equal) > return -EINVAL; > break; > @@ -584,6 +585,14 @@ static struct audit_entry *audit_data_to_entry(struct audit_rule_data *data, > } > entry->rule.exe = audit_mark; > break; > + case AUDIT_CONTID: > + if (f->val != sizeof(u64)) > + goto exit_free; > + str = audit_unpack_string(&bufp, &remain, f->val); > + if (IS_ERR(str)) > + goto exit_free; > + f->val64 = ((u64 *)str)[0]; > + break; > } > } > > @@ -666,6 +675,11 @@ static struct audit_rule_data *audit_krule_to_data(struct audit_krule *krule) > data->buflen += data->values[i] = > audit_pack_string(&bufp, audit_mark_path(krule->exe)); > break; > + case AUDIT_CONTID: > + data->buflen += data->values[i] = sizeof(u64); > + for (i = 0; i < sizeof(u64); i++) > + ((char *)bufp)[i] = ((char *)&f->val64)[i]; > + break; > case AUDIT_LOGINUID_SET: > if (krule->pflags & AUDIT_LOGINUID_LEGACY && !f->val) { > data->fields[i] = AUDIT_LOGINUID; > @@ -752,6 +766,10 @@ static int audit_compare_rule(struct audit_krule *a, struct audit_krule *b) > if (!gid_eq(a->fields[i].gid, b->fields[i].gid)) > return 1; > break; > + case AUDIT_CONTID: > + if (a->fields[i].val64 != b->fields[i].val64) > + return 1; > + break; > default: > if (a->fields[i].val != b->fields[i].val) > return 1; > @@ -1208,6 +1226,31 @@ int audit_comparator(u32 left, u32 op, u32 right) > } > } > > +int audit_comparator64(u64 left, u32 op, u64 right) > +{ > + switch (op) { > + case Audit_equal: > + return (left == right); > + case Audit_not_equal: > + return (left != right); > + case Audit_lt: > + return (left < right); > + case Audit_le: > + return (left <= right); > + case Audit_gt: > + return (left > right); > + case Audit_ge: > + return (left >= right); > + case Audit_bitmask: > + return (left & right); > + case Audit_bittest: > + return ((left & right) == right); > + default: > + BUG(); > + return 0; > + } > +} > + > int audit_uid_comparator(kuid_t left, u32 op, kuid_t right) > { > switch (op) { > @@ -1346,6 +1389,10 @@ int audit_filter(int msgtype, unsigned int listtype) > result = audit_comparator(audit_loginuid_set(current), > f->op, f->val); > break; > + case AUDIT_CONTID: > + result = audit_comparator64(audit_get_contid(current), > + f->op, f->val64); > + break; > case AUDIT_MSGTYPE: > result = audit_comparator(msgtype, f->op, f->val); > break; > diff --git a/kernel/auditsc.c b/kernel/auditsc.c > index 81c9765..ea1ee35 100644 > --- a/kernel/auditsc.c > +++ b/kernel/auditsc.c > @@ -622,6 +622,9 @@ static int audit_filter_rules(struct task_struct *tsk, > case AUDIT_LOGINUID_SET: > result = audit_comparator(audit_loginuid_set(tsk), f->op, f->val); > break; > + case AUDIT_CONTID: > + result = audit_comparator64(audit_get_contid(tsk), f->op, f->val64); > + break; > case AUDIT_SUBJ_USER: > case AUDIT_SUBJ_ROLE: > case AUDIT_SUBJ_TYPE: > -- > 1.8.3.1 > > -- > Linux-audit mailing list > Linux-audit@redhat.com > https://www.redhat.com/mailman/listinfo/linux-audit -- paul moore www.paul-moore.com