Received: by 2002:ac0:a874:0:0:0:0:0 with SMTP id c49csp680195ima; Fri, 15 Mar 2019 11:35:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqxreBg5Hr/EUkrjebbe7AxdatD0nA7bBc3EkTnhHkkzeKFP08VEa0+ulSkW2M2n3pLyEPBt X-Received: by 2002:a65:4843:: with SMTP id i3mr4870222pgs.176.1552674935897; Fri, 15 Mar 2019 11:35:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552674935; cv=none; d=google.com; s=arc-20160816; b=rGWs3dTu741selkaMY+UHkByNL95Uq87mSzk5NPcAHiiEELKRaRR1jLUwXk6GfvflJ /7AWN0lXRnOanVXAtnEHR88EUryTD1kbca6442/zFjousxn9zIjyofzaa45lAWqKHD1F TuXGzq9AF4CM+FQ6nj+HitO6nYeCgFqFo9igBiQPCuFgXUqZ6xqpvzNpUJll8BPTiYSH BmcODQnZHnqtvM2OpoNLw2+9OhobbaycXGPnPgtA5NlXjVV6kC1lAPvN/pVaUBLoRKCW OlMZZ0J7Lz2KAlzWixn0rQilAULRMcyfZOQ3Vrdp4zDfcYnFADKCKmHt5CVs37xST0LA m1cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=/WxzmI8wwq3VupE3xrLfBWQ6vIEbh9dxvb+nD0N8pbY=; b=xLwB508k+Wmj3vVZqfIqCy7ck2GYoymLxZ+OTiDv+p4eV0eUo94qEHNau/DC+LXp/Z 6cVbVi7i63DiXEcJ9I93Sn1yCOdQnF0uP48gUf0BB5lbIRdTKLASUO1dcPsvoblED0dJ a0iwZNaexKdUDC5Cspae60wv03xFUmwJ1/iTe5NwE2v1ogzlUVW6Wya5zohErQqumib2 /WTe1MgGcl7m552oOReyovbD38dH4dkbvRlNiGy1J1ASCEfiEUNcOTfm17ilqFHkwDgo 3nAeDPjs/8si2IjlUUbFhyKdokJ9rAf0qisfrmH+0deQr8dVs+177XIwX0nUfbdpSrQ2 GoPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k1si2561449pld.81.2019.03.15.11.35.21; Fri, 15 Mar 2019 11:35:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727048AbfCOSeX (ORCPT + 99 others); Fri, 15 Mar 2019 14:34:23 -0400 Received: from mx1.redhat.com ([209.132.183.28]:54358 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726213AbfCOSeW (ORCPT ); Fri, 15 Mar 2019 14:34:22 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 7378A300375B; Fri, 15 Mar 2019 18:34:21 +0000 (UTC) Received: from madcap2.tricolour.ca (ovpn-112-22.phx2.redhat.com [10.3.112.22]) by smtp.corp.redhat.com (Postfix) with ESMTP id 68D8F5C205; Fri, 15 Mar 2019 18:34:11 +0000 (UTC) From: Richard Guy Briggs To: containers@lists.linux-foundation.org, linux-api@vger.kernel.org, Linux-Audit Mailing List , linux-fsdevel@vger.kernel.org, LKML , netdev@vger.kernel.org, netfilter-devel@vger.kernel.org Cc: Paul Moore , sgrubb@redhat.com, omosnace@redhat.com, dhowells@redhat.com, simo@redhat.com, eparis@parisplace.org, serge@hallyn.com, ebiederm@xmission.com, nhorman@tuxdriver.com, Richard Guy Briggs Subject: [PATCH ghak90 V5 05/10] audit: add containerid support for ptrace and signals Date: Fri, 15 Mar 2019 14:29:53 -0400 Message-Id: In-Reply-To: References: In-Reply-To: References: X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.44]); Fri, 15 Mar 2019 18:34:21 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add audit container identifier support to ptrace and signals. In particular, the "ref" field provides a way to label the auxiliary record to which it is associated. Signed-off-by: Richard Guy Briggs Acked-by: Serge Hallyn Signed-off-by: Richard Guy Briggs --- include/linux/audit.h | 1 + kernel/audit.c | 2 ++ kernel/audit.h | 2 ++ kernel/auditsc.c | 23 +++++++++++++++++------ 4 files changed, 22 insertions(+), 6 deletions(-) diff --git a/include/linux/audit.h b/include/linux/audit.h index 43438192ca2a..ebd6625ca80e 100644 --- a/include/linux/audit.h +++ b/include/linux/audit.h @@ -35,6 +35,7 @@ struct audit_sig_info { uid_t uid; pid_t pid; char ctx[0]; + u64 cid; }; struct audit_buffer; diff --git a/kernel/audit.c b/kernel/audit.c index 8cc0e88d7f2a..cfa659b3f6c4 100644 --- a/kernel/audit.c +++ b/kernel/audit.c @@ -138,6 +138,7 @@ struct audit_net { kuid_t audit_sig_uid = INVALID_UID; pid_t audit_sig_pid = -1; u32 audit_sig_sid = 0; +u64 audit_sig_cid = AUDIT_CID_UNSET; /* Records can be lost in several ways: 0) [suppressed in audit_alloc] @@ -1515,6 +1516,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) memcpy(sig_data->ctx, ctx, len); security_release_secctx(ctx, len); } + sig_data->cid = audit_sig_cid; audit_send_reply(skb, seq, AUDIT_SIGNAL_INFO, 0, 0, sig_data, sizeof(*sig_data) + len); kfree(sig_data); diff --git a/kernel/audit.h b/kernel/audit.h index c00e2ee3c6b3..c5ac6436317e 100644 --- a/kernel/audit.h +++ b/kernel/audit.h @@ -148,6 +148,7 @@ struct audit_context { kuid_t target_uid; unsigned int target_sessionid; u32 target_sid; + u64 target_cid; char target_comm[TASK_COMM_LEN]; struct audit_tree_refs *trees, *first_trees; @@ -344,6 +345,7 @@ extern void audit_filter_inodes(struct task_struct *tsk, extern pid_t audit_sig_pid; extern kuid_t audit_sig_uid; extern u32 audit_sig_sid; +extern u64 audit_sig_cid; extern int audit_filter(int msgtype, unsigned int listtype); diff --git a/kernel/auditsc.c b/kernel/auditsc.c index a8c8b44b954d..f04e115df5dc 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c @@ -113,6 +113,7 @@ struct audit_aux_data_pids { kuid_t target_uid[AUDIT_AUX_PIDS]; unsigned int target_sessionid[AUDIT_AUX_PIDS]; u32 target_sid[AUDIT_AUX_PIDS]; + u64 target_cid[AUDIT_AUX_PIDS]; char target_comm[AUDIT_AUX_PIDS][TASK_COMM_LEN]; int pid_count; }; @@ -1514,7 +1515,7 @@ static void audit_log_exit(void) for (aux = context->aux_pids; aux; aux = aux->next) { struct audit_aux_data_pids *axs = (void *)aux; - for (i = 0; i < axs->pid_count; i++) + for (i = 0; i < axs->pid_count; i++) { if (audit_log_pid_context(context, axs->target_pid[i], axs->target_auid[i], axs->target_uid[i], @@ -1522,14 +1523,20 @@ static void audit_log_exit(void) axs->target_sid[i], axs->target_comm[i])) call_panic = 1; + audit_log_contid(context, axs->target_cid[i]); + } } - if (context->target_pid && - audit_log_pid_context(context, context->target_pid, - context->target_auid, context->target_uid, - context->target_sessionid, - context->target_sid, context->target_comm)) + if (context->target_pid) { + if (audit_log_pid_context(context, context->target_pid, + context->target_auid, + context->target_uid, + context->target_sessionid, + context->target_sid, + context->target_comm)) call_panic = 1; + audit_log_contid(context, context->target_cid); + } if (context->pwd.dentry && context->pwd.mnt) { ab = audit_log_start(context, GFP_KERNEL, AUDIT_CWD); @@ -2360,6 +2367,7 @@ void __audit_ptrace(struct task_struct *t) context->target_uid = task_uid(t); context->target_sessionid = audit_get_sessionid(t); security_task_getsecid(t, &context->target_sid); + context->target_cid = audit_get_contid(t); memcpy(context->target_comm, t->comm, TASK_COMM_LEN); } @@ -2387,6 +2395,7 @@ int audit_signal_info(int sig, struct task_struct *t) else audit_sig_uid = uid; security_task_getsecid(current, &audit_sig_sid); + audit_sig_cid = audit_get_contid(current); } if (!audit_signals || audit_dummy_context()) @@ -2400,6 +2409,7 @@ int audit_signal_info(int sig, struct task_struct *t) ctx->target_uid = t_uid; ctx->target_sessionid = audit_get_sessionid(t); security_task_getsecid(t, &ctx->target_sid); + ctx->target_cid = audit_get_contid(t); memcpy(ctx->target_comm, t->comm, TASK_COMM_LEN); return 0; } @@ -2421,6 +2431,7 @@ int audit_signal_info(int sig, struct task_struct *t) axp->target_uid[axp->pid_count] = t_uid; axp->target_sessionid[axp->pid_count] = audit_get_sessionid(t); security_task_getsecid(t, &axp->target_sid[axp->pid_count]); + axp->target_cid[axp->pid_count] = audit_get_contid(t); memcpy(axp->target_comm[axp->pid_count], t->comm, TASK_COMM_LEN); axp->pid_count++; -- 1.8.3.1