Thomas Gleixner | b886d83c | 2019-06-01 10:08:55 +0200 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 2 | /* |
| 3 | * AppArmor security module |
| 4 | * |
| 5 | * This file contains AppArmor auditing functions |
| 6 | * |
| 7 | * Copyright (C) 1998-2008 Novell/SUSE |
| 8 | * Copyright 2009-2010 Canonical Ltd. |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 9 | */ |
| 10 | |
| 11 | #include <linux/audit.h> |
| 12 | #include <linux/socket.h> |
| 13 | |
| 14 | #include "include/apparmor.h" |
| 15 | #include "include/audit.h" |
| 16 | #include "include/policy.h" |
John Johansen | cff281f | 2017-01-16 00:42:15 -0800 | [diff] [blame] | 17 | #include "include/policy_ns.h" |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 18 | #include "include/secid.h" |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 19 | |
Jan Engelhardt | 2d4cee7 | 2012-03-14 13:30:36 +0100 | [diff] [blame] | 20 | const char *const audit_mode_names[] = { |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 21 | "normal", |
| 22 | "quiet_denied", |
| 23 | "quiet", |
| 24 | "noquiet", |
| 25 | "all" |
| 26 | }; |
| 27 | |
Jan Engelhardt | 2d4cee7 | 2012-03-14 13:30:36 +0100 | [diff] [blame] | 28 | static const char *const aa_audit_type[] = { |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 29 | "AUDIT", |
| 30 | "ALLOWED", |
| 31 | "DENIED", |
| 32 | "HINT", |
| 33 | "STATUS", |
| 34 | "ERROR", |
John Johansen | b492d50 | 2013-02-18 16:13:34 -0800 | [diff] [blame] | 35 | "KILLED", |
John Johansen | ade3ddc | 2012-02-22 00:20:26 -0800 | [diff] [blame] | 36 | "AUTO" |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 37 | }; |
| 38 | |
| 39 | /* |
| 40 | * Currently AppArmor auditing is fed straight into the audit framework. |
| 41 | * |
| 42 | * TODO: |
| 43 | * netlink interface for complain mode |
| 44 | * user auditing, - send user auditing to netlink interface |
| 45 | * system control of whether user audit messages go to system log |
| 46 | */ |
| 47 | |
| 48 | /** |
| 49 | * audit_base - core AppArmor function. |
| 50 | * @ab: audit buffer to fill (NOT NULL) |
| 51 | * @ca: audit structure containing data to audit (NOT NULL) |
| 52 | * |
| 53 | * Record common AppArmor audit data from @sa |
| 54 | */ |
| 55 | static void audit_pre(struct audit_buffer *ab, void *ca) |
| 56 | { |
| 57 | struct common_audit_data *sa = ca; |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 58 | |
| 59 | if (aa_g_audit_header) { |
| 60 | audit_log_format(ab, "apparmor="); |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 61 | audit_log_string(ab, aa_audit_type[aad(sa)->type]); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 62 | } |
| 63 | |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 64 | if (aad(sa)->op) { |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 65 | audit_log_format(ab, " operation="); |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 66 | audit_log_string(ab, aad(sa)->op); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 67 | } |
| 68 | |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 69 | if (aad(sa)->info) { |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 70 | audit_log_format(ab, " info="); |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 71 | audit_log_string(ab, aad(sa)->info); |
| 72 | if (aad(sa)->error) |
| 73 | audit_log_format(ab, " error=%d", aad(sa)->error); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 74 | } |
| 75 | |
John Johansen | 637f688 | 2017-06-09 08:14:28 -0700 | [diff] [blame] | 76 | if (aad(sa)->label) { |
| 77 | struct aa_label *label = aad(sa)->label; |
| 78 | |
| 79 | if (label_isprofile(label)) { |
| 80 | struct aa_profile *profile = labels_profile(label); |
| 81 | |
| 82 | if (profile->ns != root_ns) { |
| 83 | audit_log_format(ab, " namespace="); |
| 84 | audit_log_untrustedstring(ab, |
| 85 | profile->ns->base.hname); |
| 86 | } |
| 87 | audit_log_format(ab, " profile="); |
| 88 | audit_log_untrustedstring(ab, profile->base.hname); |
| 89 | } else { |
| 90 | audit_log_format(ab, " label="); |
| 91 | aa_label_xaudit(ab, root_ns, label, FLAG_VIEW_SUBNS, |
| 92 | GFP_ATOMIC); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 93 | } |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 94 | } |
| 95 | |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 96 | if (aad(sa)->name) { |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 97 | audit_log_format(ab, " name="); |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 98 | audit_log_untrustedstring(ab, aad(sa)->name); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 99 | } |
| 100 | } |
| 101 | |
| 102 | /** |
| 103 | * aa_audit_msg - Log a message to the audit subsystem |
| 104 | * @sa: audit event structure (NOT NULL) |
| 105 | * @cb: optional callback fn for type specific fields (MAYBE NULL) |
| 106 | */ |
| 107 | void aa_audit_msg(int type, struct common_audit_data *sa, |
| 108 | void (*cb) (struct audit_buffer *, void *)) |
| 109 | { |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 110 | aad(sa)->type = type; |
Linus Torvalds | b61c37f | 2012-04-02 15:48:12 -0700 | [diff] [blame] | 111 | common_lsm_audit(sa, audit_pre, cb); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 112 | } |
| 113 | |
| 114 | /** |
| 115 | * aa_audit - Log a profile based audit event to the audit subsystem |
| 116 | * @type: audit type for the message |
| 117 | * @profile: profile to check against (NOT NULL) |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 118 | * @sa: audit event (NOT NULL) |
| 119 | * @cb: optional callback fn for type specific fields (MAYBE NULL) |
| 120 | * |
| 121 | * Handle default message switching based off of audit mode flags |
| 122 | * |
| 123 | * Returns: error on failure |
| 124 | */ |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 125 | int aa_audit(int type, struct aa_profile *profile, struct common_audit_data *sa, |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 126 | void (*cb) (struct audit_buffer *, void *)) |
| 127 | { |
John Johansen | e6bfa25 | 2017-01-16 00:43:15 -0800 | [diff] [blame] | 128 | AA_BUG(!profile); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 129 | |
| 130 | if (type == AUDIT_APPARMOR_AUTO) { |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 131 | if (likely(!aad(sa)->error)) { |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 132 | if (AUDIT_MODE(profile) != AUDIT_ALL) |
| 133 | return 0; |
| 134 | type = AUDIT_APPARMOR_AUDIT; |
| 135 | } else if (COMPLAIN_MODE(profile)) |
| 136 | type = AUDIT_APPARMOR_ALLOWED; |
| 137 | else |
| 138 | type = AUDIT_APPARMOR_DENIED; |
| 139 | } |
| 140 | if (AUDIT_MODE(profile) == AUDIT_QUIET || |
| 141 | (type == AUDIT_APPARMOR_DENIED && |
| 142 | AUDIT_MODE(profile) == AUDIT_QUIET)) |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 143 | return aad(sa)->error; |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 144 | |
| 145 | if (KILL_MODE(profile) && type == AUDIT_APPARMOR_DENIED) |
| 146 | type = AUDIT_APPARMOR_KILL; |
| 147 | |
John Johansen | 637f688 | 2017-06-09 08:14:28 -0700 | [diff] [blame] | 148 | aad(sa)->label = &profile->label; |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 149 | |
| 150 | aa_audit_msg(type, sa, cb); |
| 151 | |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 152 | if (aad(sa)->type == AUDIT_APPARMOR_KILL) |
Eric Paris | 0972c74 | 2012-04-04 15:01:42 -0400 | [diff] [blame] | 153 | (void)send_sig_info(SIGKILL, NULL, |
John Johansen | b6b1b81 | 2014-06-08 11:20:54 -0700 | [diff] [blame] | 154 | sa->type == LSM_AUDIT_DATA_TASK && sa->u.tsk ? |
| 155 | sa->u.tsk : current); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 156 | |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 157 | if (aad(sa)->type == AUDIT_APPARMOR_ALLOWED) |
| 158 | return complain_error(aad(sa)->error); |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 159 | |
John Johansen | ef88a7a | 2017-01-16 00:43:02 -0800 | [diff] [blame] | 160 | return aad(sa)->error; |
John Johansen | 67012e8 | 2010-07-29 14:47:58 -0700 | [diff] [blame] | 161 | } |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 162 | |
| 163 | struct aa_audit_rule { |
John Johansen | 2ab47da | 2018-05-03 00:39:58 -0700 | [diff] [blame] | 164 | struct aa_label *label; |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 165 | }; |
| 166 | |
| 167 | void aa_audit_rule_free(void *vrule) |
| 168 | { |
| 169 | struct aa_audit_rule *rule = vrule; |
| 170 | |
| 171 | if (rule) { |
John Johansen | 2ab47da | 2018-05-03 00:39:58 -0700 | [diff] [blame] | 172 | if (!IS_ERR(rule->label)) |
| 173 | aa_put_label(rule->label); |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 174 | kfree(rule); |
| 175 | } |
| 176 | } |
| 177 | |
| 178 | int aa_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule) |
| 179 | { |
| 180 | struct aa_audit_rule *rule; |
| 181 | |
| 182 | switch (field) { |
| 183 | case AUDIT_SUBJ_ROLE: |
| 184 | if (op != Audit_equal && op != Audit_not_equal) |
| 185 | return -EINVAL; |
| 186 | break; |
| 187 | default: |
| 188 | return -EINVAL; |
| 189 | } |
| 190 | |
| 191 | rule = kzalloc(sizeof(struct aa_audit_rule), GFP_KERNEL); |
| 192 | |
| 193 | if (!rule) |
| 194 | return -ENOMEM; |
| 195 | |
John Johansen | 2ab47da | 2018-05-03 00:39:58 -0700 | [diff] [blame] | 196 | /* Currently rules are treated as coming from the root ns */ |
| 197 | rule->label = aa_label_parse(&root_ns->unconfined->label, rulestr, |
| 198 | GFP_KERNEL, true, false); |
Tyler Hicks | 52e8c38 | 2018-05-17 19:53:45 +0000 | [diff] [blame] | 199 | if (IS_ERR(rule->label)) { |
Navid Emamdoost | c54d481 | 2019-10-21 10:23:47 -0500 | [diff] [blame] | 200 | int err = PTR_ERR(rule->label); |
Tyler Hicks | 52e8c38 | 2018-05-17 19:53:45 +0000 | [diff] [blame] | 201 | aa_audit_rule_free(rule); |
Navid Emamdoost | c54d481 | 2019-10-21 10:23:47 -0500 | [diff] [blame] | 202 | return err; |
Tyler Hicks | 52e8c38 | 2018-05-17 19:53:45 +0000 | [diff] [blame] | 203 | } |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 204 | |
Tyler Hicks | 52e8c38 | 2018-05-17 19:53:45 +0000 | [diff] [blame] | 205 | *vrule = rule; |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 206 | return 0; |
| 207 | } |
| 208 | |
| 209 | int aa_audit_rule_known(struct audit_krule *rule) |
| 210 | { |
| 211 | int i; |
| 212 | |
| 213 | for (i = 0; i < rule->field_count; i++) { |
| 214 | struct audit_field *f = &rule->fields[i]; |
| 215 | |
| 216 | switch (f->type) { |
| 217 | case AUDIT_SUBJ_ROLE: |
| 218 | return 1; |
| 219 | } |
| 220 | } |
| 221 | |
| 222 | return 0; |
| 223 | } |
| 224 | |
Richard Guy Briggs | 90462a5 | 2019-01-31 11:52:11 -0500 | [diff] [blame] | 225 | int aa_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule) |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 226 | { |
| 227 | struct aa_audit_rule *rule = vrule; |
| 228 | struct aa_label *label; |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 229 | int found = 0; |
| 230 | |
| 231 | label = aa_secid_to_label(sid); |
| 232 | |
| 233 | if (!label) |
| 234 | return -ENOENT; |
| 235 | |
John Johansen | 2ab47da | 2018-05-03 00:39:58 -0700 | [diff] [blame] | 236 | if (aa_label_is_subset(label, rule->label)) |
| 237 | found = 1; |
Matthew Garrett | e79c26d | 2018-04-16 11:23:58 -0700 | [diff] [blame] | 238 | |
| 239 | switch (field) { |
| 240 | case AUDIT_SUBJ_ROLE: |
| 241 | switch (op) { |
| 242 | case Audit_equal: |
| 243 | return found; |
| 244 | case Audit_not_equal: |
| 245 | return !found; |
| 246 | } |
| 247 | } |
| 248 | return 0; |
| 249 | } |