auditfilter.c 33.8 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
/* auditfilter.c -- filtering of audit events
 *
 * Copyright 2003-2004 Red Hat, Inc.
 * Copyright 2005 Hewlett-Packard Development Company, L.P.
 * Copyright 2005 IBM Corporation
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 */

22 23
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt

24 25 26
#include <linux/kernel.h>
#include <linux/audit.h>
#include <linux/kthread.h>
A
Amy Griffis 已提交
27 28 29
#include <linux/mutex.h>
#include <linux/fs.h>
#include <linux/namei.h>
30
#include <linux/netlink.h>
A
Amy Griffis 已提交
31
#include <linux/sched.h>
32
#include <linux/slab.h>
33
#include <linux/security.h>
34
#include <net/net_namespace.h>
35
#include <net/sock.h>
36 37
#include "audit.h"

A
Amy Griffis 已提交
38 39 40 41 42 43 44
/*
 * Locking model:
 *
 * audit_filter_mutex:
 * 		Synchronizes writes and blocking reads of audit's filterlist
 * 		data.  Rcu is used to traverse the filterlist and access
 * 		contents of structs audit_entry, audit_watch and opaque
45
 * 		LSM rules during filtering.  If modified, these structures
A
Amy Griffis 已提交
46 47 48 49 50 51
 * 		must be copied and replace their counterparts in the filterlist.
 * 		An audit_parent struct is not accessed during filtering, so may
 * 		be written directly provided audit_filter_mutex is held.
 */

/* Audit filter lists, defined in <linux/audit.h> */
52 53 54 55 56 57 58 59 60 61 62
struct list_head audit_filter_list[AUDIT_NR_FILTERS] = {
	LIST_HEAD_INIT(audit_filter_list[0]),
	LIST_HEAD_INIT(audit_filter_list[1]),
	LIST_HEAD_INIT(audit_filter_list[2]),
	LIST_HEAD_INIT(audit_filter_list[3]),
	LIST_HEAD_INIT(audit_filter_list[4]),
	LIST_HEAD_INIT(audit_filter_list[5]),
#if AUDIT_NR_FILTERS != 6
#error Fix audit_filter_list initialiser
#endif
};
A
Al Viro 已提交
63 64 65 66 67 68 69 70
static struct list_head audit_rules_list[AUDIT_NR_FILTERS] = {
	LIST_HEAD_INIT(audit_rules_list[0]),
	LIST_HEAD_INIT(audit_rules_list[1]),
	LIST_HEAD_INIT(audit_rules_list[2]),
	LIST_HEAD_INIT(audit_rules_list[3]),
	LIST_HEAD_INIT(audit_rules_list[4]),
	LIST_HEAD_INIT(audit_rules_list[5]),
};
71

A
Al Viro 已提交
72
DEFINE_MUTEX(audit_filter_mutex);
A
Amy Griffis 已提交
73

74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91
static void audit_free_lsm_field(struct audit_field *f)
{
	switch (f->type) {
	case AUDIT_SUBJ_USER:
	case AUDIT_SUBJ_ROLE:
	case AUDIT_SUBJ_TYPE:
	case AUDIT_SUBJ_SEN:
	case AUDIT_SUBJ_CLR:
	case AUDIT_OBJ_USER:
	case AUDIT_OBJ_ROLE:
	case AUDIT_OBJ_TYPE:
	case AUDIT_OBJ_LEV_LOW:
	case AUDIT_OBJ_LEV_HIGH:
		kfree(f->lsm_str);
		security_audit_rule_free(f->lsm_rule);
	}
}

92
static inline void audit_free_rule(struct audit_entry *e)
93
{
94
	int i;
95
	struct audit_krule *erule = &e->rule;
96

A
Amy Griffis 已提交
97
	/* some rules don't have associated watches */
98 99 100
	if (erule->watch)
		audit_put_watch(erule->watch);
	if (erule->fields)
101 102
		for (i = 0; i < erule->field_count; i++)
			audit_free_lsm_field(&erule->fields[i]);
103 104
	kfree(erule->fields);
	kfree(erule->filterkey);
105 106 107
	kfree(e);
}

A
Al Viro 已提交
108
void audit_free_rule_rcu(struct rcu_head *head)
109 110 111 112 113
{
	struct audit_entry *e = container_of(head, struct audit_entry, rcu);
	audit_free_rule(e);
}

114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133
/* Initialize an audit filterlist entry. */
static inline struct audit_entry *audit_init_entry(u32 field_count)
{
	struct audit_entry *entry;
	struct audit_field *fields;

	entry = kzalloc(sizeof(*entry), GFP_KERNEL);
	if (unlikely(!entry))
		return NULL;

	fields = kzalloc(sizeof(*fields) * field_count, GFP_KERNEL);
	if (unlikely(!fields)) {
		kfree(entry);
		return NULL;
	}
	entry->rule.fields = fields;

	return entry;
}

134 135
/* Unpack a filter field's string representation from user-space
 * buffer. */
A
Al Viro 已提交
136
char *audit_unpack_string(void **bufp, size_t *remain, size_t len)
137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160
{
	char *str;

	if (!*bufp || (len == 0) || (len > *remain))
		return ERR_PTR(-EINVAL);

	/* Of the currently implemented string fields, PATH_MAX
	 * defines the longest valid length.
	 */
	if (len > PATH_MAX)
		return ERR_PTR(-ENAMETOOLONG);

	str = kmalloc(len + 1, GFP_KERNEL);
	if (unlikely(!str))
		return ERR_PTR(-ENOMEM);

	memcpy(str, *bufp, len);
	str[len] = 0;
	*bufp += len;
	*remain -= len;

	return str;
}

A
Amy Griffis 已提交
161 162 163 164 165
/* Translate an inode field to kernel respresentation. */
static inline int audit_to_inode(struct audit_krule *krule,
				 struct audit_field *f)
{
	if (krule->listnr != AUDIT_FILTER_EXIT ||
166
	    krule->inode_f || krule->watch || krule->tree ||
167
	    (f->op != Audit_equal && f->op != Audit_not_equal))
A
Amy Griffis 已提交
168 169 170 171 172 173
		return -EINVAL;

	krule->inode_f = f;
	return 0;
}

A
Al Viro 已提交
174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196
static __u32 *classes[AUDIT_SYSCALL_CLASSES];

int __init audit_register_class(int class, unsigned *list)
{
	__u32 *p = kzalloc(AUDIT_BITMASK_SIZE * sizeof(__u32), GFP_KERNEL);
	if (!p)
		return -ENOMEM;
	while (*list != ~0U) {
		unsigned n = *list++;
		if (n >= AUDIT_BITMASK_SIZE * 32 - AUDIT_SYSCALL_CLASSES) {
			kfree(p);
			return -EINVAL;
		}
		p[AUDIT_WORD(n)] |= AUDIT_BIT(n);
	}
	if (class >= AUDIT_SYSCALL_CLASSES || classes[class]) {
		kfree(p);
		return -EINVAL;
	}
	classes[class] = p;
	return 0;
}

A
Al Viro 已提交
197 198
int audit_match_class(int class, unsigned syscall)
{
199
	if (unlikely(syscall >= AUDIT_BITMASK_SIZE * 32))
A
Al Viro 已提交
200 201 202 203 204 205
		return 0;
	if (unlikely(class >= AUDIT_SYSCALL_CLASSES || !classes[class]))
		return 0;
	return classes[class][AUDIT_WORD(syscall)] & AUDIT_BIT(syscall);
}

206
#ifdef CONFIG_AUDITSYSCALL
A
Amy Griffis 已提交
207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242
static inline int audit_match_class_bits(int class, u32 *mask)
{
	int i;

	if (classes[class]) {
		for (i = 0; i < AUDIT_BITMASK_SIZE; i++)
			if (mask[i] & classes[class][i])
				return 0;
	}
	return 1;
}

static int audit_match_signal(struct audit_entry *entry)
{
	struct audit_field *arch = entry->rule.arch_f;

	if (!arch) {
		/* When arch is unspecified, we must check both masks on biarch
		 * as syscall number alone is ambiguous. */
		return (audit_match_class_bits(AUDIT_CLASS_SIGNAL,
					       entry->rule.mask) &&
			audit_match_class_bits(AUDIT_CLASS_SIGNAL_32,
					       entry->rule.mask));
	}

	switch(audit_classify_arch(arch->val)) {
	case 0: /* native */
		return (audit_match_class_bits(AUDIT_CLASS_SIGNAL,
					       entry->rule.mask));
	case 1: /* 32bit on biarch */
		return (audit_match_class_bits(AUDIT_CLASS_SIGNAL_32,
					       entry->rule.mask));
	default:
		return 1;
	}
}
243
#endif
A
Amy Griffis 已提交
244

245
/* Common user-space to kernel rule translation. */
246
static inline struct audit_entry *audit_to_entry_common(struct audit_rule_data *rule)
247 248 249 250 251 252 253 254 255 256 257 258
{
	unsigned listnr;
	struct audit_entry *entry;
	int i, err;

	err = -EINVAL;
	listnr = rule->flags & ~AUDIT_FILTER_PREPEND;
	switch(listnr) {
	default:
		goto exit_err;
#ifdef CONFIG_AUDITSYSCALL
	case AUDIT_FILTER_ENTRY:
E
Eric Paris 已提交
259 260
		if (rule->action == AUDIT_ALWAYS)
			goto exit_err;
261 262 263
	case AUDIT_FILTER_EXIT:
	case AUDIT_FILTER_TASK:
#endif
E
Eric Paris 已提交
264 265
	case AUDIT_FILTER_USER:
	case AUDIT_FILTER_TYPE:
266 267
		;
	}
A
Al Viro 已提交
268
	if (unlikely(rule->action == AUDIT_POSSIBLE)) {
269
		pr_err("AUDIT_POSSIBLE is deprecated\n");
A
Al Viro 已提交
270 271 272
		goto exit_err;
	}
	if (rule->action != AUDIT_NEVER && rule->action != AUDIT_ALWAYS)
273 274 275 276 277
		goto exit_err;
	if (rule->field_count > AUDIT_MAX_FIELDS)
		goto exit_err;

	err = -ENOMEM;
278 279
	entry = audit_init_entry(rule->field_count);
	if (!entry)
280 281 282 283 284 285 286 287 288 289
		goto exit_err;

	entry->rule.flags = rule->flags & AUDIT_FILTER_PREPEND;
	entry->rule.listnr = listnr;
	entry->rule.action = rule->action;
	entry->rule.field_count = rule->field_count;

	for (i = 0; i < AUDIT_BITMASK_SIZE; i++)
		entry->rule.mask[i] = rule->mask[i];

A
Al Viro 已提交
290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305
	for (i = 0; i < AUDIT_SYSCALL_CLASSES; i++) {
		int bit = AUDIT_BITMASK_SIZE * 32 - i - 1;
		__u32 *p = &entry->rule.mask[AUDIT_WORD(bit)];
		__u32 *class;

		if (!(*p & AUDIT_BIT(bit)))
			continue;
		*p &= ~AUDIT_BIT(bit);
		class = classes[i];
		if (class) {
			int j;
			for (j = 0; j < AUDIT_BITMASK_SIZE; j++)
				entry->rule.mask[j] |= class[j];
		}
	}

306 307 308 309 310 311
	return entry;

exit_err:
	return ERR_PTR(err);
}

312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331
static u32 audit_ops[] =
{
	[Audit_equal] = AUDIT_EQUAL,
	[Audit_not_equal] = AUDIT_NOT_EQUAL,
	[Audit_bitmask] = AUDIT_BIT_MASK,
	[Audit_bittest] = AUDIT_BIT_TEST,
	[Audit_lt] = AUDIT_LESS_THAN,
	[Audit_gt] = AUDIT_GREATER_THAN,
	[Audit_le] = AUDIT_LESS_THAN_OR_EQUAL,
	[Audit_ge] = AUDIT_GREATER_THAN_OR_EQUAL,
};

static u32 audit_to_op(u32 op)
{
	u32 n;
	for (n = Audit_equal; n < Audit_bad && audit_ops[n] != op; n++)
		;
	return n;
}

332
/* check if an audit field is valid */
333
static int audit_field_valid(struct audit_entry *entry, struct audit_field *f)
334
{
335 336 337 338 339 340 341
	switch(f->type) {
	case AUDIT_MSGTYPE:
		if (entry->rule.listnr != AUDIT_FILTER_TYPE &&
		    entry->rule.listnr != AUDIT_FILTER_USER)
			return -EINVAL;
		break;
	};
342

343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364
	switch(f->type) {
	default:
		return -EINVAL;
	case AUDIT_UID:
	case AUDIT_EUID:
	case AUDIT_SUID:
	case AUDIT_FSUID:
	case AUDIT_LOGINUID:
	case AUDIT_OBJ_UID:
	case AUDIT_GID:
	case AUDIT_EGID:
	case AUDIT_SGID:
	case AUDIT_FSGID:
	case AUDIT_OBJ_GID:
	case AUDIT_PID:
	case AUDIT_PERS:
	case AUDIT_MSGTYPE:
	case AUDIT_PPID:
	case AUDIT_DEVMAJOR:
	case AUDIT_DEVMINOR:
	case AUDIT_EXIT:
	case AUDIT_SUCCESS:
365
	case AUDIT_INODE:
366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387
		/* bit ops are only useful on syscall args */
		if (f->op == Audit_bitmask || f->op == Audit_bittest)
			return -EINVAL;
		break;
	case AUDIT_ARG0:
	case AUDIT_ARG1:
	case AUDIT_ARG2:
	case AUDIT_ARG3:
	case AUDIT_SUBJ_USER:
	case AUDIT_SUBJ_ROLE:
	case AUDIT_SUBJ_TYPE:
	case AUDIT_SUBJ_SEN:
	case AUDIT_SUBJ_CLR:
	case AUDIT_OBJ_USER:
	case AUDIT_OBJ_ROLE:
	case AUDIT_OBJ_TYPE:
	case AUDIT_OBJ_LEV_LOW:
	case AUDIT_OBJ_LEV_HIGH:
	case AUDIT_WATCH:
	case AUDIT_DIR:
	case AUDIT_FILTERKEY:
		break;
388 389 390 391
	case AUDIT_LOGINUID_SET:
		if ((f->val != 0) && (f->val != 1))
			return -EINVAL;
	/* FALL THROUGH */
392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408
	case AUDIT_ARCH:
		if (f->op != Audit_not_equal && f->op != Audit_equal)
			return -EINVAL;
		break;
	case AUDIT_PERM:
		if (f->val & ~15)
			return -EINVAL;
		break;
	case AUDIT_FILETYPE:
		if (f->val & ~S_IFMT)
			return -EINVAL;
		break;
	case AUDIT_FIELD_COMPARE:
		if (f->val > AUDIT_MAX_FIELD_COMPARE)
			return -EINVAL;
		break;
	};
409
	return 0;
410 411
}

412 413 414
/* Translate struct audit_rule_data to kernel's rule respresentation. */
static struct audit_entry *audit_data_to_entry(struct audit_rule_data *data,
					       size_t datasz)
415
{
416 417 418
	int err = 0;
	struct audit_entry *entry;
	void *bufp;
419
	size_t remain = datasz - sizeof(struct audit_rule_data);
420
	int i;
421
	char *str;
422

423
	entry = audit_to_entry_common(data);
424 425
	if (IS_ERR(entry))
		goto exit_nofree;
426

427 428 429 430 431 432
	bufp = data->buf;
	entry->rule.vers_ops = 2;
	for (i = 0; i < data->field_count; i++) {
		struct audit_field *f = &entry->rule.fields[i];

		err = -EINVAL;
433 434 435

		f->op = audit_to_op(data->fieldflags[i]);
		if (f->op == Audit_bad)
436 437 438
			goto exit_free;

		f->type = data->fields[i];
439
		f->val = data->values[i];
440

441
		/* Support legacy tests for a valid loginuid */
442
		if ((f->type == AUDIT_LOGINUID) && (f->val == AUDIT_UID_UNSET)) {
443 444 445 446
			f->type = AUDIT_LOGINUID_SET;
			f->val = 0;
		}

447 448 449 450 451 452 453 454 455 456 457 458 459
		if ((f->type == AUDIT_PID) || (f->type == AUDIT_PPID)) {
			struct pid *pid;
			rcu_read_lock();
			pid = find_vpid(f->val);
			if (!pid) {
				rcu_read_unlock();
				err = -ESRCH;
				goto exit_free;
			}
			f->val = pid_nr(pid);
			rcu_read_unlock();
		}

460 461 462 463 464
		err = audit_field_valid(entry, f);
		if (err)
			goto exit_free;

		err = -EINVAL;
465
		switch (f->type) {
466
		case AUDIT_LOGINUID:
A
Al Viro 已提交
467 468 469 470
		case AUDIT_UID:
		case AUDIT_EUID:
		case AUDIT_SUID:
		case AUDIT_FSUID:
471 472 473 474 475
		case AUDIT_OBJ_UID:
			f->uid = make_kuid(current_user_ns(), f->val);
			if (!uid_valid(f->uid))
				goto exit_free;
			break;
A
Al Viro 已提交
476 477 478 479
		case AUDIT_GID:
		case AUDIT_EGID:
		case AUDIT_SGID:
		case AUDIT_FSGID:
480 481 482 483 484
		case AUDIT_OBJ_GID:
			f->gid = make_kgid(current_user_ns(), f->val);
			if (!gid_valid(f->gid))
				goto exit_free;
			break;
A
Amy Griffis 已提交
485 486 487
		case AUDIT_ARCH:
			entry->rule.arch_f = f;
			break;
488 489 490 491 492
		case AUDIT_SUBJ_USER:
		case AUDIT_SUBJ_ROLE:
		case AUDIT_SUBJ_TYPE:
		case AUDIT_SUBJ_SEN:
		case AUDIT_SUBJ_CLR:
493 494 495 496 497
		case AUDIT_OBJ_USER:
		case AUDIT_OBJ_ROLE:
		case AUDIT_OBJ_TYPE:
		case AUDIT_OBJ_LEV_LOW:
		case AUDIT_OBJ_LEV_HIGH:
498 499 500 501 502
			str = audit_unpack_string(&bufp, &remain, f->val);
			if (IS_ERR(str))
				goto exit_free;
			entry->rule.buflen += f->val;

503
			err = security_audit_rule_init(f->type, f->op, str,
504
						       (void **)&f->lsm_rule);
505 506 507
			/* Keep currently invalid fields around in case they
			 * become valid after a policy reload. */
			if (err == -EINVAL) {
508 509
				pr_warn("audit rule for LSM \'%s\' is invalid\n",
					str);
510 511 512 513 514 515
				err = 0;
			}
			if (err) {
				kfree(str);
				goto exit_free;
			} else
516
				f->lsm_str = str;
517
			break;
A
Amy Griffis 已提交
518 519 520 521 522 523 524 525 526 527 528 529
		case AUDIT_WATCH:
			str = audit_unpack_string(&bufp, &remain, f->val);
			if (IS_ERR(str))
				goto exit_free;
			entry->rule.buflen += f->val;

			err = audit_to_watch(&entry->rule, str, f->val, f->op);
			if (err) {
				kfree(str);
				goto exit_free;
			}
			break;
A
Al Viro 已提交
530 531 532 533 534 535 536 537 538 539 540
		case AUDIT_DIR:
			str = audit_unpack_string(&bufp, &remain, f->val);
			if (IS_ERR(str))
				goto exit_free;
			entry->rule.buflen += f->val;

			err = audit_make_tree(&entry->rule, str, f->op);
			kfree(str);
			if (err)
				goto exit_free;
			break;
A
Amy Griffis 已提交
541 542 543 544 545
		case AUDIT_INODE:
			err = audit_to_inode(&entry->rule, f);
			if (err)
				goto exit_free;
			break;
A
Amy Griffis 已提交
546 547 548 549 550 551 552 553 554
		case AUDIT_FILTERKEY:
			if (entry->rule.filterkey || f->val > AUDIT_MAX_KEY_LEN)
				goto exit_free;
			str = audit_unpack_string(&bufp, &remain, f->val);
			if (IS_ERR(str))
				goto exit_free;
			entry->rule.buflen += f->val;
			entry->rule.filterkey = str;
			break;
A
Amy Griffis 已提交
555 556 557
		}
	}

558 559
	if (entry->rule.inode_f && entry->rule.inode_f->op == Audit_not_equal)
		entry->rule.inode_f = NULL;
560 561 562 563 564

exit_nofree:
	return entry;

exit_free:
565 566 567 568
	if (entry->rule.watch)
		audit_put_watch(entry->rule.watch); /* matches initial get */
	if (entry->rule.tree)
		audit_put_tree(entry->rule.tree); /* that's the temporary one */
569 570 571 572 573
	audit_free_rule(entry);
	return ERR_PTR(err);
}

/* Pack a filter field's string representation into data block. */
A
Al Viro 已提交
574
static inline size_t audit_pack_string(void **bufp, const char *str)
575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592
{
	size_t len = strlen(str);

	memcpy(*bufp, str, len);
	*bufp += len;

	return len;
}

/* Translate kernel rule respresentation to struct audit_rule_data. */
static struct audit_rule_data *audit_krule_to_data(struct audit_krule *krule)
{
	struct audit_rule_data *data;
	void *bufp;
	int i;

	data = kmalloc(sizeof(*data) + krule->buflen, GFP_KERNEL);
	if (unlikely(!data))
593
		return NULL;
594 595 596 597 598 599 600 601 602 603
	memset(data, 0, sizeof(*data));

	data->flags = krule->flags | krule->listnr;
	data->action = krule->action;
	data->field_count = krule->field_count;
	bufp = data->buf;
	for (i = 0; i < data->field_count; i++) {
		struct audit_field *f = &krule->fields[i];

		data->fields[i] = f->type;
604
		data->fieldflags[i] = audit_ops[f->op];
605
		switch(f->type) {
606 607 608 609 610
		case AUDIT_SUBJ_USER:
		case AUDIT_SUBJ_ROLE:
		case AUDIT_SUBJ_TYPE:
		case AUDIT_SUBJ_SEN:
		case AUDIT_SUBJ_CLR:
611 612 613 614 615
		case AUDIT_OBJ_USER:
		case AUDIT_OBJ_ROLE:
		case AUDIT_OBJ_TYPE:
		case AUDIT_OBJ_LEV_LOW:
		case AUDIT_OBJ_LEV_HIGH:
616
			data->buflen += data->values[i] =
617
				audit_pack_string(&bufp, f->lsm_str);
618
			break;
A
Amy Griffis 已提交
619 620
		case AUDIT_WATCH:
			data->buflen += data->values[i] =
621 622
				audit_pack_string(&bufp,
						  audit_watch_path(krule->watch));
A
Amy Griffis 已提交
623
			break;
A
Al Viro 已提交
624 625 626 627 628
		case AUDIT_DIR:
			data->buflen += data->values[i] =
				audit_pack_string(&bufp,
						  audit_tree_path(krule->tree));
			break;
A
Amy Griffis 已提交
629 630 631 632
		case AUDIT_FILTERKEY:
			data->buflen += data->values[i] =
				audit_pack_string(&bufp, krule->filterkey);
			break;
633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651
		default:
			data->values[i] = f->val;
		}
	}
	for (i = 0; i < AUDIT_BITMASK_SIZE; i++) data->mask[i] = krule->mask[i];

	return data;
}

/* Compare two rules in kernel format.  Considered success if rules
 * don't match. */
static int audit_compare_rule(struct audit_krule *a, struct audit_krule *b)
{
	int i;

	if (a->flags != b->flags ||
	    a->listnr != b->listnr ||
	    a->action != b->action ||
	    a->field_count != b->field_count)
652 653 654
		return 1;

	for (i = 0; i < a->field_count; i++) {
655 656
		if (a->fields[i].type != b->fields[i].type ||
		    a->fields[i].op != b->fields[i].op)
657
			return 1;
658 659

		switch(a->fields[i].type) {
660 661 662 663 664
		case AUDIT_SUBJ_USER:
		case AUDIT_SUBJ_ROLE:
		case AUDIT_SUBJ_TYPE:
		case AUDIT_SUBJ_SEN:
		case AUDIT_SUBJ_CLR:
665 666 667 668 669
		case AUDIT_OBJ_USER:
		case AUDIT_OBJ_ROLE:
		case AUDIT_OBJ_TYPE:
		case AUDIT_OBJ_LEV_LOW:
		case AUDIT_OBJ_LEV_HIGH:
670
			if (strcmp(a->fields[i].lsm_str, b->fields[i].lsm_str))
671 672
				return 1;
			break;
A
Amy Griffis 已提交
673
		case AUDIT_WATCH:
674 675
			if (strcmp(audit_watch_path(a->watch),
				   audit_watch_path(b->watch)))
A
Amy Griffis 已提交
676 677
				return 1;
			break;
A
Al Viro 已提交
678 679 680 681 682
		case AUDIT_DIR:
			if (strcmp(audit_tree_path(a->tree),
				   audit_tree_path(b->tree)))
				return 1;
			break;
A
Amy Griffis 已提交
683 684 685 686 687
		case AUDIT_FILTERKEY:
			/* both filterkeys exist based on above type compare */
			if (strcmp(a->filterkey, b->filterkey))
				return 1;
			break;
688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704
		case AUDIT_UID:
		case AUDIT_EUID:
		case AUDIT_SUID:
		case AUDIT_FSUID:
		case AUDIT_LOGINUID:
		case AUDIT_OBJ_UID:
			if (!uid_eq(a->fields[i].uid, b->fields[i].uid))
				return 1;
			break;
		case AUDIT_GID:
		case AUDIT_EGID:
		case AUDIT_SGID:
		case AUDIT_FSGID:
		case AUDIT_OBJ_GID:
			if (!gid_eq(a->fields[i].gid, b->fields[i].gid))
				return 1;
			break;
705 706 707 708
		default:
			if (a->fields[i].val != b->fields[i].val)
				return 1;
		}
709 710 711 712 713 714 715 716 717
	}

	for (i = 0; i < AUDIT_BITMASK_SIZE; i++)
		if (a->mask[i] != b->mask[i])
			return 1;

	return 0;
}

718
/* Duplicate LSM field information.  The lsm_rule is opaque, so must be
719
 * re-initialized. */
720
static inline int audit_dupe_lsm_field(struct audit_field *df,
721 722 723
					   struct audit_field *sf)
{
	int ret = 0;
724
	char *lsm_str;
725

726 727 728
	/* our own copy of lsm_str */
	lsm_str = kstrdup(sf->lsm_str, GFP_KERNEL);
	if (unlikely(!lsm_str))
729
		return -ENOMEM;
730
	df->lsm_str = lsm_str;
731

732 733 734
	/* our own (refreshed) copy of lsm_rule */
	ret = security_audit_rule_init(df->type, df->op, df->lsm_str,
				       (void **)&df->lsm_rule);
735 736 737
	/* Keep currently invalid fields around in case they
	 * become valid after a policy reload. */
	if (ret == -EINVAL) {
738 739
		pr_warn("audit rule for LSM \'%s\' is invalid\n",
			df->lsm_str);
740 741 742 743 744 745 746
		ret = 0;
	}

	return ret;
}

/* Duplicate an audit rule.  This will be a deep copy with the exception
747
 * of the watch - that pointer is carried over.  The LSM specific fields
748
 * will be updated in the copy.  The point is to be able to replace the old
A
Amy Griffis 已提交
749 750 751
 * rule with the new rule in the filterlist, then free the old rule.
 * The rlist element is undefined; list manipulations are handled apart from
 * the initial copy. */
752
struct audit_entry *audit_dupe_rule(struct audit_krule *old)
753 754 755 756
{
	u32 fcount = old->field_count;
	struct audit_entry *entry;
	struct audit_krule *new;
A
Amy Griffis 已提交
757
	char *fk;
758 759 760 761 762 763 764 765 766 767 768 769 770
	int i, err = 0;

	entry = audit_init_entry(fcount);
	if (unlikely(!entry))
		return ERR_PTR(-ENOMEM);

	new = &entry->rule;
	new->vers_ops = old->vers_ops;
	new->flags = old->flags;
	new->listnr = old->listnr;
	new->action = old->action;
	for (i = 0; i < AUDIT_BITMASK_SIZE; i++)
		new->mask[i] = old->mask[i];
771
	new->prio = old->prio;
772
	new->buflen = old->buflen;
A
Amy Griffis 已提交
773
	new->inode_f = old->inode_f;
774
	new->field_count = old->field_count;
775

A
Al Viro 已提交
776 777 778 779 780 781 782 783
	/*
	 * note that we are OK with not refcounting here; audit_match_tree()
	 * never dereferences tree and we can't get false positives there
	 * since we'd have to have rule gone from the list *and* removed
	 * before the chunks found by lookup had been allocated, i.e. before
	 * the beginning of list scan.
	 */
	new->tree = old->tree;
784 785
	memcpy(new->fields, old->fields, sizeof(struct audit_field) * fcount);

786
	/* deep copy this information, updating the lsm_rule fields, because
787 788 789
	 * the originals will all be freed when the old rule is freed. */
	for (i = 0; i < fcount; i++) {
		switch (new->fields[i].type) {
790 791 792 793 794
		case AUDIT_SUBJ_USER:
		case AUDIT_SUBJ_ROLE:
		case AUDIT_SUBJ_TYPE:
		case AUDIT_SUBJ_SEN:
		case AUDIT_SUBJ_CLR:
795 796 797 798 799
		case AUDIT_OBJ_USER:
		case AUDIT_OBJ_ROLE:
		case AUDIT_OBJ_TYPE:
		case AUDIT_OBJ_LEV_LOW:
		case AUDIT_OBJ_LEV_HIGH:
800
			err = audit_dupe_lsm_field(&new->fields[i],
801
						       &old->fields[i]);
A
Amy Griffis 已提交
802 803 804 805 806 807 808
			break;
		case AUDIT_FILTERKEY:
			fk = kstrdup(old->filterkey, GFP_KERNEL);
			if (unlikely(!fk))
				err = -ENOMEM;
			else
				new->filterkey = fk;
809 810 811 812 813 814 815
		}
		if (err) {
			audit_free_rule(entry);
			return ERR_PTR(err);
		}
	}

816 817 818
	if (old->watch) {
		audit_get_watch(old->watch);
		new->watch = old->watch;
A
Amy Griffis 已提交
819 820
	}

821 822 823
	return entry;
}

A
Amy Griffis 已提交
824 825 826
/* Find an existing audit rule.
 * Caller must hold audit_filter_mutex to prevent stale rule data. */
static struct audit_entry *audit_find_rule(struct audit_entry *entry,
A
Al Viro 已提交
827
					   struct list_head **p)
A
Amy Griffis 已提交
828 829
{
	struct audit_entry *e, *found = NULL;
A
Al Viro 已提交
830
	struct list_head *list;
A
Amy Griffis 已提交
831 832
	int h;

A
Al Viro 已提交
833 834 835 836
	if (entry->rule.inode_f) {
		h = audit_hash_ino(entry->rule.inode_f->val);
		*p = list = &audit_inode_hash[h];
	} else if (entry->rule.watch) {
A
Amy Griffis 已提交
837 838 839 840 841 842 843 844 845 846
		/* we don't know the inode number, so must walk entire hash */
		for (h = 0; h < AUDIT_INODE_BUCKETS; h++) {
			list = &audit_inode_hash[h];
			list_for_each_entry(e, list, list)
				if (!audit_compare_rule(&entry->rule, &e->rule)) {
					found = e;
					goto out;
				}
		}
		goto out;
A
Al Viro 已提交
847 848
	} else {
		*p = list = &audit_filter_list[entry->rule.listnr];
A
Amy Griffis 已提交
849 850 851 852 853 854 855 856 857 858 859 860
	}

	list_for_each_entry(e, list, list)
		if (!audit_compare_rule(&entry->rule, &e->rule)) {
			found = e;
			goto out;
		}

out:
	return found;
}

861 862 863
static u64 prio_low = ~0ULL/2;
static u64 prio_high = ~0ULL/2 - 1;

A
Amy Griffis 已提交
864
/* Add rule to given filterlist if not a duplicate. */
A
Al Viro 已提交
865
static inline int audit_add_rule(struct audit_entry *entry)
866
{
867
	struct audit_entry *e;
A
Amy Griffis 已提交
868
	struct audit_watch *watch = entry->rule.watch;
A
Al Viro 已提交
869
	struct audit_tree *tree = entry->rule.tree;
A
Al Viro 已提交
870
	struct list_head *list;
871
	int err;
A
Al Viro 已提交
872 873 874 875 876 877 878 879
#ifdef CONFIG_AUDITSYSCALL
	int dont_count = 0;

	/* If either of these, don't count towards total */
	if (entry->rule.listnr == AUDIT_FILTER_USER ||
		entry->rule.listnr == AUDIT_FILTER_TYPE)
		dont_count = 1;
#endif
A
Amy Griffis 已提交
880 881

	mutex_lock(&audit_filter_mutex);
A
Al Viro 已提交
882
	e = audit_find_rule(entry, &list);
A
Amy Griffis 已提交
883
	if (e) {
884
		mutex_unlock(&audit_filter_mutex);
A
Amy Griffis 已提交
885
		err = -EEXIST;
A
Al Viro 已提交
886 887 888
		/* normally audit_add_tree_rule() will free it on failure */
		if (tree)
			audit_put_tree(tree);
A
Amy Griffis 已提交
889 890
		goto error;
	}
891

A
Amy Griffis 已提交
892 893
	if (watch) {
		/* audit_filter_mutex is dropped and re-taken during this call */
894
		err = audit_add_watch(&entry->rule, &list);
A
Amy Griffis 已提交
895 896
		if (err) {
			mutex_unlock(&audit_filter_mutex);
897 898 899 900 901 902
			/*
			 * normally audit_add_tree_rule() will free it
			 * on failure
			 */
			if (tree)
				audit_put_tree(tree);
A
Amy Griffis 已提交
903 904
			goto error;
		}
905
	}
A
Al Viro 已提交
906 907 908 909 910 911 912
	if (tree) {
		err = audit_add_tree_rule(&entry->rule);
		if (err) {
			mutex_unlock(&audit_filter_mutex);
			goto error;
		}
	}
913

914 915 916 917 918 919 920 921
	entry->rule.prio = ~0ULL;
	if (entry->rule.listnr == AUDIT_FILTER_EXIT) {
		if (entry->rule.flags & AUDIT_FILTER_PREPEND)
			entry->rule.prio = ++prio_high;
		else
			entry->rule.prio = --prio_low;
	}

922
	if (entry->rule.flags & AUDIT_FILTER_PREPEND) {
A
Al Viro 已提交
923 924
		list_add(&entry->rule.list,
			 &audit_rules_list[entry->rule.listnr]);
925
		list_add_rcu(&entry->list, list);
926
		entry->rule.flags &= ~AUDIT_FILTER_PREPEND;
927
	} else {
A
Al Viro 已提交
928 929
		list_add_tail(&entry->rule.list,
			      &audit_rules_list[entry->rule.listnr]);
930 931
		list_add_tail_rcu(&entry->list, list);
	}
A
Al Viro 已提交
932 933 934
#ifdef CONFIG_AUDITSYSCALL
	if (!dont_count)
		audit_n_rules++;
A
Amy Griffis 已提交
935 936 937

	if (!audit_match_signal(entry))
		audit_signals++;
A
Al Viro 已提交
938
#endif
A
Amy Griffis 已提交
939
	mutex_unlock(&audit_filter_mutex);
940

A
Amy Griffis 已提交
941 942 943 944 945 946
 	return 0;

error:
	if (watch)
		audit_put_watch(watch); /* tmp watch, matches initial get */
	return err;
947 948
}

A
Amy Griffis 已提交
949
/* Remove an existing rule from filterlist. */
A
Al Viro 已提交
950
static inline int audit_del_rule(struct audit_entry *entry)
951 952
{
	struct audit_entry  *e;
953
	struct audit_watch *watch = entry->rule.watch;
A
Al Viro 已提交
954
	struct audit_tree *tree = entry->rule.tree;
A
Al Viro 已提交
955 956
	struct list_head *list;
	int ret = 0;
A
Al Viro 已提交
957 958 959 960 961 962 963 964
#ifdef CONFIG_AUDITSYSCALL
	int dont_count = 0;

	/* If either of these, don't count towards total */
	if (entry->rule.listnr == AUDIT_FILTER_USER ||
		entry->rule.listnr == AUDIT_FILTER_TYPE)
		dont_count = 1;
#endif
A
Amy Griffis 已提交
965 966

	mutex_lock(&audit_filter_mutex);
A
Al Viro 已提交
967
	e = audit_find_rule(entry, &list);
A
Amy Griffis 已提交
968 969 970 971 972 973
	if (!e) {
		mutex_unlock(&audit_filter_mutex);
		ret = -ENOENT;
		goto out;
	}

974
	if (e->rule.watch)
975
		audit_remove_watch_rule(&e->rule);
A
Amy Griffis 已提交
976

A
Al Viro 已提交
977 978 979
	if (e->rule.tree)
		audit_remove_tree_rule(&e->rule);

A
Amy Griffis 已提交
980
	list_del_rcu(&e->list);
A
Al Viro 已提交
981
	list_del(&e->rule.list);
A
Amy Griffis 已提交
982 983
	call_rcu(&e->rcu, audit_free_rule_rcu);

A
Al Viro 已提交
984 985 986
#ifdef CONFIG_AUDITSYSCALL
	if (!dont_count)
		audit_n_rules--;
A
Amy Griffis 已提交
987 988 989

	if (!audit_match_signal(entry))
		audit_signals--;
A
Al Viro 已提交
990
#endif
A
Amy Griffis 已提交
991 992 993
	mutex_unlock(&audit_filter_mutex);

out:
994 995
	if (watch)
		audit_put_watch(watch); /* match initial get */
A
Al Viro 已提交
996 997
	if (tree)
		audit_put_tree(tree);	/* that's the temporary one */
A
Amy Griffis 已提交
998 999

	return ret;
1000 1001
}

1002
/* List rules using struct audit_rule_data. */
1003
static void audit_list_rules(__u32 portid, int seq, struct sk_buff_head *q)
1004
{
1005
	struct sk_buff *skb;
A
Al Viro 已提交
1006
	struct audit_krule *r;
1007 1008
	int i;

A
Amy Griffis 已提交
1009 1010
	/* This is a blocking read, so use audit_filter_mutex instead of rcu
	 * iterator to sync with list writers. */
1011
	for (i=0; i<AUDIT_NR_FILTERS; i++) {
A
Al Viro 已提交
1012
		list_for_each_entry(r, &audit_rules_list[i], list) {
A
Amy Griffis 已提交
1013 1014
			struct audit_rule_data *data;

A
Al Viro 已提交
1015
			data = audit_krule_to_data(r);
A
Amy Griffis 已提交
1016 1017
			if (unlikely(!data))
				break;
1018 1019 1020
			skb = audit_make_reply(portid, seq, AUDIT_LIST_RULES,
					       0, 1, data,
					       sizeof(*data) + data->buflen);
1021 1022
			if (skb)
				skb_queue_tail(q, skb);
1023 1024 1025
			kfree(data);
		}
	}
1026
	skb = audit_make_reply(portid, seq, AUDIT_LIST_RULES, 1, 1, NULL, 0);
1027 1028
	if (skb)
		skb_queue_tail(q, skb);
1029 1030
}

A
Amy Griffis 已提交
1031
/* Log rule additions and removals */
1032
static void audit_log_rule_change(char *action, struct audit_krule *rule, int res)
A
Amy Griffis 已提交
1033 1034
{
	struct audit_buffer *ab;
1035
	uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(current));
1036
	unsigned int sessionid = audit_get_sessionid(current);
A
Amy Griffis 已提交
1037

1038 1039 1040
	if (!audit_enabled)
		return;

A
Amy Griffis 已提交
1041 1042 1043
	ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE);
	if (!ab)
		return;
1044
	audit_log_format(ab, "auid=%u ses=%u" ,loginuid, sessionid);
1045
	audit_log_task_context(ab);
1046 1047 1048
	audit_log_format(ab, " op=");
	audit_log_string(ab, action);
	audit_log_key(ab, rule->filterkey);
A
Amy Griffis 已提交
1049 1050 1051 1052
	audit_log_format(ab, " list=%d res=%d", rule->listnr, res);
	audit_log_end(ab);
}

1053
/**
1054
 * audit_rule_change - apply all rules to the specified message type
1055
 * @type: audit message type
1056
 * @portid: target port id for netlink audit messages
1057 1058
 * @seq: netlink audit message sequence (serial) number
 * @data: payload data
1059
 * @datasz: size of payload data
1060
 */
1061 1062
int audit_rule_change(int type, __u32 portid, int seq, void *data,
			size_t datasz)
1063
{
1064 1065
	int err = 0;
	struct audit_entry *entry;
1066 1067

	switch (type) {
1068
	case AUDIT_ADD_RULE:
1069
		entry = audit_data_to_entry(data, datasz);
1070 1071 1072
		if (IS_ERR(entry))
			return PTR_ERR(entry);

A
Al Viro 已提交
1073
		err = audit_add_rule(entry);
1074
		audit_log_rule_change("add_rule", &entry->rule, !err);
S
Steve Grubb 已提交
1075
		if (err)
1076
			audit_free_rule(entry);
1077
		break;
1078
	case AUDIT_DEL_RULE:
1079
		entry = audit_data_to_entry(data, datasz);
1080 1081 1082
		if (IS_ERR(entry))
			return PTR_ERR(entry);

A
Al Viro 已提交
1083
		err = audit_del_rule(entry);
1084
		audit_log_rule_change("remove_rule", &entry->rule, !err);
1085
		audit_free_rule(entry);
1086 1087 1088 1089 1090 1091 1092 1093
		break;
	default:
		return -EINVAL;
	}

	return err;
}

1094 1095
/**
 * audit_list_rules_send - list the audit rules
1096
 * @request_skb: skb of request we are replying to (used to target the reply)
1097 1098
 * @seq: netlink audit message sequence (serial) number
 */
1099
int audit_list_rules_send(struct sk_buff *request_skb, int seq)
1100
{
1101 1102
	u32 portid = NETLINK_CB(request_skb).portid;
	struct net *net = sock_net(NETLINK_CB(request_skb).sk);
1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115
	struct task_struct *tsk;
	struct audit_netlink_list *dest;
	int err = 0;

	/* We can't just spew out the rules here because we might fill
	 * the available socket buffer space and deadlock waiting for
	 * auditctl to read from it... which isn't ever going to
	 * happen if we're actually running in the context of auditctl
	 * trying to _send_ the stuff */

	dest = kmalloc(sizeof(struct audit_netlink_list), GFP_KERNEL);
	if (!dest)
		return -ENOMEM;
1116
	dest->net = get_net(net);
1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133
	dest->portid = portid;
	skb_queue_head_init(&dest->q);

	mutex_lock(&audit_filter_mutex);
	audit_list_rules(portid, seq, &dest->q);
	mutex_unlock(&audit_filter_mutex);

	tsk = kthread_run(audit_send_list, dest, "audit_send_list");
	if (IS_ERR(tsk)) {
		skb_queue_purge(&dest->q);
		kfree(dest);
		err = PTR_ERR(tsk);
	}

	return err;
}

1134
int audit_comparator(u32 left, u32 op, u32 right)
1135 1136
{
	switch (op) {
1137
	case Audit_equal:
1138
		return (left == right);
1139
	case Audit_not_equal:
1140
		return (left != right);
1141
	case Audit_lt:
1142
		return (left < right);
1143
	case Audit_le:
1144
		return (left <= right);
1145
	case Audit_gt:
1146
		return (left > right);
1147
	case Audit_ge:
1148
		return (left >= right);
1149
	case Audit_bitmask:
1150
		return (left & right);
1151
	case Audit_bittest:
1152
		return ((left & right) == right);
1153 1154 1155
	default:
		BUG();
		return 0;
1156 1157 1158
	}
}

1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204
int audit_uid_comparator(kuid_t left, u32 op, kuid_t right)
{
	switch (op) {
	case Audit_equal:
		return uid_eq(left, right);
	case Audit_not_equal:
		return !uid_eq(left, right);
	case Audit_lt:
		return uid_lt(left, right);
	case Audit_le:
		return uid_lte(left, right);
	case Audit_gt:
		return uid_gt(left, right);
	case Audit_ge:
		return uid_gte(left, right);
	case Audit_bitmask:
	case Audit_bittest:
	default:
		BUG();
		return 0;
	}
}

int audit_gid_comparator(kgid_t left, u32 op, kgid_t right)
{
	switch (op) {
	case Audit_equal:
		return gid_eq(left, right);
	case Audit_not_equal:
		return !gid_eq(left, right);
	case Audit_lt:
		return gid_lt(left, right);
	case Audit_le:
		return gid_lte(left, right);
	case Audit_gt:
		return gid_gt(left, right);
	case Audit_ge:
		return gid_gte(left, right);
	case Audit_bitmask:
	case Audit_bittest:
	default:
		BUG();
		return 0;
	}
}

1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234
/**
 * parent_len - find the length of the parent portion of a pathname
 * @path: pathname of which to determine length
 */
int parent_len(const char *path)
{
	int plen;
	const char *p;

	plen = strlen(path);

	if (plen == 0)
		return plen;

	/* disregard trailing slashes */
	p = path + plen - 1;
	while ((*p == '/') && (p > path))
		p--;

	/* walk backward until we find the next slash or hit beginning */
	while ((*p != '/') && (p > path))
		p--;

	/* did we find a slash? Then increment to include it in path */
	if (*p == '/')
		p++;

	return p - path;
}

1235 1236 1237 1238 1239 1240 1241 1242 1243
/**
 * audit_compare_dname_path - compare given dentry name with last component in
 * 			      given path. Return of 0 indicates a match.
 * @dname:	dentry name that we're comparing
 * @path:	full pathname that we're comparing
 * @parentlen:	length of the parent if known. Passing in AUDIT_NAME_FULL
 * 		here indicates that we must compute this value.
 */
int audit_compare_dname_path(const char *dname, const char *path, int parentlen)
A
Amy Griffis 已提交
1244
{
1245
	int dlen, pathlen;
A
Amy Griffis 已提交
1246 1247 1248
	const char *p;

	dlen = strlen(dname);
1249 1250
	pathlen = strlen(path);
	if (pathlen < dlen)
A
Amy Griffis 已提交
1251 1252
		return 1;

1253
	parentlen = parentlen == AUDIT_NAME_FULL ? parent_len(path) : parentlen;
1254
	if (pathlen - parentlen != dlen)
A
Amy Griffis 已提交
1255
		return 1;
1256 1257

	p = path + parentlen;
1258

A
Amy Griffis 已提交
1259 1260
	return strncmp(p, dname, dlen);
}
1261

1262
static int audit_filter_user_rules(struct audit_krule *rule, int type,
1263 1264 1265 1266 1267
				   enum audit_state *state)
{
	int i;

	for (i = 0; i < rule->field_count; i++) {
1268
		struct audit_field *f = &rule->fields[i];
1269
		pid_t pid;
1270
		int result = 0;
1271
		u32 sid;
1272

1273
		switch (f->type) {
1274
		case AUDIT_PID:
1275 1276
			pid = task_pid_nr(current);
			result = audit_comparator(pid, f->op, f->val);
1277 1278
			break;
		case AUDIT_UID:
1279
			result = audit_uid_comparator(current_uid(), f->op, f->uid);
1280 1281
			break;
		case AUDIT_GID:
1282
			result = audit_gid_comparator(current_gid(), f->op, f->gid);
1283 1284
			break;
		case AUDIT_LOGINUID:
1285 1286
			result = audit_uid_comparator(audit_get_loginuid(current),
						  f->op, f->uid);
1287
			break;
1288 1289 1290 1291
		case AUDIT_LOGINUID_SET:
			result = audit_comparator(audit_loginuid_set(current),
						  f->op, f->val);
			break;
1292 1293 1294
		case AUDIT_MSGTYPE:
			result = audit_comparator(type, f->op, f->val);
			break;
1295 1296 1297 1298 1299
		case AUDIT_SUBJ_USER:
		case AUDIT_SUBJ_ROLE:
		case AUDIT_SUBJ_TYPE:
		case AUDIT_SUBJ_SEN:
		case AUDIT_SUBJ_CLR:
1300 1301 1302
			if (f->lsm_rule) {
				security_task_getsecid(current, &sid);
				result = security_audit_rule_match(sid,
1303 1304 1305 1306
								   f->type,
								   f->op,
								   f->lsm_rule,
								   NULL);
1307
			}
1308
			break;
1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320
		}

		if (!result)
			return 0;
	}
	switch (rule->action) {
	case AUDIT_NEVER:    *state = AUDIT_DISABLED;	    break;
	case AUDIT_ALWAYS:   *state = AUDIT_RECORD_CONTEXT; break;
	}
	return 1;
}

1321
int audit_filter_user(int type)
1322
{
1323
	enum audit_state state = AUDIT_DISABLED;
1324
	struct audit_entry *e;
1325 1326 1327
	int rc, ret;

	ret = 1; /* Audit by default */
1328 1329 1330

	rcu_read_lock();
	list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_USER], list) {
1331 1332 1333
		rc = audit_filter_user_rules(&e->rule, type, &state);
		if (rc) {
			if (rc > 0 && state == AUDIT_DISABLED)
1334 1335 1336 1337 1338 1339
				ret = 0;
			break;
		}
	}
	rcu_read_unlock();

1340
	return ret;
1341 1342 1343 1344 1345 1346
}

int audit_filter_type(int type)
{
	struct audit_entry *e;
	int result = 0;
D
Daniel Walker 已提交
1347

1348 1349 1350 1351 1352 1353 1354
	rcu_read_lock();
	if (list_empty(&audit_filter_list[AUDIT_FILTER_TYPE]))
		goto unlock_and_return;

	list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_TYPE],
				list) {
		int i;
1355 1356 1357 1358
		for (i = 0; i < e->rule.field_count; i++) {
			struct audit_field *f = &e->rule.fields[i];
			if (f->type == AUDIT_MSGTYPE) {
				result = audit_comparator(type, f->op, f->val);
1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369
				if (!result)
					break;
			}
		}
		if (result)
			goto unlock_and_return;
	}
unlock_and_return:
	rcu_read_unlock();
	return result;
}
1370

A
Al Viro 已提交
1371
static int update_lsm_rule(struct audit_krule *r)
1372
{
A
Al Viro 已提交
1373
	struct audit_entry *entry = container_of(r, struct audit_entry, rule);
1374 1375 1376
	struct audit_entry *nentry;
	int err = 0;

A
Al Viro 已提交
1377
	if (!security_audit_rule_known(r))
1378 1379
		return 0;

1380
	nentry = audit_dupe_rule(r);
1381 1382 1383 1384 1385
	if (IS_ERR(nentry)) {
		/* save the first error encountered for the
		 * return value */
		err = PTR_ERR(nentry);
		audit_panic("error updating LSM filters");
1386
		if (r->watch)
A
Al Viro 已提交
1387
			list_del(&r->rlist);
1388
		list_del_rcu(&entry->list);
A
Al Viro 已提交
1389
		list_del(&r->list);
1390
	} else {
1391
		if (r->watch || r->tree)
A
Al Viro 已提交
1392
			list_replace_init(&r->rlist, &nentry->rule.rlist);
1393
		list_replace_rcu(&entry->list, &nentry->list);
A
Al Viro 已提交
1394
		list_replace(&r->list, &nentry->rule.list);
1395 1396 1397 1398 1399 1400
	}
	call_rcu(&entry->rcu, audit_free_rule_rcu);

	return err;
}

1401
/* This function will re-initialize the lsm_rule field of all applicable rules.
1402
 * It will traverse the filter lists serarching for rules that contain LSM
1403
 * specific filter fields.  When such a rule is found, it is copied, the
1404
 * LSM field is re-initialized, and the old rule is replaced with the
1405
 * updated rule. */
1406
int audit_update_lsm_rules(void)
1407
{
A
Al Viro 已提交
1408
	struct audit_krule *r, *n;
1409 1410
	int i, err = 0;

A
Amy Griffis 已提交
1411 1412
	/* audit_filter_mutex synchronizes the writers */
	mutex_lock(&audit_filter_mutex);
1413 1414

	for (i = 0; i < AUDIT_NR_FILTERS; i++) {
A
Al Viro 已提交
1415 1416
		list_for_each_entry_safe(r, n, &audit_rules_list[i], list) {
			int res = update_lsm_rule(r);
1417 1418
			if (!err)
				err = res;
1419 1420
		}
	}
A
Amy Griffis 已提交
1421
	mutex_unlock(&audit_filter_mutex);
1422 1423 1424

	return err;
}