From: "Serge E. Hallyn" <serge-A9i7LUbDfNHQT0dZR+AlfA@public.gmane.org>
To: Richard Guy Briggs <rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
Cc: aviro-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org,
linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org,
eparis-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
pmoore-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
linux-audit-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
sgrubb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org,
ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org
Subject: Re: [PATCH V5 10/13] audit: log on switching namespace (setns)
Date: Mon, 13 Oct 2014 15:22:53 +0200 [thread overview]
Message-ID: <20141013132253.GI24703@mail.hallyn.com> (raw)
In-Reply-To: <5df56a7fa372cf86ca7d5f3807178710097b4c27.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
Quoting Richard Guy Briggs (rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org):
> Added six new audit message types, AUDIT_NS_SET_* and function
> audit_log_ns_set() to log a switch of namespace.
>
> Signed-off-by: Richard Guy Briggs <rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
> ---
> include/linux/audit.h | 4 +++
> include/uapi/linux/audit.h | 6 +++++
> kernel/audit.c | 46 ++++++++++++++++++++++++++++++++++++++++++++
> kernel/nsproxy.c | 3 ++
> 4 files changed, 59 insertions(+), 0 deletions(-)
>
> diff --git a/include/linux/audit.h b/include/linux/audit.h
> index 1474334..9de9b25 100644
> --- a/include/linux/audit.h
> +++ b/include/linux/audit.h
> @@ -26,6 +26,7 @@
> #include <linux/sched.h>
> #include <linux/ptrace.h>
> #include <uapi/linux/audit.h>
> +#include <linux/proc_ns.h>
>
> struct audit_sig_info {
> uid_t uid;
> @@ -484,6 +485,7 @@ static inline void audit_log_ns_info(struct task_struct *tsk)
> extern int audit_log_ns_init(int type, long long old_snum,
> long long snum);
> extern int audit_log_ns_del(int type, long long snum);
> +extern void audit_log_ns_set(const struct proc_ns_operations *ops, void *ns);
>
> extern int audit_update_lsm_rules(void);
>
> @@ -547,6 +549,8 @@ static inline int audit_log_ns_init(int type, long long old_snum,
> { }
> static inline int audit_log_ns_del(int type, long long snum)
> { }
> +static inline void audit_log_ns_set(const struct proc_ns_operations *ops, void *ns)
> +{ }
> #define audit_enabled 0
> #endif /* CONFIG_AUDIT */
> static inline void audit_log_string(struct audit_buffer *ab, const char *buf)
> diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h
> index 1acfea7..7ec7209 100644
> --- a/include/uapi/linux/audit.h
> +++ b/include/uapi/linux/audit.h
> @@ -123,6 +123,12 @@
> #define AUDIT_NS_DEL_USER 1339 /* Record USER namespace instance deletion */
> #define AUDIT_NS_DEL_PID 1340 /* Record PID namespace instance deletion */
> #define AUDIT_NS_DEL_NET 1341 /* Record NET namespace instance deletion */
> +#define AUDIT_NS_SET_MNT 1342 /* Record mount namespace instance deletion */
> +#define AUDIT_NS_SET_UTS 1343 /* Record UTS namespace instance deletion */
> +#define AUDIT_NS_SET_IPC 1344 /* Record IPC namespace instance deletion */
> +#define AUDIT_NS_SET_USER 1345 /* Record USER namespace instance deletion */
> +#define AUDIT_NS_SET_PID 1346 /* Record PID namespace instance deletion */
> +#define AUDIT_NS_SET_NET 1347 /* Record NET namespace instance deletion */
>
> #define AUDIT_AVC 1400 /* SE Linux avc denial or grant */
> #define AUDIT_SELINUX_ERR 1401 /* Internal SE Linux Errors */
> diff --git a/kernel/audit.c b/kernel/audit.c
> index cc63445..84590d1 100644
> --- a/kernel/audit.c
> +++ b/kernel/audit.c
> @@ -2021,6 +2021,52 @@ int audit_log_ns_del(int type, long long snum)
> audit_log_end(ab);
> return 0;
> }
> +
> +/**
> + * audit_log_ns_set - report a namespace set change
> + * @ops: the ops structure for the namespace to be changed
> + * @ns: the new namespace
> + */
> +void audit_log_ns_set(const struct proc_ns_operations *ops, void *ns)
> +{
> + struct audit_buffer *ab;
> + void *old_ns;
> + int msg_type;
> +
> + switch (ops->type) {
> + case CLONE_NEWNS:
> + msg_type = AUDIT_NS_SET_MNT;
> + break;
> + case CLONE_NEWUTS:
> + msg_type = AUDIT_NS_SET_UTS;
> + break;
> + case CLONE_NEWIPC:
> + msg_type = AUDIT_NS_SET_IPC;
> + break;
> + case CLONE_NEWUSER:
> + msg_type = AUDIT_NS_SET_USER;
> + break;
> + case CLONE_NEWPID:
> + msg_type = AUDIT_NS_SET_PID;
> + break;
> + case CLONE_NEWNET:
> + msg_type = AUDIT_NS_SET_NET;
> + break;
> + default:
> + return;
> + }
> + //ab = audit_log_start(tsk->audit_context, GFP_KERNEL, msg_type);
> + //audit_log_format(ab, " pid=%d", current->pid);
Are these commented lines an accident, a 'TODO', or something else?
> + audit_log_common_recv_msg(&ab, ops->type);
> + if (!ab)
> + return;
> + old_ns = ops->get(current);
> + audit_log_format(ab, " old-%ssn=%llx %ssn=%llx",
> + ops->name, ops->snum(old_ns),
> + ops->name, ops->snum(ns));
> + ops->put(old_ns);
> + audit_log_end(ab);
> +}
> #endif /* CONFIG_NAMESPACES */
>
> /**
> diff --git a/kernel/nsproxy.c b/kernel/nsproxy.c
> index 2cdc16b..e37409a 100644
> --- a/kernel/nsproxy.c
> +++ b/kernel/nsproxy.c
> @@ -275,6 +275,9 @@ SYSCALL_DEFINE2(setns, int, fd, int, nstype)
> goto out;
> }
> switch_task_namespaces(tsk, new_nsproxy);
> +
> + audit_log_ns_set(ops, ei->ns);
> +
> out:
> fput(file);
> return err;
> --
> 1.7.1
WARNING: multiple messages have this Message-ID (diff)
From: "Serge E. Hallyn" <serge@hallyn.com>
To: Richard Guy Briggs <rgb@redhat.com>
Cc: linux-audit@redhat.com, linux-kernel@vger.kernel.org,
containers@lists.linux-foundation.org, eparis@redhat.com,
sgrubb@redhat.com, aviro@redhat.com, pmoore@redhat.com,
arozansk@redhat.com, ebiederm@xmission.com, serge@hallyn.com
Subject: Re: [PATCH V5 10/13] audit: log on switching namespace (setns)
Date: Mon, 13 Oct 2014 15:22:53 +0200 [thread overview]
Message-ID: <20141013132253.GI24703@mail.hallyn.com> (raw)
In-Reply-To: <5df56a7fa372cf86ca7d5f3807178710097b4c27.1412543112.git.rgb@redhat.com>
Quoting Richard Guy Briggs (rgb@redhat.com):
> Added six new audit message types, AUDIT_NS_SET_* and function
> audit_log_ns_set() to log a switch of namespace.
>
> Signed-off-by: Richard Guy Briggs <rgb@redhat.com>
> ---
> include/linux/audit.h | 4 +++
> include/uapi/linux/audit.h | 6 +++++
> kernel/audit.c | 46 ++++++++++++++++++++++++++++++++++++++++++++
> kernel/nsproxy.c | 3 ++
> 4 files changed, 59 insertions(+), 0 deletions(-)
>
> diff --git a/include/linux/audit.h b/include/linux/audit.h
> index 1474334..9de9b25 100644
> --- a/include/linux/audit.h
> +++ b/include/linux/audit.h
> @@ -26,6 +26,7 @@
> #include <linux/sched.h>
> #include <linux/ptrace.h>
> #include <uapi/linux/audit.h>
> +#include <linux/proc_ns.h>
>
> struct audit_sig_info {
> uid_t uid;
> @@ -484,6 +485,7 @@ static inline void audit_log_ns_info(struct task_struct *tsk)
> extern int audit_log_ns_init(int type, long long old_snum,
> long long snum);
> extern int audit_log_ns_del(int type, long long snum);
> +extern void audit_log_ns_set(const struct proc_ns_operations *ops, void *ns);
>
> extern int audit_update_lsm_rules(void);
>
> @@ -547,6 +549,8 @@ static inline int audit_log_ns_init(int type, long long old_snum,
> { }
> static inline int audit_log_ns_del(int type, long long snum)
> { }
> +static inline void audit_log_ns_set(const struct proc_ns_operations *ops, void *ns)
> +{ }
> #define audit_enabled 0
> #endif /* CONFIG_AUDIT */
> static inline void audit_log_string(struct audit_buffer *ab, const char *buf)
> diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h
> index 1acfea7..7ec7209 100644
> --- a/include/uapi/linux/audit.h
> +++ b/include/uapi/linux/audit.h
> @@ -123,6 +123,12 @@
> #define AUDIT_NS_DEL_USER 1339 /* Record USER namespace instance deletion */
> #define AUDIT_NS_DEL_PID 1340 /* Record PID namespace instance deletion */
> #define AUDIT_NS_DEL_NET 1341 /* Record NET namespace instance deletion */
> +#define AUDIT_NS_SET_MNT 1342 /* Record mount namespace instance deletion */
> +#define AUDIT_NS_SET_UTS 1343 /* Record UTS namespace instance deletion */
> +#define AUDIT_NS_SET_IPC 1344 /* Record IPC namespace instance deletion */
> +#define AUDIT_NS_SET_USER 1345 /* Record USER namespace instance deletion */
> +#define AUDIT_NS_SET_PID 1346 /* Record PID namespace instance deletion */
> +#define AUDIT_NS_SET_NET 1347 /* Record NET namespace instance deletion */
>
> #define AUDIT_AVC 1400 /* SE Linux avc denial or grant */
> #define AUDIT_SELINUX_ERR 1401 /* Internal SE Linux Errors */
> diff --git a/kernel/audit.c b/kernel/audit.c
> index cc63445..84590d1 100644
> --- a/kernel/audit.c
> +++ b/kernel/audit.c
> @@ -2021,6 +2021,52 @@ int audit_log_ns_del(int type, long long snum)
> audit_log_end(ab);
> return 0;
> }
> +
> +/**
> + * audit_log_ns_set - report a namespace set change
> + * @ops: the ops structure for the namespace to be changed
> + * @ns: the new namespace
> + */
> +void audit_log_ns_set(const struct proc_ns_operations *ops, void *ns)
> +{
> + struct audit_buffer *ab;
> + void *old_ns;
> + int msg_type;
> +
> + switch (ops->type) {
> + case CLONE_NEWNS:
> + msg_type = AUDIT_NS_SET_MNT;
> + break;
> + case CLONE_NEWUTS:
> + msg_type = AUDIT_NS_SET_UTS;
> + break;
> + case CLONE_NEWIPC:
> + msg_type = AUDIT_NS_SET_IPC;
> + break;
> + case CLONE_NEWUSER:
> + msg_type = AUDIT_NS_SET_USER;
> + break;
> + case CLONE_NEWPID:
> + msg_type = AUDIT_NS_SET_PID;
> + break;
> + case CLONE_NEWNET:
> + msg_type = AUDIT_NS_SET_NET;
> + break;
> + default:
> + return;
> + }
> + //ab = audit_log_start(tsk->audit_context, GFP_KERNEL, msg_type);
> + //audit_log_format(ab, " pid=%d", current->pid);
Are these commented lines an accident, a 'TODO', or something else?
> + audit_log_common_recv_msg(&ab, ops->type);
> + if (!ab)
> + return;
> + old_ns = ops->get(current);
> + audit_log_format(ab, " old-%ssn=%llx %ssn=%llx",
> + ops->name, ops->snum(old_ns),
> + ops->name, ops->snum(ns));
> + ops->put(old_ns);
> + audit_log_end(ab);
> +}
> #endif /* CONFIG_NAMESPACES */
>
> /**
> diff --git a/kernel/nsproxy.c b/kernel/nsproxy.c
> index 2cdc16b..e37409a 100644
> --- a/kernel/nsproxy.c
> +++ b/kernel/nsproxy.c
> @@ -275,6 +275,9 @@ SYSCALL_DEFINE2(setns, int, fd, int, nstype)
> goto out;
> }
> switch_task_namespaces(tsk, new_nsproxy);
> +
> + audit_log_ns_set(ops, ei->ns);
> +
> out:
> fput(file);
> return err;
> --
> 1.7.1
next prev parent reply other threads:[~2014-10-13 13:22 UTC|newest]
Thread overview: 64+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-10-06 5:08 [PATCH V5 00/13] namespaces: log namespaces per task Richard Guy Briggs
2014-10-06 5:08 ` Richard Guy Briggs
2014-10-06 5:08 ` [PATCH V5 05/13] audit: initialize at subsystem time rather than device time Richard Guy Briggs
[not found] ` <7fda57304bb2f74ccb7f610c04df6aa0c04bf4ba.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 12:30 ` Serge E. Hallyn
2014-10-13 12:30 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 09/13] fork: audit on creation of new namespace(s) Richard Guy Briggs
[not found] ` <b9607ab778a84381b4a82cf0110d031f19b17525.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 13:14 ` Serge E. Hallyn
2014-10-13 13:14 ` Serge E. Hallyn
[not found] ` <cover.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-06 5:08 ` [PATCH V5 01/13] namespaces: assign each namespace instance a serial number Richard Guy Briggs
2014-10-06 5:08 ` Richard Guy Briggs
[not found] ` <8bc6e9595dea17bba389f4d2ce4077c30b3eb137.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-06 9:16 ` Chen, Hanxiao
2014-10-06 9:16 ` Chen, Hanxiao
[not found] ` <5871495633F38949900D2BF2DC04883E5DAB74-ZEd+hNNJ6a5ZYpXjqAkB5jz3u5zwRJJDAzI0kPv9QBlmR6Xm/wNWPw@public.gmane.org>
2014-10-06 12:46 ` Richard Guy Briggs
2014-10-06 12:46 ` Richard Guy Briggs
2014-10-13 10:30 ` Serge E. Hallyn
2014-10-13 10:30 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 02/13] namespaces: expose namespace instance serial number in proc_ns_operations Richard Guy Briggs
2014-10-06 5:08 ` Richard Guy Briggs
[not found] ` <ebec33a351a8af7822a24d9bed81178c786a0b1a.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 10:32 ` Serge E. Hallyn
2014-10-13 10:32 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 03/13] namespaces: expose ns_entries Richard Guy Briggs
2014-10-06 5:08 ` Richard Guy Briggs
[not found] ` <3ff967555ff72bf7efdf665a7209b55e4bd7f027.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 10:33 ` Serge E. Hallyn
2014-10-13 10:33 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 04/13] audit: log namespace serial numbers Richard Guy Briggs
2014-10-06 5:08 ` Richard Guy Briggs
2014-10-06 5:08 ` [PATCH V5 05/13] audit: initialize at subsystem time rather than device time Richard Guy Briggs
2014-10-06 5:08 ` [PATCH V5 06/13] audit: log creation and deletion of namespace instances Richard Guy Briggs
2014-10-06 5:08 ` Richard Guy Briggs
[not found] ` <55b0228c68d0e74480ce73f88e05d16455c4c843.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 12:26 ` Serge E. Hallyn
2014-10-13 12:26 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 07/13] audit: dump namespace IDs for pid on receipt of AUDIT_NS_INFO Richard Guy Briggs
2014-10-06 5:08 ` Richard Guy Briggs
[not found] ` <2503a41768e92791f9901e8ee7c132634821a2db.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 12:30 ` Serge E. Hallyn
2014-10-13 12:30 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 08/13] sched: add a macro to ref all CLONE_NEW* flags Richard Guy Briggs
2014-10-06 5:08 ` Richard Guy Briggs
[not found] ` <958367f30fb7eddaa406487e63ec1889138ef54f.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-06 9:21 ` Chen, Hanxiao
2014-10-06 9:21 ` Chen, Hanxiao
[not found] ` <5871495633F38949900D2BF2DC04883E5DABA4-ZEd+hNNJ6a5ZYpXjqAkB5jz3u5zwRJJDAzI0kPv9QBlmR6Xm/wNWPw@public.gmane.org>
2014-10-06 12:47 ` Richard Guy Briggs
2014-10-06 12:47 ` Richard Guy Briggs
2014-10-13 13:15 ` Serge E. Hallyn
2014-10-13 13:15 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 09/13] fork: audit on creation of new namespace(s) Richard Guy Briggs
2014-10-06 5:08 ` [PATCH V5 10/13] audit: log on switching namespace (setns) Richard Guy Briggs
2014-10-06 5:08 ` [PATCH V5 11/13] audit: emit AUDIT_NS_INFO record with AUDIT_VIRT_CONTROL record Richard Guy Briggs
2014-10-06 5:08 ` [PATCH V5 12/13] namespaces: expose ns instance serial numbers in proc Richard Guy Briggs
2014-10-06 5:08 ` [PATCH V5 13/13] Documentation: add a section for /proc/<pid>/ns/ Richard Guy Briggs
2014-10-06 5:08 ` [PATCH V5 10/13] audit: log on switching namespace (setns) Richard Guy Briggs
[not found] ` <5df56a7fa372cf86ca7d5f3807178710097b4c27.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 13:22 ` Serge E. Hallyn [this message]
2014-10-13 13:22 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 11/13] audit: emit AUDIT_NS_INFO record with AUDIT_VIRT_CONTROL record Richard Guy Briggs
[not found] ` <ad90efa917cfa5995421d36c84754f05e1934c53.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 13:34 ` Serge E. Hallyn
2014-10-13 13:34 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 12/13] namespaces: expose ns instance serial numbers in proc Richard Guy Briggs
[not found] ` <53b81e89f7179ef8569409293f990b3ac7deac61.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 13:41 ` Serge E. Hallyn
2014-10-13 13:41 ` Serge E. Hallyn
2014-10-06 5:08 ` [PATCH V5 13/13] Documentation: add a section for /proc/<pid>/ns/ Richard Guy Briggs
[not found] ` <982503bc4e4c24cbdebd111b27191ed5bee75572.1412543112.git.rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2014-10-13 13:46 ` Serge E. Hallyn
2014-10-13 13:46 ` Serge E. Hallyn
[not found] ` <20141013134659.GL24703-7LNsyQBKDXoIagZqoN9o3w@public.gmane.org>
2014-10-14 14:25 ` Richard Guy Briggs
2014-10-14 14:25 ` Richard Guy Briggs
2014-10-14 22:03 ` Serge E. Hallyn
2014-10-14 22:03 ` Serge E. Hallyn
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20141013132253.GI24703@mail.hallyn.com \
--to=serge-a9i7lubdfnhqt0dzr+alfa@public.gmane.org \
--cc=aviro-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \
--cc=containers-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \
--cc=ebiederm-aS9lmoZGLiVWk0Htik3J/w@public.gmane.org \
--cc=eparis-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \
--cc=linux-audit-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \
--cc=linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
--cc=pmoore-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \
--cc=rgb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \
--cc=sgrubb-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.