From: Steve Grubb <sgrubb@redhat.com>
To: Alexander Viro <aviro@redhat.com>
Cc: linux-audit@redhat.com
Subject: Re: OBJ_PID records
Date: Tue, 2 Oct 2007 16:20:11 -0400 [thread overview]
Message-ID: <200710021620.11947.sgrubb@redhat.com> (raw)
In-Reply-To: <20071001185225.GM21685@devserv.devel.redhat.com>
On Monday 01 October 2007 14:52:25 Alexander Viro wrote:
> On Fri, Sep 28, 2007 at 09:39:57AM -0400, Steve Grubb wrote:
> > On Friday 28 September 2007 09:31:09 Steve Grubb wrote:
> > > > > type=OBJ_PID msg=audit(09/20/2007 15:29:16.355:12775) : opid=2287 ?
> > > > > obj=system_u:system_r:xdm_xserver_t:s0-s0:c0.c1023
> > > >
> > > > Er... And what has pid 2287 on that box?
> > >
> > > I am reasonably certain that its gdm given the selinux label.
> >
> > Scratch that, I forgot to include "server" in my grep. That looks like
> > Xorg's process label. So, its the X server.
>
> OK, I think I see what's going on:
> a) we are too cautious about audit_signals; need to exclude rules
> that have AUDIT_DEV{MAJOR,MINOR}, AUDIT_INODE, AUDIT_WATCH, AUDIT_PERM.
> None of those will trigger on signal-sending syscall
> b) more important, we should not touch async signals - basically,
> when kernel decides to send SIGIO/SIGURG we obviously should not screw with
> current->audit_context. Note that we already have that check, right in the
> caller of audit_signal_info() (that is, when we decide if current-based
> permissions checks apply). So we simply need to move audit_signal_info()
> a bit down - after we'd decided that it's not an async signal and before
> the permission checks. Patch below does just that.
This seems to fix it on my machine. Reloaded policy many times and haven't
seen a recurrance.
Acked-by: Steve Grubb <sgrubb@redhat.com>
> diff -urN linux-2.6.22.x86_64/kernel/signal.c foo/kernel/signal.c
> --- linux-2.6.22.x86_64/kernel/signal.c 2007-10-01 13:18:10.000000000 -0400
> +++ foo/kernel/signal.c 2007-10-01 14:45:35.000000000 -0400
> @@ -532,18 +532,18 @@
> if (!valid_signal(sig))
> return error;
>
> - error = audit_signal_info(sig, t); /* Let audit system see the signal */
> - if (error)
> - return error;
> -
> - error = -EPERM;
> - if ((info == SEND_SIG_NOINFO || (!is_si_special(info) &&
> SI_FROMUSER(info))) - && ((sig != SIGCONT) ||
> - (process_session(current) != process_session(t)))
> - && (current->euid ^ t->suid) && (current->euid ^ t->uid)
> - && (current->uid ^ t->suid) && (current->uid ^ t->uid)
> - && !capable(CAP_KILL))
> + if (info == SEND_SIG_NOINFO || (!is_si_special(info) &&
> SI_FROMUSER(info))) { + error = audit_signal_info(sig, t); /* Let audit
> system see the signal */ + if (error)
> + return error;
> + error = -EPERM;
> + if (((sig != SIGCONT) ||
> + (process_session(current) != process_session(t)))
> + && (current->euid ^ t->suid) && (current->euid ^ t->uid)
> + && (current->uid ^ t->suid) && (current->uid ^ t->uid)
> + && !capable(CAP_KILL))
> return error;
> + }
>
> return security_task_kill(t, info, sig, 0);
> }
next prev parent reply other threads:[~2007-10-02 20:20 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-09-21 19:06 OBJ_PID records Steve Grubb
2007-09-21 19:21 ` Linda Knippers
2007-09-21 19:29 ` Steve Grubb
2007-09-27 18:40 ` Eric Paris
2007-09-27 18:49 ` Steve Grubb
2007-09-28 3:21 ` Alexander Viro
2007-09-28 13:31 ` Steve Grubb
2007-09-28 13:39 ` Steve Grubb
2007-10-01 18:52 ` Alexander Viro
2007-10-01 20:04 ` Eric Paris
2007-10-02 20:20 ` Steve Grubb [this message]
2007-09-28 3:25 ` Alexander Viro
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200710021620.11947.sgrubb@redhat.com \
--to=sgrubb@redhat.com \
--cc=aviro@redhat.com \
--cc=linux-audit@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox