James Morris wrote:
> Dave,
> 
> Looks like this patch needs to be reverted until these issues are 
> resolved.

Yes, please revert this patch.

I posted an earlier version to the linux-audit list and waited for a day
to see if there any comments before submitting for inclusion, but
unfortunately it seems I didn't wait long enough for Steve.  I'll deal
with Steve's comments once I handle the secid reconciliation patches as
I think they are more important right now.

> On Fri, 29 Sep 2006, Steve Grubb wrote:
> 
> 
>>On Thursday 28 September 2006 14:03, [EMAIL PROTECTED] wrote:
>>
>>>This patch adds audit support to NetLabel, including six new audit message
>>>types shown below.
>>>
>>> #define AUDIT_MAC_UNLBL_ACCEPT 1406
>>> #define AUDIT_MAC_UNLBL_DENY   1407
>>> #define AUDIT_MAC_CIPSOV4_ADD  1408
>>> #define AUDIT_MAC_CIPSOV4_DEL  1409
>>> #define AUDIT_MAC_MAP_ADD      1410
>>> #define AUDIT_MAC_MAP_DEL      1411
>>>
>>>Please consider this for inclusion into 2.6.19.
>>>
>>>Signed-off-by: Paul Moore <[EMAIL PROTECTED]>
>>>---
>>> include/linux/audit.h              |    6 ++
>>> include/net/cipso_ipv4.h           |    5 +-
>>> include/net/netlabel.h             |    2
>>> net/ipv4/cipso_ipv4.c              |    8 ++-
>>> net/netlabel/netlabel_cipso_v4.c   |   43 +++++++++++++----
>>> net/netlabel/netlabel_domainhash.c |   54 +++++++++++++++++++--
>>> net/netlabel/netlabel_domainhash.h |    6 +-
>>> net/netlabel/netlabel_mgmt.c       |   14 +++--
>>> net/netlabel/netlabel_unlabeled.c  |   36 ++++++++++++--
>>> net/netlabel/netlabel_user.c       |   91
>>>+++++++++++++++++++++++++++++++++++++ net/netlabel/netlabel_user.h       | 
>>>  6 ++
>>> 11 files changed, 235 insertions(+), 36 deletions(-)
>>>
>>>Index: net-2.6/include/linux/audit.h
>>>===================================================================
>>>--- net-2.6.orig/include/linux/audit.h
>>>+++ net-2.6/include/linux/audit.h
>>>@@ -95,6 +95,12 @@
>>> #define AUDIT_MAC_POLICY_LOAD       1403    /* Policy file load */
>>> #define AUDIT_MAC_STATUS    1404    /* Changed enforcing,permissive,off */
>>> #define AUDIT_MAC_CONFIG_CHANGE     1405    /* Changes to booleans */
>>>+#define AUDIT_MAC_UNLBL_ACCEPT      1406    /* NetLabel: allow unlabeled 
>>>traffic */ 
>>>+#define AUDIT_MAC_UNLBL_DENY        1407    /* NetLabel: deny unlabeled 
>>>traffic */
>>
>>Please drop the use of DENY per comments later down.
>>
>>
>>>+#define AUDIT_MAC_CIPSOV4_ADD       1408    /* NetLabel: add CIPSOv4 DOI 
>>>entry */
>>>+#define AUDIT_MAC_CIPSOV4_DEL       1409    /* NetLabel: del CIPSOv4 DOI 
>>>entry */
>>>+#define AUDIT_MAC_MAP_ADD   1410    /* NetLabel: add LSM domain mapping */  
>>>+#define AUDIT_MAC_MAP_DEL   1411    /* NetLabel: del LSM domain mapping */
>>>
>>> #define AUDIT_FIRST_KERN_ANOM_MSG   1700
>>> #define AUDIT_LAST_KERN_ANOM_MSG    1799
>>>Index: net-2.6/include/net/cipso_ipv4.h
>>>===================================================================
>>>--- net-2.6.orig/include/net/cipso_ipv4.h
>>>+++ net-2.6/include/net/cipso_ipv4.h
>>>@@ -128,7 +128,9 @@ extern int cipso_v4_rbm_strictvalid;
>>>
>>> #ifdef CONFIG_NETLABEL
>>> int cipso_v4_doi_add(struct cipso_v4_doi *doi_def);
>>>-int cipso_v4_doi_remove(u32 doi, void (*callback) (struct rcu_head *
>>>head)); +int cipso_v4_doi_remove(u32 doi,
>>>+                    u32 audit_secid,
>>>+                    void (*callback) (struct rcu_head * head));
>>> struct cipso_v4_doi *cipso_v4_doi_getdef(u32 doi);
>>> int cipso_v4_doi_walk(u32 *skip_cnt,
>>>                  int (*callback) (struct cipso_v4_doi *doi_def, void *arg),
>>>@@ -143,6 +145,7 @@ static inline int cipso_v4_doi_add(struc
>>> }
>>>
>>> static inline int cipso_v4_doi_remove(u32 doi,
>>>+                                u32 audit_secid,
>>>                                 void (*callback) (struct rcu_head * head))
>>> {
>>>     return 0;
>>>Index: net-2.6/include/net/netlabel.h
>>>===================================================================
>>>--- net-2.6.orig/include/net/netlabel.h
>>>+++ net-2.6/include/net/netlabel.h
>>>@@ -96,7 +96,7 @@
>>> struct netlbl_dom_map;
>>>
>>> /* Domain mapping operations */
>>>-int netlbl_domhsh_remove(const char *domain);
>>>+int netlbl_domhsh_remove(const char *domain, u32 audit_secid);
>>>
>>> /* LSM security attributes */
>>> struct netlbl_lsm_cache {
>>>Index: net-2.6/net/ipv4/cipso_ipv4.c
>>>===================================================================
>>>--- net-2.6.orig/net/ipv4/cipso_ipv4.c
>>>+++ net-2.6/net/ipv4/cipso_ipv4.c
>>>@@ -474,6 +474,7 @@ doi_add_failure_rlock:
>>> /**
>>>  * cipso_v4_doi_remove - Remove an existing DOI from the CIPSO protocol
>>>engine * @doi: the DOI value
>>>+ * @audit_secid: the LSM secid to use in the audit message
>>>  * @callback: the DOI cleanup/free callback
>>>  *
>>>  * Description:
>>>@@ -483,7 +484,9 @@ doi_add_failure_rlock:
>>>  * success and negative values on failure.
>>>  *
>>>  */
>>>-int cipso_v4_doi_remove(u32 doi, void (*callback) (struct rcu_head *
>>>head)) +int cipso_v4_doi_remove(u32 doi,
>>>+                    u32 audit_secid,
>>>+                    void (*callback) (struct rcu_head * head))
>>> {
>>>     struct cipso_v4_doi *doi_def;
>>>     struct cipso_v4_domhsh_entry *dom_iter;
>>>@@ -502,7 +505,8 @@ int cipso_v4_doi_remove(u32 doi, void (*
>>>             spin_unlock(&cipso_v4_doi_list_lock);
>>>             list_for_each_entry_rcu(dom_iter, &doi_def->dom_list, list)
>>>                     if (dom_iter->valid)
>>>-                            netlbl_domhsh_remove(dom_iter->domain);
>>>+                            netlbl_domhsh_remove(dom_iter->domain,
>>>+                                                 audit_secid);
>>>             cipso_v4_cache_invalidate();
>>>             rcu_read_unlock();
>>>
>>>Index: net-2.6/net/netlabel/netlabel_cipso_v4.c
>>>===================================================================
>>>--- net-2.6.orig/net/netlabel/netlabel_cipso_v4.c
>>>+++ net-2.6/net/netlabel/netlabel_cipso_v4.c
>>>@@ -32,6 +32,7 @@
>>> #include <linux/socket.h>
>>> #include <linux/string.h>
>>> #include <linux/skbuff.h>
>>>+#include <linux/audit.h>
>>> #include <net/sock.h>
>>> #include <net/netlink.h>
>>> #include <net/genetlink.h>
>>>@@ -162,8 +163,7 @@ static int netlbl_cipsov4_add_std(struct
>>>     int nla_a_rem;
>>>     int nla_b_rem;
>>>
>>>-    if (!info->attrs[NLBL_CIPSOV4_A_DOI] ||
>>>-        !info->attrs[NLBL_CIPSOV4_A_TAGLST] ||
>>>+    if (!info->attrs[NLBL_CIPSOV4_A_TAGLST] ||
>>>         !info->attrs[NLBL_CIPSOV4_A_MLSLVLLST])
>>>             return -EINVAL;
>>>
>>>@@ -344,8 +344,7 @@ static int netlbl_cipsov4_add_pass(struc
>>>     int ret_val;
>>>     struct cipso_v4_doi *doi_def = NULL;
>>>
>>>-    if (!info->attrs[NLBL_CIPSOV4_A_DOI] ||
>>>-        !info->attrs[NLBL_CIPSOV4_A_TAGLST])
>>>+    if (!info->attrs[NLBL_CIPSOV4_A_TAGLST])
>>>             return -EINVAL;
>>>
>>>     doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL);
>>>@@ -381,21 +380,35 @@ static int netlbl_cipsov4_add(struct sk_
>>>
>>> {
>>>     int ret_val = -EINVAL;
>>>-    u32 map_type;
>>>+    u32 type;
>>>+    u32 doi;
>>>+    const char *type_str = "(unknown)";
>>>+    struct audit_buffer *audit_buf;
>>>
>>>-    if (!info->attrs[NLBL_CIPSOV4_A_MTYPE])
>>>+    if (!info->attrs[NLBL_CIPSOV4_A_DOI] ||
>>>+        !info->attrs[NLBL_CIPSOV4_A_MTYPE])
>>>             return -EINVAL;
>>>
>>>-    map_type = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_MTYPE]);
>>>-    switch (map_type) {
>>>+    type = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_MTYPE]);
>>>+    switch (type) {
>>>     case CIPSO_V4_MAP_STD:
>>>+            type_str = "std";
>>>             ret_val = netlbl_cipsov4_add_std(info);
>>>             break;
>>>     case CIPSO_V4_MAP_PASS:
>>>+            type_str = "pass";
>>>             ret_val = netlbl_cipsov4_add_pass(info);
>>>             break;
>>>     }
>>>
>>>+    if (ret_val == 0) {
>>>+            doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]);
>>>+            audit_buf = netlbl_audit_start_common(AUDIT_MAC_CIPSOV4_ADD,
>>>+                                                  NETLINK_CB(skb).sid);
>>>+            audit_log_format(audit_buf, " doi=%u type=%s", doi, type_str);
>>
>>type field is already taken for another purpose, it needs to be renamed.
>>
>>
>>>+            audit_log_end(audit_buf);
>>>+    }
>>
>>Normally, we have a field res= that records whether or not the user was 
>>successful in removing the rule. You would probably do something like 
>>ret_val==0?1:0 but send a audit event regardless
>>
>>
>>>+
>>>     return ret_val;
>>> }
>>>
>>>@@ -653,11 +666,21 @@ static int netlbl_cipsov4_listall(struct
>>> static int netlbl_cipsov4_remove(struct sk_buff *skb, struct genl_info
>>>*info) {
>>>     int ret_val = -EINVAL;
>>>-    u32 doi;
>>>+    u32 doi = 0;
>>>+    struct audit_buffer *audit_buf;
>>>
>>>     if (info->attrs[NLBL_CIPSOV4_A_DOI]) {
>>>             doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]);
>>>-            ret_val = cipso_v4_doi_remove(doi, netlbl_cipsov4_doi_free);
>>>+            ret_val = cipso_v4_doi_remove(doi,
>>>+                                          NETLINK_CB(skb).sid,
>>>+                                          netlbl_cipsov4_doi_free);
>>>+    }
>>>+
>>>+    if (ret_val == 0) {
>>>+            audit_buf = netlbl_audit_start_common(AUDIT_MAC_CIPSOV4_DEL,
>>>+                                                  NETLINK_CB(skb).sid);
>>>+            audit_log_format(audit_buf, " doi=%u", doi);
>>>+            audit_log_end(audit_buf);
>>>     }
>>
>>Same as above, global comment about res= being recorded no matter what.
>>
>>
>>>     return ret_val;
>>>Index: net-2.6/net/netlabel/netlabel_domainhash.c
>>>===================================================================
>>>--- net-2.6.orig/net/netlabel/netlabel_domainhash.c
>>>+++ net-2.6/net/netlabel/netlabel_domainhash.c
>>>@@ -35,12 +35,14 @@
>>> #include <linux/skbuff.h>
>>> #include <linux/spinlock.h>
>>> #include <linux/string.h>
>>>+#include <linux/audit.h>
>>> #include <net/netlabel.h>
>>> #include <net/cipso_ipv4.h>
>>> #include <asm/bug.h>
>>>
>>> #include "netlabel_mgmt.h"
>>> #include "netlabel_domainhash.h"
>>>+#include "netlabel_user.h"
>>>
>>> struct netlbl_domhsh_tbl {
>>>     struct list_head *tbl;
>>>@@ -186,6 +188,7 @@ int netlbl_domhsh_init(u32 size)
>>> /**
>>>  * netlbl_domhsh_add - Adds a entry to the domain hash table
>>>  * @entry: the entry to add
>>>+ * @audit_secid: the LSM secid to use in the audit message
>>>  *
>>>  * Description:
>>>  * Adds a new entry to the domain hash table and handles any updates to
>>>the @@ -193,10 +196,12 @@ int netlbl_domhsh_init(u32 size)
>>>  * negative on failure.
>>>  *
>>>  */
>>>-int netlbl_domhsh_add(struct netlbl_dom_map *entry)
>>>+int netlbl_domhsh_add(struct netlbl_dom_map *entry, u32 audit_secid)
>>> {
>>>     int ret_val;
>>>     u32 bkt;
>>>+    struct audit_buffer *audit_buf;
>>>+    char *audit_domain;
>>>
>>>     switch (entry->type) {
>>>     case NETLBL_NLTYPE_UNLABELED:
>>>@@ -236,6 +241,26 @@ int netlbl_domhsh_add(struct netlbl_dom_
>>>             spin_unlock(&netlbl_domhsh_def_lock);
>>>     } else
>>>             ret_val = -EINVAL;
>>>+    if (ret_val == 0) {
>>>+            if (entry->domain != NULL)
>>>+                    audit_domain = entry->domain;
>>>+            else
>>>+                    audit_domain = "(default)";
>>>+            audit_buf = netlbl_audit_start_common(AUDIT_MAC_MAP_ADD,
>>>+                                                  audit_secid);
>>>+            audit_log_format(audit_buf, " domain=%s", audit_domain);
>>>+            switch (entry->type) {
>>>+            case NETLBL_NLTYPE_UNLABELED:
>>>+                    audit_log_format(audit_buf, " protocol=unlbl");
>>>+                    break;
>>>+            case NETLBL_NLTYPE_CIPSOV4:
>>>+                    audit_log_format(audit_buf,
>>>+                                     " protocol=cipsov4 doi=%u",
>>>+                                     entry->type_def.cipsov4->doi);
>>>+                    break;
>>>+            }
>>>+            audit_log_end(audit_buf);
>>>+    }
>>>     rcu_read_unlock();
>>>
>>>     if (ret_val != 0) {
>>>@@ -254,6 +279,7 @@ int netlbl_domhsh_add(struct netlbl_dom_
>>> /**
>>>  * netlbl_domhsh_add_default - Adds the default entry to the domain hash
>>>table * @entry: the entry to add
>>>+ * @audit_secid: the LSM secid to use in the audit message
>>>  *
>>>  * Description:
>>>  * Adds a new default entry to the domain hash table and handles any
>>>updates @@ -261,14 +287,15 @@ int netlbl_domhsh_add(struct netlbl_dom_
>>>  * negative on failure.
>>>  *
>>>  */
>>>-int netlbl_domhsh_add_default(struct netlbl_dom_map *entry)
>>>+int netlbl_domhsh_add_default(struct netlbl_dom_map *entry, u32
>>>audit_secid) {
>>>-    return netlbl_domhsh_add(entry);
>>>+    return netlbl_domhsh_add(entry, audit_secid);
>>> }
>>>
>>> /**
>>>  * netlbl_domhsh_remove - Removes an entry from the domain hash table
>>>  * @domain: the domain to remove
>>>+ * @audit_secid: the LSM secid to use in the audit message
>>>  *
>>>  * Description:
>>>  * Removes an entry from the domain hash table and handles any updates to
>>>the @@ -276,10 +303,12 @@ int netlbl_domhsh_add_default(struct net
>>>  * negative on failure.
>>>  *
>>>  */
>>>-int netlbl_domhsh_remove(const char *domain)
>>>+int netlbl_domhsh_remove(const char *domain, u32 audit_secid)
>>> {
>>>     int ret_val = -ENOENT;
>>>     struct netlbl_dom_map *entry;
>>>+    struct audit_buffer *audit_buf;
>>>+    char *audit_domain;
>>>
>>>     rcu_read_lock();
>>>     if (domain != NULL)
>>>@@ -316,8 +345,18 @@ int netlbl_domhsh_remove(const char *dom
>>>                     ret_val = -ENOENT;
>>>             spin_unlock(&netlbl_domhsh_def_lock);
>>>     }
>>>-    if (ret_val == 0)
>>>+    if (ret_val == 0) {
>>>+            if (entry->domain != NULL)
>>>+                    audit_domain = entry->domain;
>>>+            else
>>>+                    audit_domain = "(default)";
>>>+            audit_buf = netlbl_audit_start_common(AUDIT_MAC_MAP_DEL,
>>>+                                                  audit_secid);
>>>+            audit_log_format(audit_buf, " domain=%s", audit_domain);
>>>+            audit_log_end(audit_buf);
>>>+
>>>             call_rcu(&entry->rcu, netlbl_domhsh_free_entry);
>>>+    }
>>>
>>> remove_return:
>>>     rcu_read_unlock();
>>>@@ -326,6 +365,7 @@ remove_return:
>>>
>>> /**
>>>  * netlbl_domhsh_remove_default - Removes the default entry from the table
>>>+ * @audit_secid: the LSM secid to use in the audit message
>>>  *
>>>  * Description:
>>>  * Removes/resets the default entry for the domain hash table and handles
>>>any @@ -333,9 +373,9 @@ remove_return:
>>>  * success, non-zero on failure.
>>>  *
>>>  */
>>>-int netlbl_domhsh_remove_default(void)
>>>+int netlbl_domhsh_remove_default(u32 audit_secid)
>>> {
>>>-    return netlbl_domhsh_remove(NULL);
>>>+    return netlbl_domhsh_remove(NULL, audit_secid);
>>> }
>>>
>>> /**
>>>Index: net-2.6/net/netlabel/netlabel_domainhash.h
>>>===================================================================
>>>--- net-2.6.orig/net/netlabel/netlabel_domainhash.h
>>>+++ net-2.6/net/netlabel/netlabel_domainhash.h
>>>@@ -57,9 +57,9 @@ struct netlbl_dom_map {
>>> int netlbl_domhsh_init(u32 size);
>>>
>>> /* Manipulate the domain hash table */
>>>-int netlbl_domhsh_add(struct netlbl_dom_map *entry);
>>>-int netlbl_domhsh_add_default(struct netlbl_dom_map *entry);
>>>-int netlbl_domhsh_remove_default(void);
>>>+int netlbl_domhsh_add(struct netlbl_dom_map *entry, u32 audit_secid);
>>>+int netlbl_domhsh_add_default(struct netlbl_dom_map *entry, u32
>>>audit_secid); +int netlbl_domhsh_remove_default(u32 audit_secid);
>>> struct netlbl_dom_map *netlbl_domhsh_getentry(const char *domain);
>>> int netlbl_domhsh_walk(u32 *skip_bkt,
>>>                  u32 *skip_chain,
>>>Index: net-2.6/net/netlabel/netlabel_mgmt.c
>>>===================================================================
>>>--- net-2.6.orig/net/netlabel/netlabel_mgmt.c
>>>+++ net-2.6/net/netlabel/netlabel_mgmt.c
>>>@@ -108,7 +108,7 @@ static int netlbl_mgmt_add(struct sk_buf
>>>
>>>     switch (entry->type) {
>>>     case NETLBL_NLTYPE_UNLABELED:
>>>-            ret_val = netlbl_domhsh_add(entry);
>>>+            ret_val = netlbl_domhsh_add(entry, NETLINK_CB(skb).sid);
>>>             break;
>>>     case NETLBL_NLTYPE_CIPSOV4:
>>>             if (!info->attrs[NLBL_MGMT_A_CV4DOI])
>>>@@ -125,7 +125,7 @@ static int netlbl_mgmt_add(struct sk_buf
>>>                     rcu_read_unlock();
>>>                     goto add_failure;
>>>             }
>>>-            ret_val = netlbl_domhsh_add(entry);
>>>+            ret_val = netlbl_domhsh_add(entry, NETLINK_CB(skb).sid);
>>>             rcu_read_unlock();
>>>             break;
>>>     default:
>>>@@ -161,7 +161,7 @@ static int netlbl_mgmt_remove(struct sk_
>>>             return -EINVAL;
>>>
>>>     domain = nla_data(info->attrs[NLBL_MGMT_A_DOMAIN]);
>>>-    return netlbl_domhsh_remove(domain);
>>>+    return netlbl_domhsh_remove(domain, NETLINK_CB(skb).sid);
>>> }
>>>
>>> /**
>>>@@ -277,7 +277,8 @@ static int netlbl_mgmt_adddef(struct sk_
>>>
>>>     switch (entry->type) {
>>>     case NETLBL_NLTYPE_UNLABELED:
>>>-            ret_val = netlbl_domhsh_add_default(entry);
>>>+            ret_val = netlbl_domhsh_add_default(entry,
>>>+                                                NETLINK_CB(skb).sid);
>>>             break;
>>>     case NETLBL_NLTYPE_CIPSOV4:
>>>             if (!info->attrs[NLBL_MGMT_A_CV4DOI])
>>>@@ -294,7 +295,8 @@ static int netlbl_mgmt_adddef(struct sk_
>>>                     rcu_read_unlock();
>>>                     goto adddef_failure;
>>>             }
>>>-            ret_val = netlbl_domhsh_add_default(entry);
>>>+            ret_val = netlbl_domhsh_add_default(entry,
>>>+                                                NETLINK_CB(skb).sid);
>>>             rcu_read_unlock();
>>>             break;
>>>     default:
>>>@@ -322,7 +324,7 @@ adddef_failure:
>>>  */
>>> static int netlbl_mgmt_removedef(struct sk_buff *skb, struct genl_info
>>>*info) {
>>>-    return netlbl_domhsh_remove_default();
>>>+    return netlbl_domhsh_remove_default(NETLINK_CB(skb).sid);
>>> }
>>>
>>> /**
>>>Index: net-2.6/net/netlabel/netlabel_unlabeled.c
>>>===================================================================
>>>--- net-2.6.orig/net/netlabel/netlabel_unlabeled.c
>>>+++ net-2.6/net/netlabel/netlabel_unlabeled.c
>>>@@ -64,6 +64,27 @@ static struct nla_policy netlbl_unlabel_
>>> };
>>>
>>> /*
>>>+ * Helper Functions
>>>+ */
>>>+
>>>+/**
>>>+ * netlbl_unlabel_acceptflg_set - Set the unlabeled accept flag
>>>+ * @value: desired value
>>>+ * @audit_secid: the LSM secid to use in the audit message
>>>+ *
>>>+ * Description:
>>>+ * Set the value of the unlabeled accept flag to @value.
>>>+ *
>>>+ */
>>>+static void netlbl_unlabel_acceptflg_set(u8 value, u32 audit_secid)
>>>+{
>>>+    atomic_set(&netlabel_unlabel_accept_flg, value);
>>>+    netlbl_audit_nomsg((value ?
>>>+                        AUDIT_MAC_UNLBL_ACCEPT : AUDIT_MAC_UNLBL_DENY),
>>>+                       audit_secid);
>>
>>Looking at how this is being used, I think only 1 message type should be 
>>used. 
>>There are places in the audit system where we set a flag to 1 or 0, but only 
>>have 1 message type. We record the old and new value. So, you'd need to pass 
>>that to the logger.
>>
>>
>>>+}
>>>+
>>>+/*
>>>  * NetLabel Command Handlers
>>>  */
>>>
>>>@@ -79,18 +100,18 @@ static struct nla_policy netlbl_unlabel_
>>>  */
>>> static int netlbl_unlabel_accept(struct sk_buff *skb, struct genl_info
>>>*info) {
>>>-    int ret_val = -EINVAL;
>>>     u8 value;
>>>
>>>     if (info->attrs[NLBL_UNLABEL_A_ACPTFLG]) {
>>>             value = nla_get_u8(info->attrs[NLBL_UNLABEL_A_ACPTFLG]);
>>>             if (value == 1 || value == 0) {
>>>-                    atomic_set(&netlabel_unlabel_accept_flg, value);
>>>-                    ret_val = 0;
>>>+                    netlbl_unlabel_acceptflg_set(value,
>>>+                                                 NETLINK_CB(skb).sid);
>>>+                    return 0;
>>>             }
>>>     }
>>>
>>>-    return ret_val;
>>>+    return -EINVAL;
>>> }
>>>
>>> /**
>>>@@ -229,16 +250,19 @@ int netlbl_unlabel_defconf(void)
>>> {
>>>     int ret_val;
>>>     struct netlbl_dom_map *entry;
>>>+    u32 secid;
>>>+
>>>+    security_task_getsecid(current, &secid);
>>>
>>>     entry = kzalloc(sizeof(*entry), GFP_KERNEL);
>>>     if (entry == NULL)
>>>             return -ENOMEM;
>>>     entry->type = NETLBL_NLTYPE_UNLABELED;
>>>-    ret_val = netlbl_domhsh_add_default(entry);
>>>+    ret_val = netlbl_domhsh_add_default(entry, secid);
>>>     if (ret_val != 0)
>>>             return ret_val;
>>>
>>>-    atomic_set(&netlabel_unlabel_accept_flg, 1);
>>>+    netlbl_unlabel_acceptflg_set(1, secid);
>>>
>>>     return 0;
>>> }
>>>Index: net-2.6/net/netlabel/netlabel_user.c
>>>===================================================================
>>>--- net-2.6.orig/net/netlabel/netlabel_user.c
>>>+++ net-2.6/net/netlabel/netlabel_user.c
>>>@@ -32,6 +32,9 @@
>>> #include <linux/types.h>
>>> #include <linux/list.h>
>>> #include <linux/socket.h>
>>>+#include <linux/audit.h>
>>>+#include <linux/tty.h>
>>>+#include <linux/security.h>
>>> #include <net/sock.h>
>>> #include <net/netlink.h>
>>> #include <net/genetlink.h>
>>>@@ -74,3 +77,91 @@ int netlbl_netlink_init(void)
>>>
>>>     return 0;
>>> }
>>>+
>>>+/*
>>>+ * NetLabel Audit Functions
>>>+ */
>>>+
>>>+/**
>>>+ * netlbl_audit_start_common - Start an audit message
>>>+ * @type: audit message type
>>>+ * @secid: LSM context ID
>>>+ *
>>>+ * Description:
>>>+ * Start an audit message using the type specified in @type and fill the
>>>audit + * message with some fields common to all NetLabel audit messages. 
>>>Returns + * a pointer to the audit buffer on success, NULL on failure.
>>>+ *
>>>+ */
>>>+struct audit_buffer *netlbl_audit_start_common(int type, u32 secid)
>>>+{
>>
>>Generally, logging functions are moved into auditsc.c where the context and 
>>other functions are defined. 
>>
>>
>>>+    struct audit_context *audit_ctx = current->audit_context;
>>>+    struct audit_buffer *audit_buf;
>>>+    uid_t audit_loginuid;
>>>+    const char *audit_tty;
>>>+    char audit_comm[sizeof(current->comm)];
>>>+    struct vm_area_struct *vma;
>>>+    char *secctx;
>>>+    u32 secctx_len;
>>>+
>>>+    audit_buf = audit_log_start(audit_ctx, GFP_ATOMIC, type);
>>>+    if (audit_buf == NULL)
>>>+            return NULL;
>>>+
>>>+    audit_loginuid = audit_get_loginuid(audit_ctx);
>>
>>Netlink is async protocol, you should use the loginuid of the netlink packet 
>>and pass it into this function.
>>
>>
>>>+    if (current->signal &&
>>>+        current->signal->tty &&
>>>+        current->signal->tty->name)
>>>+            audit_tty = current->signal->tty->name;
>>>+    else
>>>+            audit_tty = "(none)";
>>
>>Netlink is an async protocol. How do you know that the sender is current? 
>>This 
>>is a global comment, please check use of current everywhere.
>>
>>
>>>+    get_task_comm(audit_comm, current);
>>>+
>>>+    audit_log_format(audit_buf,
>>>+                     "netlabel: auid=%u uid=%u tty=%s pid=%d",
>>>+                     audit_loginuid,
>>>+                     current->uid,
>>>+                     audit_tty,
>>>+                     current->pid);
>>
>>Why are you logging all this? When we add audit rules, all that we log is the 
>>auid, and subj. If we need to log all this, we should probably have a helper 
>>function that gets called by other config change loggers.
>>
>>
>>>+    audit_log_format(audit_buf, " comm=");
>>>+    audit_log_untrustedstring(audit_buf, audit_comm);
>>>+    if (current->mm) {
>>>+            down_read(&current->mm->mmap_sem);
>>>+            vma = current->mm->mmap;
>>>+            while (vma) {
>>>+                    if ((vma->vm_flags & VM_EXECUTABLE) &&
>>>+                        vma->vm_file) {
>>>+                            audit_log_d_path(audit_buf,
>>>+                                             " exe=",
>>>+                                             vma->vm_file->f_dentry,
>>>+                                             vma->vm_file->f_vfsmnt);
>>>+                            break;
>>>+                    }
>>>+                    vma = vma->vm_next;
>>>+            }
>>>+            up_read(&current->mm->mmap_sem);
>>>+    }
>>>+
>>
>>If this function was moved inside auditsc.c you could use a function there 
>>that does this. But the question remains why all this data?
>>
>>
>>>+    if (secid != 0 &&
>>>+        security_secid_to_secctx(secid, &secctx, &secctx_len) == 0)
>>>+            audit_log_format(audit_buf, " subj=%s", secctx);
>>>+
>>>+    return audit_buf;
>>>+}
>>>+
>>>+/**
>>>+ * netlbl_audit_nomsg - Send an audit message without additional text
>>>+ * @type: audit message type
>>>+ * @secid: LSM context ID
>>>+ *
>>>+ * Description:
>>>+ * Send an audit message with only the common NetLabel audit fields.
>>>+ *
>>>+ */
>>>+void netlbl_audit_nomsg(int type, u32 secid)
>>>+{
>>>+    struct audit_buffer *audit_buf;
>>>+
>>>+    audit_buf = netlbl_audit_start_common(type, secid);
>>>+    audit_log_end(audit_buf);
>>
>>We normally record old and new value when changing flags like this.
>>
>>
>>>+}
>>>Index: net-2.6/net/netlabel/netlabel_user.h
>>>===================================================================
>>>--- net-2.6.orig/net/netlabel/netlabel_user.h
>>>+++ net-2.6/net/netlabel/netlabel_user.h
>>>@@ -34,6 +34,7 @@
>>> #include <linux/types.h>
>>> #include <linux/skbuff.h>
>>> #include <linux/capability.h>
>>>+#include <linux/audit.h>
>>> #include <net/netlink.h>
>>> #include <net/genetlink.h>
>>> #include <net/netlabel.h>
>>>@@ -75,4 +76,9 @@ static inline void *netlbl_netlink_hdr_p
>>>
>>> int netlbl_netlink_init(void);
>>>
>>>+/* NetLabel Audit Functions */
>>>+
>>>+struct audit_buffer *netlbl_audit_start_common(int type, u32 secid);
>>>+void netlbl_audit_nomsg(int type, u32 secid);
>>>+
>>> #endif
>>>
>>>--
>>>paul moore
>>>linux security @ hp
>>>
>>>--
>>>Linux-audit mailing list
>>>Linux-audit@redhat.com
>>>https://www.redhat.com/mailman/listinfo/linux-audit
>>
>>-
>>To unsubscribe from this list: send the line "unsubscribe netdev" in
>>the body of a message to [EMAIL PROTECTED]
>>More majordomo info at  http://vger.kernel.org/majordomo-info.html
>>
> 
> 


-- 
paul moore
linux security @ hp
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to