2 * Creating audit events from TTY input.
4 * Copyright (C) 2007 Red Hat, Inc. All rights reserved. This copyrighted
5 * material is made available to anyone wishing to use, modify, copy, or
6 * redistribute it subject to the terms and conditions of the GNU General
9 * Authors: Miloslav Trmac <mitr@redhat.com>
12 #include <linux/audit.h>
13 #include <linux/file.h>
14 #include <linux/tty.h>
16 struct tty_audit_buf
{
18 struct mutex mutex
; /* Protects all data below */
19 int major
, minor
; /* The TTY which the data is from */
22 unsigned char *data
; /* Allocated size N_TTY_BUF_SIZE */
25 static struct tty_audit_buf
*tty_audit_buf_alloc(int major
, int minor
,
28 struct tty_audit_buf
*buf
;
30 buf
= kmalloc(sizeof(*buf
), GFP_KERNEL
);
33 if (PAGE_SIZE
!= N_TTY_BUF_SIZE
)
34 buf
->data
= kmalloc(N_TTY_BUF_SIZE
, GFP_KERNEL
);
36 buf
->data
= (unsigned char *)__get_free_page(GFP_KERNEL
);
39 atomic_set(&buf
->count
, 1);
40 mutex_init(&buf
->mutex
);
53 static void tty_audit_buf_free(struct tty_audit_buf
*buf
)
55 WARN_ON(buf
->valid
!= 0);
56 if (PAGE_SIZE
!= N_TTY_BUF_SIZE
)
59 free_page((unsigned long)buf
->data
);
63 static void tty_audit_buf_put(struct tty_audit_buf
*buf
)
65 if (atomic_dec_and_test(&buf
->count
))
66 tty_audit_buf_free(buf
);
70 * tty_audit_buf_push - Push buffered data out
72 * Generate an audit message from the contents of @buf, which is owned by
73 * @tsk with @loginuid. @buf->mutex must be locked.
75 static void tty_audit_buf_push(struct task_struct
*tsk
, uid_t loginuid
,
76 unsigned int sessionid
,
77 struct tty_audit_buf
*buf
)
79 struct audit_buffer
*ab
;
83 if (audit_enabled
== 0)
85 ab
= audit_log_start(NULL
, GFP_KERNEL
, AUDIT_TTY
);
87 char name
[sizeof(tsk
->comm
)];
89 audit_log_format(ab
, "tty pid=%u uid=%u auid=%u ses=%u "
90 "major=%d minor=%d comm=", tsk
->pid
, tsk
->uid
,
91 loginuid
, sessionid
, buf
->major
, buf
->minor
);
92 get_task_comm(name
, tsk
);
93 audit_log_untrustedstring(ab
, name
);
94 audit_log_format(ab
, " data=");
95 audit_log_n_untrustedstring(ab
, buf
->valid
, buf
->data
);
102 * tty_audit_buf_push_current - Push buffered data out
104 * Generate an audit message from the contents of @buf, which is owned by
105 * the current task. @buf->mutex must be locked.
107 static void tty_audit_buf_push_current(struct tty_audit_buf
*buf
)
109 uid_t auid
= audit_get_loginuid(current
);
110 unsigned int sessionid
= audit_get_sessionid(current
);
111 tty_audit_buf_push(current
, auid
, sessionid
, buf
);
115 * tty_audit_exit - Handle a task exit
117 * Make sure all buffered data is written out and deallocate the buffer.
118 * Only needs to be called if current->signal->tty_audit_buf != %NULL.
120 void tty_audit_exit(void)
122 struct tty_audit_buf
*buf
;
124 spin_lock_irq(¤t
->sighand
->siglock
);
125 buf
= current
->signal
->tty_audit_buf
;
126 current
->signal
->tty_audit_buf
= NULL
;
127 spin_unlock_irq(¤t
->sighand
->siglock
);
131 mutex_lock(&buf
->mutex
);
132 tty_audit_buf_push_current(buf
);
133 mutex_unlock(&buf
->mutex
);
135 tty_audit_buf_put(buf
);
139 * tty_audit_fork - Copy TTY audit state for a new task
141 * Set up TTY audit state in @sig from current. @sig needs no locking.
143 void tty_audit_fork(struct signal_struct
*sig
)
145 spin_lock_irq(¤t
->sighand
->siglock
);
146 sig
->audit_tty
= current
->signal
->audit_tty
;
147 spin_unlock_irq(¤t
->sighand
->siglock
);
148 sig
->tty_audit_buf
= NULL
;
152 * tty_audit_push_task - Flush task's pending audit data
154 void tty_audit_push_task(struct task_struct
*tsk
, uid_t loginuid
)
156 struct tty_audit_buf
*buf
;
157 /* FIXME I think this is correct. Check against netlink once that is
158 * I really need to read this code more closely. But that's for
161 unsigned int sessionid
= audit_get_sessionid(tsk
);
163 spin_lock_irq(&tsk
->sighand
->siglock
);
164 buf
= tsk
->signal
->tty_audit_buf
;
166 atomic_inc(&buf
->count
);
167 spin_unlock_irq(&tsk
->sighand
->siglock
);
171 mutex_lock(&buf
->mutex
);
172 tty_audit_buf_push(tsk
, loginuid
, sessionid
, buf
);
173 mutex_unlock(&buf
->mutex
);
175 tty_audit_buf_put(buf
);
179 * tty_audit_buf_get - Get an audit buffer.
181 * Get an audit buffer for @tty, allocate it if necessary. Return %NULL
182 * if TTY auditing is disabled or out of memory. Otherwise, return a new
183 * reference to the buffer.
185 static struct tty_audit_buf
*tty_audit_buf_get(struct tty_struct
*tty
)
187 struct tty_audit_buf
*buf
, *buf2
;
191 spin_lock_irq(¤t
->sighand
->siglock
);
192 if (likely(!current
->signal
->audit_tty
))
194 buf
= current
->signal
->tty_audit_buf
;
196 atomic_inc(&buf
->count
);
199 spin_unlock_irq(¤t
->sighand
->siglock
);
201 buf2
= tty_audit_buf_alloc(tty
->driver
->major
,
202 tty
->driver
->minor_start
+ tty
->index
,
205 audit_log_lost("out of memory in TTY auditing");
209 spin_lock_irq(¤t
->sighand
->siglock
);
210 if (!current
->signal
->audit_tty
)
212 buf
= current
->signal
->tty_audit_buf
;
214 current
->signal
->tty_audit_buf
= buf2
;
218 atomic_inc(&buf
->count
);
221 spin_unlock_irq(¤t
->sighand
->siglock
);
223 tty_audit_buf_free(buf2
);
228 * tty_audit_add_data - Add data for TTY auditing.
230 * Audit @data of @size from @tty, if necessary.
232 void tty_audit_add_data(struct tty_struct
*tty
, unsigned char *data
,
235 struct tty_audit_buf
*buf
;
238 if (unlikely(size
== 0))
241 buf
= tty_audit_buf_get(tty
);
245 mutex_lock(&buf
->mutex
);
246 major
= tty
->driver
->major
;
247 minor
= tty
->driver
->minor_start
+ tty
->index
;
248 if (buf
->major
!= major
|| buf
->minor
!= minor
249 || buf
->icanon
!= tty
->icanon
) {
250 tty_audit_buf_push_current(buf
);
253 buf
->icanon
= tty
->icanon
;
258 run
= N_TTY_BUF_SIZE
- buf
->valid
;
261 memcpy(buf
->data
+ buf
->valid
, data
, run
);
265 if (buf
->valid
== N_TTY_BUF_SIZE
)
266 tty_audit_buf_push_current(buf
);
268 mutex_unlock(&buf
->mutex
);
269 tty_audit_buf_put(buf
);
273 * tty_audit_push - Push buffered data out
275 * Make sure no audit data is pending for @tty on the current process.
277 void tty_audit_push(struct tty_struct
*tty
)
279 struct tty_audit_buf
*buf
;
281 spin_lock_irq(¤t
->sighand
->siglock
);
282 if (likely(!current
->signal
->audit_tty
)) {
283 spin_unlock_irq(¤t
->sighand
->siglock
);
286 buf
= current
->signal
->tty_audit_buf
;
288 atomic_inc(&buf
->count
);
289 spin_unlock_irq(¤t
->sighand
->siglock
);
294 major
= tty
->driver
->major
;
295 minor
= tty
->driver
->minor_start
+ tty
->index
;
296 mutex_lock(&buf
->mutex
);
297 if (buf
->major
== major
&& buf
->minor
== minor
)
298 tty_audit_buf_push_current(buf
);
299 mutex_unlock(&buf
->mutex
);
300 tty_audit_buf_put(buf
);
305 * tty_audit_opening - A TTY is being opened.
307 * As a special hack, tasks that close all their TTYs and open new ones
308 * are assumed to be system daemons (e.g. getty) and auditing is
309 * automatically disabled for them.
311 void tty_audit_opening(void)
316 spin_lock_irq(¤t
->sighand
->siglock
);
317 if (current
->signal
->audit_tty
== 0)
319 spin_unlock_irq(¤t
->sighand
->siglock
);
324 if (current
->files
) {
329 * We don't take a ref to the file, so we must hold ->file_lock
332 spin_lock(¤t
->files
->file_lock
);
333 fdt
= files_fdtable(current
->files
);
334 for (i
= 0; i
< fdt
->max_fds
; i
++) {
337 filp
= fcheck_files(current
->files
, i
);
338 if (filp
&& is_tty(filp
)) {
343 spin_unlock(¤t
->files
->file_lock
);
345 task_unlock(current
);
349 spin_lock_irq(¤t
->sighand
->siglock
);
350 current
->signal
->audit_tty
= 0;
351 spin_unlock_irq(¤t
->sighand
->siglock
);