audit_start.c revision 134a1f4e3289b54e0f980e9cf05352e419a60bee
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson/*
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * CDDL HEADER START
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson *
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * The contents of this file are subject to the terms of the
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * Common Development and Distribution License (the "License").
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * You may not use this file except in compliance with the License.
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson *
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * or http://www.opensolaris.org/os/licensing.
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * See the License for the specific language governing permissions
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * and limitations under the License.
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson *
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * When distributing Covered Code, include this CDDL HEADER in each
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * If applicable, add the following below this CDDL HEADER, with the
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * fields enclosed by brackets "[]" replaced with your own identifying
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * information: Portions Copyright [yyyy] [name of copyright owner]
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson *
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * CDDL HEADER END
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson */
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson/*
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * Copyright (c) 1992, 2010, Oracle and/or its affiliates. All rights reserved.
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson */
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson/*
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson * This file contains the envelope code for system call auditing.
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson */
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/param.h>
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/types.h>
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/time.h>
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/kmem.h>
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/proc.h>
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/vnode.h>
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/file.h>
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/user.h>
275c6188235928b3dd559604a86f4bac24bf685eAndreas Gustafsson#include <sys/stropts.h>
#include <sys/systm.h>
#include <sys/pathname.h>
#include <sys/debug.h>
#include <sys/cred.h>
#include <sys/zone.h>
#include <c2/audit.h>
#include <c2/audit_kernel.h>
#include <c2/audit_kevents.h>
#include <c2/audit_record.h>
#include "audit_door_infc.h"
extern uint_t num_syscall; /* size of audit_s2e table */
extern kmutex_t pidlock; /* proc table lock */
/*
* Obsolete and ignored - Historically, the 'set c2audit:audit_load=1' entry
* in /etc/system enabled auditing. The No Reboot Audit project does not
* use this entry. However, to prevent the system from printing warning
* messages, the audit_load entry is being left in /etc/system. It will be
* removed when there is a small chance that the entry is used on currently
* running systems.
*/
int audit_load = 0;
kmutex_t module_lock; /* audit_module_state lock */
/*
* Das Boot. Initialize first process. Also generate an audit record indicating
* that the system has been booted.
*/
void
audit_init_module()
{
token_t *rp = NULL;
label_t jb;
t_audit_data_t *tad = U2A(u);
/*
* Solaris Auditing module is being loaded -> change the state. The lock
* is here to prevent memory leaks caused by multiple initializations.
*/
mutex_enter(&module_lock);
if (audit_active != C2AUDIT_UNLOADED) {
mutex_exit(&module_lock);
return;
}
audit_active = C2AUDIT_LOADED;
mutex_exit(&module_lock);
/* initialize memory allocators */
au_mem_init();
/*
* setup environment for asynchronous auditing. We can't use
* audit_async_start() here since it assumes the audit system
* has been started via auditd(1m). auditd sets the variable,
* auk_auditstate, to indicate audit record generation should
* commence. Here we want to always generate an audit record.
*/
if (setjmp(&jb)) {
/* process audit policy (AUDIT_AHLT) for asynchronous events */
audit_async_drop((caddr_t *)(&rp), 0);
return;
}
ASSERT(tad->tad_errjmp == NULL);
tad->tad_errjmp = (void *)&jb;
tad->tad_ctrl |= PAD_ERRJMP;
/* generate a system-booted audit record */
au_write((caddr_t *)&rp, au_to_text("booting kernel"));
audit_async_finish((caddr_t *)&rp, AUE_SYSTEMBOOT, NULL,
&(p0.p_user.u_start));
}
/*
* Enter system call. Do any necessary setup here. allocate resouces, etc.
*/
#include <sys/syscall.h>
/*ARGSUSED*/
int
audit_start(
unsigned type,
unsigned scid,
uint32_t audit_state,
int error,
klwp_t *lwp)
{
struct t_audit_data *tad;
au_kcontext_t *kctx;
tad = U2A(u);
ASSERT(tad != NULL);
/* Remember the audit state in the cache */
tad->tad_audit = audit_state;
if (error) {
tad->tad_ctrl = 0;
tad->tad_flag = 0;
return (0);
}
audit_update_context(curproc, NULL);
/*
* if this is an indirect system call then don't do anything.
* audit_start will be called again from indir() in trap.c
*/
if (scid == 0) {
tad->tad_ctrl = 0;
tad->tad_flag = 0;
return (0);
}
if (scid >= num_syscall)
scid = 0;
/*
* we can no longer depend on a valid lwp_ap, so we need to
* copy the syscall args as future audit stuff may need them.
*/
(void) save_syscall_args();
/*
* We need to gather paths for certain system calls even if they are
* not audited so that we can audit the various f* calls and be
* sure to have a CWD and CAR. Thus we thus set tad_ctrl over the
* system call regardless if the call is audited or not.
* We allow the event specific initial processing routines (au_init)
* to adjust the tad_ctrl as necessary.
*/
tad->tad_ctrl = audit_s2e[scid].au_ctrl;
tad->tad_scid = scid;
/* get basic event for system call */
tad->tad_event = audit_s2e[scid].au_event;
if (audit_s2e[scid].au_init != (au_event_t)AUE_NULL) {
/* get specific event */
tad->tad_event = (*audit_s2e[scid].au_init)(tad->tad_event);
}
kctx = GET_KCTX_PZ;
/* now do preselection. Audit or not to Audit, that is the question */
if ((tad->tad_flag = auditme(kctx, tad,
kctx->auk_ets[tad->tad_event])) == 0) {
/*
* we assume that audit_finish will always be called.
*/
return (0);
}
/*
* if auditing not enabled, then don't generate an audit record
* and don't count it.
*/
if (audit_state & ~(AUC_AUDITING | AUC_INIT_AUDIT)) {
/*
* we assume that audit_finish will always be called.
*/
tad->tad_flag = 0;
return (0);
}
/*
* audit daemon has informed us that there is no longer any
* space left to hold audit records. We decide here if records
* should be dropped (but counted).
*/
if (audit_state == AUC_NOSPACE) {
if ((kctx->auk_policy & AUDIT_CNT) ||
(kctx->auk_policy & AUDIT_SCNT)) {
/* assume that audit_finish will always be called. */
tad->tad_flag = 0;
/* just count # of dropped audit records */
AS_INC(as_dropped, 1, kctx);
return (0);
}
}
tad->tad_evmod = 0;
if (audit_s2e[scid].au_start != NULL) {
/* do start of system call processing */
(*audit_s2e[scid].au_start)(tad);
}
return (0);
}
/*
* system call has completed. Now determine if we genearate an audit record
* or not.
*/
/*ARGSUSED*/
void
audit_finish(
unsigned type,
unsigned scid,
int error,
rval_t *rval)
{
struct t_audit_data *tad;
int flag;
au_defer_info_t *attr;
au_kcontext_t *kctx = GET_KCTX_PZ;
tad = U2A(u);
/*
* Process all deferred events first.
*/
attr = tad->tad_defer_head;
while (attr != NULL) {
au_defer_info_t *tmp_attr = attr;
au_close_time(kctx, (token_t *)attr->audi_ad, attr->audi_flag,
attr->audi_e_type, attr->audi_e_mod, &(attr->audi_atime));
attr = attr->audi_next;
kmem_free(tmp_attr, sizeof (au_defer_info_t));
}
tad->tad_defer_head = tad->tad_defer_tail = NULL;
if (tad->tad_flag == 0 && !(tad->tad_ctrl & PAD_SAVPATH)) {
/*
* clear the ctrl flag so that we don't have spurious
* collection of audit information.
*/
tad->tad_scid = 0;
tad->tad_event = 0;
tad->tad_evmod = 0;
tad->tad_ctrl = 0;
tad->tad_audit = AUC_UNSET;
ASSERT(tad->tad_aupath == NULL);
return;
}
scid = tad->tad_scid;
/*
* Perform any extra processing and determine if we are
* really going to generate any audit record.
*/
if (audit_s2e[scid].au_finish != NULL) {
/* do any post system call processing */
(*audit_s2e[scid].au_finish)(tad, error, rval);
}
if (tad->tad_flag) {
tad->tad_flag = 0;
if (flag = audit_success(kctx, tad, error, NULL)) {
unsigned int sy_flags;
cred_t *cr = CRED();
const auditinfo_addr_t *ainfo = crgetauinfo(cr);
ASSERT(ainfo != NULL);
/* Add subject information */
AUDIT_SETSUBJ(&(u_ad), cr, ainfo, kctx);
if (tad->tad_evmod & PAD_SPRIVUSE) {
au_write(&(u_ad),
au_to_privset("", &tad->tad_sprivs,
AUT_UPRIV, 1));
}
if (tad->tad_evmod & PAD_FPRIVUSE) {
au_write(&(u_ad),
au_to_privset("", &tad->tad_fprivs,
AUT_UPRIV, 0));
}
/* Add a return token */
#ifdef _SYSCALL32_IMPL
if (lwp_getdatamodel(ttolwp(curthread)) ==
DATAMODEL_NATIVE) {
sy_flags = sysent[scid].sy_flags & SE_RVAL_MASK;
} else {
sy_flags =
sysent32[scid].sy_flags & SE_RVAL_MASK;
}
#else /* _SYSCALL64_IMPL */
sy_flags = sysent[scid].sy_flags & SE_RVAL_MASK;
#endif /* _SYSCALL32_IMPL */
if (sy_flags == SE_32RVAL1) {
if (type == 0) {
au_write(&(u_ad),
au_to_return32(error, 0));
} else {
au_write(&(u_ad), au_to_return32(error,
rval->r_val1));
}
}
if (sy_flags == (SE_32RVAL2|SE_32RVAL1)) {
if (type == 0) {
au_write(&(u_ad),
au_to_return32(error, 0));
} else {
au_write(&(u_ad),
au_to_return32(error,
rval->r_val1));
#ifdef NOTYET /* for possible future support */
au_write(&(u_ad), au_to_return32(error,
rval->r_val2));
#endif
}
}
if (sy_flags == SE_64RVAL) {
if (type == 0) {
au_write(&(u_ad),
au_to_return64(error, 0));
} else {
au_write(&(u_ad), au_to_return64(error,
rval->r_vals));
}
}
AS_INC(as_generated, 1, kctx);
AS_INC(as_kernel, 1, kctx);
}
/* Close up everything */
au_close(kctx, &(u_ad), flag, tad->tad_event, tad->tad_evmod,
NULL);
}
ASSERT(u_ad == NULL);
/* free up any space remaining with the path's */
if (tad->tad_aupath != NULL) {
au_pathrele(tad->tad_aupath);
tad->tad_aupath = NULL;
tad->tad_vn = NULL;
}
/* free up any space remaining with openat path's */
if (tad->tad_atpath) {
au_pathrele(tad->tad_atpath);
tad->tad_atpath = NULL;
}
/*
* clear the ctrl flag so that we don't have spurious collection of
* audit information.
*/
tad->tad_scid = 0;
tad->tad_event = 0;
tad->tad_evmod = 0;
tad->tad_ctrl = 0;
tad->tad_audit = AUC_UNSET;
}
int
audit_success(au_kcontext_t *kctx, struct t_audit_data *tad, int error,
cred_t *cr)
{
au_state_t ess;
au_state_t esf;
au_mask_t amask;
const auditinfo_addr_t *ainfo;
ess = esf = kctx->auk_ets[tad->tad_event];
if (error)
tad->tad_evmod |= PAD_FAILURE;
/* see if we really want to generate an audit record */
if (tad->tad_ctrl & PAD_NOAUDIT)
return (0);
/*
* nfs operation and we're auditing privilege or MAC. This
* is so we have a client audit record to match a nfs server
* audit record.
*/
if (tad->tad_ctrl & PAD_AUDITME)
return (AU_OK);
/*
* Used passed cred if available, otherwise use cred from kernel thread
*/
if (cr == NULL)
cr = CRED();
ainfo = crgetauinfo(cr);
if (ainfo == NULL)
return (0);
amask = ainfo->ai_mask;
if (error == 0)
return ((ess & amask.as_success) ? AU_OK : 0);
else
return ((esf & amask.as_failure) ? AU_OK : 0);
}
/*
* determine if we've preselected this event (system call).
*/
int
auditme(au_kcontext_t *kctx, struct t_audit_data *tad, au_state_t estate)
{
int flag = 0;
au_mask_t amask;
const auditinfo_addr_t *ainfo;
ainfo = crgetauinfo(CRED());
if (ainfo == NULL)
return (0);
amask = ainfo->ai_mask;
/* preselected system call */
if (amask.as_success & estate || amask.as_failure & estate) {
flag = 1;
} else if ((tad->tad_scid == SYS_putmsg) ||
(tad->tad_scid == SYS_getmsg)) {
estate = kctx->auk_ets[AUE_SOCKCONNECT] |
kctx->auk_ets[AUE_SOCKACCEPT] |
kctx->auk_ets[AUE_SOCKSEND] |
kctx->auk_ets[AUE_SOCKRECEIVE];
if (amask.as_success & estate || amask.as_failure & estate)
flag = 1;
} else if (tad->tad_scid == SYS_execve &&
getpflags(PRIV_PFEXEC, CRED()) != 0) {
estate = kctx->auk_ets[AUE_PFEXEC];
if (amask.as_success & estate || amask.as_failure & estate)
flag = 1;
}
return (flag);
}