On Sun, Sep 24, 2017 at 11:25 PM, Steve Grubb <sgrubb@xxxxxxxxxx> wrote: > Hello, > > The fanotify interface allows user space daemons to make access > control decisions. Under common criteria requirements, we need to > optionally record decisions based on policy. This patch adds a bit mask, > FAN_AUDIT, that a user space daemon can 'or' into the response decision > which will tell the kernel that it made a decision and record it. > > It would be used something like this in user space code: > > response.response = FAN_DENY | FAN_AUDIT; > write(fd, &response, sizeof(struct fanotify_response)); > > When the syscall ends, the audit system will record the decision as a > AUDIT_FANOTIFY auxiliary record to denote that the reason this event > occurred is the result of an access control decision from fanotify > rather than DAC or MAC policy. > > A sample event looks like this: > > type=PATH msg=audit(1504310584.332:290): item=0 name="./evil-ls" > inode=1319561 dev=fc:03 mode=0100755 ouid=1000 ogid=1000 rdev=00:00 > obj=unconfined_u:object_r:user_home_t:s0 nametype=NORMAL > type=CWD msg=audit(1504310584.332:290): cwd="/home/sgrubb" > type=SYSCALL msg=audit(1504310584.332:290): arch=c000003e syscall=2 > success=no exit=-1 a0=32cb3fca90 a1=0 a2=43 a3=8 items=1 ppid=901 > pid=959 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 > fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=pts1 ses=3 comm="bash" > exe="/usr/bin/bash" subj=unconfined_u:unconfined_r:unconfined_t: > s0-s0:c0.c1023 key=(null) > type=FANOTIFY msg=audit(1504310584.332:290): resp=2 > > Prior to using the audit flag, the developer needs to call > fanotify_init or'ing in FAN_AUDIT_ENABLE to ensure that the kernel > supports auditing. The calling process must also have the CAP_AUDIT_WRITE > capability. > > Signed-off-by: sgrubb <sgrubb@xxxxxxxxxx> Please CC linux-api !!! A few small nits below ... > diff --git a/fs/notify/fanotify/fanotify_user.c b/fs/notify/fanotify/fanotify_user.c > index 907a481..37e2b60 100644 > --- a/fs/notify/fanotify/fanotify_user.c > +++ b/fs/notify/fanotify/fanotify_user.c > @@ -179,7 +179,7 @@ static int process_access_response(struct fsnotify_group *group, > * userspace can send a valid response or we will clean it up after the > * timeout > */ > - switch (response) { > + switch (response & ~FAN_AUDIT) { > case FAN_ALLOW: > case FAN_DENY: > break; > @@ -190,6 +190,11 @@ static int process_access_response(struct fsnotify_group *group, > if (fd < 0) > return -EINVAL; > > +#ifdef CONFIG_AUDITSYSCALL > + if ((response & FAN_AUDIT) && (group->audit_enabled == 0)) > + return -EINVAL; > +#endif > + Remove ifdef. this *should* return EINVAL if !defined CONFIG_AUDITSYSCALL > event = dequeue_event(group, fd); > if (!event) > return -ENOENT; > @@ -805,6 +810,16 @@ SYSCALL_DEFINE2(fanotify_init, unsigned int, flags, unsigned int, event_f_flags) > group->fanotify_data.max_marks = FANOTIFY_DEFAULT_MAX_MARKS; > } > > +#ifdef CONFIG_AUDITSYSCALL > + if (flags & FAN_ENABLE_AUDIT) { > + fd = -EPERM; > + if (!capable(CAP_AUDIT_WRITE)) > + goto out_destroy_group; > + group->audit_enabled = 1; > + } else > + group->audit_enabled = 0; Remove else case. group struct in zallocated (and in any case, if {} should be followed by else {}) ... > diff --git a/include/linux/fsnotify_backend.h b/include/linux/fsnotify_backend.h > index c6c6931..470d02b 100644 > --- a/include/linux/fsnotify_backend.h > +++ b/include/linux/fsnotify_backend.h > @@ -193,6 +193,9 @@ struct fsnotify_group { > } fanotify_data; > #endif /* CONFIG_FANOTIFY */ > }; > +#ifdef CONFIG_AUDITSYSCALL > + unsigned int audit_enabled; > +#endif Remove ifdef. audit_enabled == 0 should be the indication also when !defined CONFIG_AUDITSYSCALL The less ifdefs the better. This is not a struct that is multiplied many times so the extra integer is not important. Thanks, Amir.