On Tuesday, December 22, 2015 04:03:06 AM Richard Guy Briggs wrote:
> Nothing prevents a new auditd starting up and replacing a valid
> audit_pid when an old auditd is still running, effectively starving out
> the old auditd since audit_pid no longer points to the old valid auditd.
> 
> If no message to auditd has been attempted since auditd died unnaturally
> or got killed, audit_pid will still indicate it is alive.  There isn't
> an easy way to detect if an old auditd is still running on the existing
> audit_pid other than attempting to send a message to see if it fails.
> An -ECONNREFUSED almost certainly means it disappeared and can be
> replaced.  Other errors are not so straightforward and may indicate
> transient problems that will resolve themselves and the old auditd will
> recover.  Yet others will likely need manual intervention for which a
> new auditd will not solve the problem.
> 
> Send a new message type (AUDIT_REPLACE) to the old auditd containing a
> u32 with the PID of the new auditd.  If the audit replace message
> succeeds (or doesn't fail with certainty), fail to register the new
> auditd and return an error (-EEXIST).
> 
> This is expected to make the patch preventing an old auditd orphaning a
> new auditd redundant.
> 
> V3: Switch audit message type from 1000 to 1300 block.
> 
> Signed-off-by: Richard Guy Briggs <r...@redhat.com>
> ---
>  include/uapi/linux/audit.h |    1 +
>  kernel/audit.c             |   16 +++++++++++++++-
>  2 files changed, 16 insertions(+), 1 deletions(-)

Applied to my audit next queue for after the merge window, thanks.

> diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h
> index 843540c..d820aa9 100644
> --- a/include/uapi/linux/audit.h
> +++ b/include/uapi/linux/audit.h
> @@ -110,6 +110,7 @@
>  #define AUDIT_SECCOMP                1326    /* Secure Computing event */
>  #define AUDIT_PROCTITLE              1327    /* Proctitle emit event */
>  #define AUDIT_FEATURE_CHANGE 1328    /* audit log listing feature changes 
*/
> +#define AUDIT_REPLACE                1329    /* Replace auditd if this 
> packet 
unanswerd */
> 
>  #define AUDIT_AVC            1400    /* SE Linux avc denial or grant */
>  #define AUDIT_SELINUX_ERR    1401    /* Internal SE Linux Errors */
> diff --git a/kernel/audit.c b/kernel/audit.c
> index 36989a1..0368be2 100644
> --- a/kernel/audit.c
> +++ b/kernel/audit.c
> @@ -809,6 +809,16 @@ static int audit_set_feature(struct sk_buff *skb)
>       return 0;
>  }
> 
> +static int audit_replace(pid_t pid)
> +{
> +     struct sk_buff *skb = audit_make_reply(0, 0, AUDIT_REPLACE, 0, 0,
> +                                            &pid, sizeof(pid));
> +
> +     if (!skb)
> +             return -ENOMEM;
> +     return netlink_unicast(audit_sock, skb, audit_nlk_portid, 0);
> +}
> +
>  static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
>  {
>       u32                     seq;
> @@ -870,9 +880,13 @@ static int audit_receive_msg(struct sk_buff *skb,
> struct nlmsghdr *nlh) }
>               if (s.mask & AUDIT_STATUS_PID) {
>                       int new_pid = s.pid;
> +                     pid_t requesting_pid = task_tgid_vnr(current);
> 
> -                     if ((!new_pid) && (task_tgid_vnr(current) != audit_pid))
> +                     if ((!new_pid) && (requesting_pid != audit_pid))
>                               return -EACCES;
> +                     if (audit_pid && new_pid &&
> +                         audit_replace(requesting_pid) != -ECONNREFUSED)
> +                             return -EEXIST;
>                       if (audit_enabled != AUDIT_OFF)
>                               audit_log_config_change("audit_pid", new_pid, 
> audit_pid, 1);
>                       audit_pid = new_pid;

-- 
paul moore
security @ redhat

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to