blob: 26b597934697548e783736db172f8d28b1cfe582 [file] [log] [blame]
William Roberts210c5842013-02-08 09:45:26 +09001/*
2 * Copyright 2012, Samsung Telecommunications of America
3 * Copyright (C) 2014 The Android Open Source Project
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 *
17 * Written by William Roberts <w.roberts@sta.samsung.com>
18 *
19 */
20
Tom Cherry59993892020-05-15 10:58:43 -070021#include "libaudit.h"
22
William Roberts210c5842013-02-08 09:45:26 +090023#include <errno.h>
24#include <string.h>
25#include <unistd.h>
26
Tom Cherry59993892020-05-15 10:58:43 -070027#include <limits>
William Roberts210c5842013-02-08 09:45:26 +090028
29/**
30 * Waits for an ack from the kernel
31 * @param fd
32 * The netlink socket fd
William Roberts210c5842013-02-08 09:45:26 +090033 * @return
34 * This function returns 0 on success, else -errno.
35 */
Mark Salyzyn65059532017-03-10 14:31:54 -080036static int get_ack(int fd) {
Tom Cherry59993892020-05-15 10:58:43 -070037 struct audit_message rep = {};
38 int rc = audit_get_reply(fd, &rep, GET_REPLY_BLOCKING, MSG_PEEK);
William Roberts210c5842013-02-08 09:45:26 +090039 if (rc < 0) {
40 return rc;
41 }
42
43 if (rep.nlh.nlmsg_type == NLMSG_ERROR) {
44 audit_get_reply(fd, &rep, GET_REPLY_BLOCKING, 0);
Tom Cherry59993892020-05-15 10:58:43 -070045 rc = reinterpret_cast<struct nlmsgerr*>(rep.data)->error;
ThiƩbaud Weksteen6fa68212023-12-07 15:26:51 +110046 return rc;
William Roberts210c5842013-02-08 09:45:26 +090047 }
48
William Roberts210c5842013-02-08 09:45:26 +090049 return 0;
50}
51
52/**
53 *
54 * @param fd
55 * The netlink socket fd
56 * @param type
57 * The type of netlink message
58 * @param data
59 * The data to send
60 * @param size
61 * The length of the data in bytes
62 * @return
63 * This function returns a positive sequence number on success, else -errno.
64 */
Mark Salyzyn65059532017-03-10 14:31:54 -080065static int audit_send(int fd, int type, const void* data, size_t size) {
Tom Cherry59993892020-05-15 10:58:43 -070066 struct sockaddr_nl addr = {.nl_family = AF_NETLINK};
William Roberts210c5842013-02-08 09:45:26 +090067
68 /* Set up the netlink headers */
Tom Cherry59993892020-05-15 10:58:43 -070069 struct audit_message req = {};
70 req.nlh.nlmsg_type = static_cast<uint16_t>(type);
William Roberts210c5842013-02-08 09:45:26 +090071 req.nlh.nlmsg_len = NLMSG_SPACE(size);
72 req.nlh.nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
73
74 /*
75 * Check for a valid fd, even though sendto would catch this, its easier
76 * to always blindly increment the sequence number
77 */
78 if (fd < 0) {
79 return -EBADF;
80 }
81
82 /* Ensure the message is not too big */
83 if (NLMSG_SPACE(size) > MAX_AUDIT_MESSAGE_LENGTH) {
William Roberts210c5842013-02-08 09:45:26 +090084 return -EINVAL;
85 }
86
87 /* Only memcpy in the data if it was specified */
88 if (size && data) {
89 memcpy(NLMSG_DATA(&req.nlh), data, size);
90 }
91
92 /*
93 * Only increment the sequence number on a guarantee
94 * you will send it to the kernel.
William Roberts210c5842013-02-08 09:45:26 +090095 */
Tom Cherry59993892020-05-15 10:58:43 -070096 static uint32_t sequence = 0;
97 if (sequence == std::numeric_limits<uint32_t>::max()) {
98 sequence = 1;
99 } else {
100 sequence++;
101 }
102 req.nlh.nlmsg_seq = sequence;
William Roberts210c5842013-02-08 09:45:26 +0900103
Tom Cherry59993892020-05-15 10:58:43 -0700104 ssize_t rc = TEMP_FAILURE_RETRY(
105 sendto(fd, &req, req.nlh.nlmsg_len, 0, (struct sockaddr*)&addr, sizeof(addr)));
William Roberts210c5842013-02-08 09:45:26 +0900106
107 /* Not all the bytes were sent */
108 if (rc < 0) {
Tom Cherry59993892020-05-15 10:58:43 -0700109 return -errno;
Mark Salyzyn65059532017-03-10 14:31:54 -0800110 } else if ((uint32_t)rc != req.nlh.nlmsg_len) {
Tom Cherry59993892020-05-15 10:58:43 -0700111 return -EPROTO;
William Roberts210c5842013-02-08 09:45:26 +0900112 }
113
114 /* We sent all the bytes, get the ack */
Mark Salyzyn5e6d9412016-10-17 14:28:00 -0700115 rc = get_ack(fd);
William Roberts210c5842013-02-08 09:45:26 +0900116
117 /* If the ack failed, return the error, else return the sequence number */
Mark Salyzyn65059532017-03-10 14:31:54 -0800118 rc = (rc == 0) ? (int)sequence : rc;
William Roberts210c5842013-02-08 09:45:26 +0900119
William Roberts210c5842013-02-08 09:45:26 +0900120 return rc;
121}
122
Mark Salyzyn65059532017-03-10 14:31:54 -0800123int audit_setup(int fd, pid_t pid) {
William Roberts210c5842013-02-08 09:45:26 +0900124 /*
125 * In order to set the auditd PID we send an audit message over the netlink
126 * socket with the pid field of the status struct set to our current pid,
127 * and the the mask set to AUDIT_STATUS_PID
128 */
Tom Cherry59993892020-05-15 10:58:43 -0700129 struct audit_status status = {
130 .mask = AUDIT_STATUS_PID,
131 .pid = static_cast<uint32_t>(pid),
132 };
William Roberts210c5842013-02-08 09:45:26 +0900133
134 /* Let the kernel know this pid will be registering for audit events */
Tom Cherry59993892020-05-15 10:58:43 -0700135 int rc = audit_send(fd, AUDIT_SET, &status, sizeof(status));
William Roberts210c5842013-02-08 09:45:26 +0900136 if (rc < 0) {
William Roberts210c5842013-02-08 09:45:26 +0900137 return rc;
138 }
139
140 /*
141 * In a request where we need to wait for a response, wait for the message
142 * and discard it. This message confirms and sync's us with the kernel.
Nick Kralevichd8774052014-11-19 13:33:22 -0800143 * This daemon is now registered as the audit logger.
144 *
145 * TODO
146 * If the daemon dies and restarts the message didn't come back,
147 * so I went to non-blocking and it seemed to fix the bug.
148 * Need to investigate further.
William Roberts210c5842013-02-08 09:45:26 +0900149 */
Tom Cherry59993892020-05-15 10:58:43 -0700150 struct audit_message rep = {};
Nick Kralevichd8774052014-11-19 13:33:22 -0800151 audit_get_reply(fd, &rep, GET_REPLY_NONBLOCKING, 0);
William Roberts210c5842013-02-08 09:45:26 +0900152
153 return 0;
154}
155
Mark Salyzyn65059532017-03-10 14:31:54 -0800156int audit_open() {
Nick Kralevichd8774052014-11-19 13:33:22 -0800157 return socket(PF_NETLINK, SOCK_RAW | SOCK_CLOEXEC, NETLINK_AUDIT);
William Roberts210c5842013-02-08 09:45:26 +0900158}
159
Nick Kralevich8c8fd2f2019-04-09 10:59:39 -0700160int audit_rate_limit(int fd, uint32_t limit) {
Tom Cherry59993892020-05-15 10:58:43 -0700161 struct audit_status status = {
162 .mask = AUDIT_STATUS_RATE_LIMIT, .rate_limit = limit, /* audit entries per second */
163 };
Nick Kralevich8c8fd2f2019-04-09 10:59:39 -0700164 return audit_send(fd, AUDIT_SET, &status, sizeof(status));
165}
166
Mark Salyzyn65059532017-03-10 14:31:54 -0800167int audit_get_reply(int fd, struct audit_message* rep, reply_t block, int peek) {
William Roberts210c5842013-02-08 09:45:26 +0900168 if (fd < 0) {
169 return -EBADF;
170 }
171
Tom Cherry59993892020-05-15 10:58:43 -0700172 int flags = (block == GET_REPLY_NONBLOCKING) ? MSG_DONTWAIT : 0;
William Roberts210c5842013-02-08 09:45:26 +0900173 flags |= peek;
174
175 /*
176 * Get the data from the netlink socket but on error we need to be carefull,
177 * the interface shows that EINTR can never be returned, other errors,
178 * however, can be returned.
179 */
Tom Cherry59993892020-05-15 10:58:43 -0700180 struct sockaddr_nl nladdr;
181 socklen_t nladdrlen = sizeof(nladdr);
182 ssize_t len = TEMP_FAILURE_RETRY(
183 recvfrom(fd, rep, sizeof(*rep), flags, (struct sockaddr*)&nladdr, &nladdrlen));
William Roberts210c5842013-02-08 09:45:26 +0900184
185 /*
186 * EAGAIN should be re-tried until success or another error manifests.
187 */
188 if (len < 0) {
Tom Cherry59993892020-05-15 10:58:43 -0700189 if (block == GET_REPLY_NONBLOCKING && errno == EAGAIN) {
William Roberts210c5842013-02-08 09:45:26 +0900190 /* If request is non blocking and errno is EAGAIN, just return 0 */
191 return 0;
192 }
Tom Cherry59993892020-05-15 10:58:43 -0700193 return -errno;
William Roberts210c5842013-02-08 09:45:26 +0900194 }
195
196 if (nladdrlen != sizeof(nladdr)) {
William Roberts210c5842013-02-08 09:45:26 +0900197 return -EPROTO;
198 }
199
200 /* Make sure the netlink message was not spoof'd */
201 if (nladdr.nl_pid) {
William Roberts210c5842013-02-08 09:45:26 +0900202 return -EINVAL;
203 }
204
205 /* Check if the reply from the kernel was ok */
206 if (!NLMSG_OK(&rep->nlh, (size_t)len)) {
Tom Cherry59993892020-05-15 10:58:43 -0700207 return len == sizeof(*rep) ? -EFBIG : -EBADE;
William Roberts210c5842013-02-08 09:45:26 +0900208 }
209
Tom Cherry59993892020-05-15 10:58:43 -0700210 return 0;
William Roberts210c5842013-02-08 09:45:26 +0900211}
212
Mark Salyzyn65059532017-03-10 14:31:54 -0800213void audit_close(int fd) {
Mark Salyzyn5e6d9412016-10-17 14:28:00 -0700214 close(fd);
William Roberts210c5842013-02-08 09:45:26 +0900215}
ThiƩbaud Weksteen9d0a9592023-12-06 14:28:49 +1100216
217int audit_log_android_avc_message(int fd, const char* msg) {
218 size_t len;
219
220 if (__builtin_add_overflow(strlen(msg), 1, &len)) {
221 return -EINVAL;
222 }
223
224 return audit_send(fd, AUDIT_USER_AVC, msg, len);
225}