xref: /OK3568_Linux_fs/kernel/security/integrity/integrity_audit.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-only
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * Copyright (C) 2008 IBM Corporation
4*4882a593Smuzhiyun  * Author: Mimi Zohar <zohar@us.ibm.com>
5*4882a593Smuzhiyun  *
6*4882a593Smuzhiyun  * File: integrity_audit.c
7*4882a593Smuzhiyun  *	Audit calls for the integrity subsystem
8*4882a593Smuzhiyun  */
9*4882a593Smuzhiyun 
10*4882a593Smuzhiyun #include <linux/fs.h>
11*4882a593Smuzhiyun #include <linux/gfp.h>
12*4882a593Smuzhiyun #include <linux/audit.h>
13*4882a593Smuzhiyun #include "integrity.h"
14*4882a593Smuzhiyun 
15*4882a593Smuzhiyun static int integrity_audit_info;
16*4882a593Smuzhiyun 
17*4882a593Smuzhiyun /* ima_audit_setup - enable informational auditing messages */
integrity_audit_setup(char * str)18*4882a593Smuzhiyun static int __init integrity_audit_setup(char *str)
19*4882a593Smuzhiyun {
20*4882a593Smuzhiyun 	unsigned long audit;
21*4882a593Smuzhiyun 
22*4882a593Smuzhiyun 	if (!kstrtoul(str, 0, &audit))
23*4882a593Smuzhiyun 		integrity_audit_info = audit ? 1 : 0;
24*4882a593Smuzhiyun 	return 1;
25*4882a593Smuzhiyun }
26*4882a593Smuzhiyun __setup("integrity_audit=", integrity_audit_setup);
27*4882a593Smuzhiyun 
integrity_audit_msg(int audit_msgno,struct inode * inode,const unsigned char * fname,const char * op,const char * cause,int result,int audit_info)28*4882a593Smuzhiyun void integrity_audit_msg(int audit_msgno, struct inode *inode,
29*4882a593Smuzhiyun 			 const unsigned char *fname, const char *op,
30*4882a593Smuzhiyun 			 const char *cause, int result, int audit_info)
31*4882a593Smuzhiyun {
32*4882a593Smuzhiyun 	integrity_audit_message(audit_msgno, inode, fname, op, cause,
33*4882a593Smuzhiyun 				result, audit_info, 0);
34*4882a593Smuzhiyun }
35*4882a593Smuzhiyun 
integrity_audit_message(int audit_msgno,struct inode * inode,const unsigned char * fname,const char * op,const char * cause,int result,int audit_info,int errno)36*4882a593Smuzhiyun void integrity_audit_message(int audit_msgno, struct inode *inode,
37*4882a593Smuzhiyun 			     const unsigned char *fname, const char *op,
38*4882a593Smuzhiyun 			     const char *cause, int result, int audit_info,
39*4882a593Smuzhiyun 			     int errno)
40*4882a593Smuzhiyun {
41*4882a593Smuzhiyun 	struct audit_buffer *ab;
42*4882a593Smuzhiyun 	char name[TASK_COMM_LEN];
43*4882a593Smuzhiyun 
44*4882a593Smuzhiyun 	if (!integrity_audit_info && audit_info == 1)	/* Skip info messages */
45*4882a593Smuzhiyun 		return;
46*4882a593Smuzhiyun 
47*4882a593Smuzhiyun 	ab = audit_log_start(audit_context(), GFP_KERNEL, audit_msgno);
48*4882a593Smuzhiyun 	if (!ab)
49*4882a593Smuzhiyun 		return;
50*4882a593Smuzhiyun 	audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u",
51*4882a593Smuzhiyun 			 task_pid_nr(current),
52*4882a593Smuzhiyun 			 from_kuid(&init_user_ns, current_uid()),
53*4882a593Smuzhiyun 			 from_kuid(&init_user_ns, audit_get_loginuid(current)),
54*4882a593Smuzhiyun 			 audit_get_sessionid(current));
55*4882a593Smuzhiyun 	audit_log_task_context(ab);
56*4882a593Smuzhiyun 	audit_log_format(ab, " op=%s cause=%s comm=", op, cause);
57*4882a593Smuzhiyun 	audit_log_untrustedstring(ab, get_task_comm(name, current));
58*4882a593Smuzhiyun 	if (fname) {
59*4882a593Smuzhiyun 		audit_log_format(ab, " name=");
60*4882a593Smuzhiyun 		audit_log_untrustedstring(ab, fname);
61*4882a593Smuzhiyun 	}
62*4882a593Smuzhiyun 	if (inode) {
63*4882a593Smuzhiyun 		audit_log_format(ab, " dev=");
64*4882a593Smuzhiyun 		audit_log_untrustedstring(ab, inode->i_sb->s_id);
65*4882a593Smuzhiyun 		audit_log_format(ab, " ino=%lu", inode->i_ino);
66*4882a593Smuzhiyun 	}
67*4882a593Smuzhiyun 	audit_log_format(ab, " res=%d errno=%d", !result, errno);
68*4882a593Smuzhiyun 	audit_log_end(ab);
69*4882a593Smuzhiyun }
70