1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0-only
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * Copyright (C) 2008 IBM Corporation
4*4882a593Smuzhiyun * Author: Mimi Zohar <zohar@us.ibm.com>
5*4882a593Smuzhiyun *
6*4882a593Smuzhiyun * File: integrity_audit.c
7*4882a593Smuzhiyun * Audit calls for the integrity subsystem
8*4882a593Smuzhiyun */
9*4882a593Smuzhiyun
10*4882a593Smuzhiyun #include <linux/fs.h>
11*4882a593Smuzhiyun #include <linux/gfp.h>
12*4882a593Smuzhiyun #include <linux/audit.h>
13*4882a593Smuzhiyun #include "integrity.h"
14*4882a593Smuzhiyun
15*4882a593Smuzhiyun static int integrity_audit_info;
16*4882a593Smuzhiyun
17*4882a593Smuzhiyun /* ima_audit_setup - enable informational auditing messages */
integrity_audit_setup(char * str)18*4882a593Smuzhiyun static int __init integrity_audit_setup(char *str)
19*4882a593Smuzhiyun {
20*4882a593Smuzhiyun unsigned long audit;
21*4882a593Smuzhiyun
22*4882a593Smuzhiyun if (!kstrtoul(str, 0, &audit))
23*4882a593Smuzhiyun integrity_audit_info = audit ? 1 : 0;
24*4882a593Smuzhiyun return 1;
25*4882a593Smuzhiyun }
26*4882a593Smuzhiyun __setup("integrity_audit=", integrity_audit_setup);
27*4882a593Smuzhiyun
integrity_audit_msg(int audit_msgno,struct inode * inode,const unsigned char * fname,const char * op,const char * cause,int result,int audit_info)28*4882a593Smuzhiyun void integrity_audit_msg(int audit_msgno, struct inode *inode,
29*4882a593Smuzhiyun const unsigned char *fname, const char *op,
30*4882a593Smuzhiyun const char *cause, int result, int audit_info)
31*4882a593Smuzhiyun {
32*4882a593Smuzhiyun integrity_audit_message(audit_msgno, inode, fname, op, cause,
33*4882a593Smuzhiyun result, audit_info, 0);
34*4882a593Smuzhiyun }
35*4882a593Smuzhiyun
integrity_audit_message(int audit_msgno,struct inode * inode,const unsigned char * fname,const char * op,const char * cause,int result,int audit_info,int errno)36*4882a593Smuzhiyun void integrity_audit_message(int audit_msgno, struct inode *inode,
37*4882a593Smuzhiyun const unsigned char *fname, const char *op,
38*4882a593Smuzhiyun const char *cause, int result, int audit_info,
39*4882a593Smuzhiyun int errno)
40*4882a593Smuzhiyun {
41*4882a593Smuzhiyun struct audit_buffer *ab;
42*4882a593Smuzhiyun char name[TASK_COMM_LEN];
43*4882a593Smuzhiyun
44*4882a593Smuzhiyun if (!integrity_audit_info && audit_info == 1) /* Skip info messages */
45*4882a593Smuzhiyun return;
46*4882a593Smuzhiyun
47*4882a593Smuzhiyun ab = audit_log_start(audit_context(), GFP_KERNEL, audit_msgno);
48*4882a593Smuzhiyun if (!ab)
49*4882a593Smuzhiyun return;
50*4882a593Smuzhiyun audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u",
51*4882a593Smuzhiyun task_pid_nr(current),
52*4882a593Smuzhiyun from_kuid(&init_user_ns, current_uid()),
53*4882a593Smuzhiyun from_kuid(&init_user_ns, audit_get_loginuid(current)),
54*4882a593Smuzhiyun audit_get_sessionid(current));
55*4882a593Smuzhiyun audit_log_task_context(ab);
56*4882a593Smuzhiyun audit_log_format(ab, " op=%s cause=%s comm=", op, cause);
57*4882a593Smuzhiyun audit_log_untrustedstring(ab, get_task_comm(name, current));
58*4882a593Smuzhiyun if (fname) {
59*4882a593Smuzhiyun audit_log_format(ab, " name=");
60*4882a593Smuzhiyun audit_log_untrustedstring(ab, fname);
61*4882a593Smuzhiyun }
62*4882a593Smuzhiyun if (inode) {
63*4882a593Smuzhiyun audit_log_format(ab, " dev=");
64*4882a593Smuzhiyun audit_log_untrustedstring(ab, inode->i_sb->s_id);
65*4882a593Smuzhiyun audit_log_format(ab, " ino=%lu", inode->i_ino);
66*4882a593Smuzhiyun }
67*4882a593Smuzhiyun audit_log_format(ab, " res=%d errno=%d", !result, errno);
68*4882a593Smuzhiyun audit_log_end(ab);
69*4882a593Smuzhiyun }
70