]>
Commit | Line | Data |
---|---|---|
b886d83c | 1 | // SPDX-License-Identifier: GPL-2.0-only |
3323eec9 MZ |
2 | /* |
3 | * Copyright (C) 2008 IBM Corporation | |
4 | * Author: Mimi Zohar <zohar@us.ibm.com> | |
5 | * | |
3323eec9 | 6 | * File: integrity_audit.c |
2bb930ab | 7 | * Audit calls for the integrity subsystem |
3323eec9 MZ |
8 | */ |
9 | ||
10 | #include <linux/fs.h> | |
5a0e3ad6 | 11 | #include <linux/gfp.h> |
3323eec9 | 12 | #include <linux/audit.h> |
d726d8d7 | 13 | #include "integrity.h" |
3323eec9 | 14 | |
d726d8d7 | 15 | static int integrity_audit_info; |
3323eec9 | 16 | |
3323eec9 | 17 | /* ima_audit_setup - enable informational auditing messages */ |
d726d8d7 | 18 | static int __init integrity_audit_setup(char *str) |
3323eec9 MZ |
19 | { |
20 | unsigned long audit; | |
3323eec9 | 21 | |
29707b20 | 22 | if (!kstrtoul(str, 0, &audit)) |
d726d8d7 | 23 | integrity_audit_info = audit ? 1 : 0; |
3323eec9 MZ |
24 | return 1; |
25 | } | |
d726d8d7 | 26 | __setup("integrity_audit=", integrity_audit_setup); |
3323eec9 MZ |
27 | |
28 | void integrity_audit_msg(int audit_msgno, struct inode *inode, | |
29 | const unsigned char *fname, const char *op, | |
30 | const char *cause, int result, int audit_info) | |
2f845882 LR |
31 | { |
32 | integrity_audit_message(audit_msgno, inode, fname, op, cause, | |
33 | result, audit_info, 0); | |
34 | } | |
35 | ||
36 | void integrity_audit_message(int audit_msgno, struct inode *inode, | |
37 | const unsigned char *fname, const char *op, | |
38 | const char *cause, int result, int audit_info, | |
39 | int errno) | |
3323eec9 MZ |
40 | { |
41 | struct audit_buffer *ab; | |
73a6b44a | 42 | char name[TASK_COMM_LEN]; |
3323eec9 | 43 | |
d726d8d7 | 44 | if (!integrity_audit_info && audit_info == 1) /* Skip info messages */ |
3323eec9 MZ |
45 | return; |
46 | ||
cdfb6b34 | 47 | ab = audit_log_start(audit_context(), GFP_KERNEL, audit_msgno); |
34c111f6 | 48 | audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u", |
f1dc4867 | 49 | task_pid_nr(current), |
e44f1287 | 50 | from_kuid(&init_user_ns, current_uid()), |
8b94eea4 | 51 | from_kuid(&init_user_ns, audit_get_loginuid(current)), |
523979ad | 52 | audit_get_sessionid(current)); |
3323eec9 | 53 | audit_log_task_context(ab); |
3d2859d5 | 54 | audit_log_format(ab, " op=%s cause=%s comm=", op, cause); |
73a6b44a | 55 | audit_log_untrustedstring(ab, get_task_comm(name, current)); |
3323eec9 MZ |
56 | if (fname) { |
57 | audit_log_format(ab, " name="); | |
58 | audit_log_untrustedstring(ab, fname); | |
59 | } | |
41fdc305 KC |
60 | if (inode) { |
61 | audit_log_format(ab, " dev="); | |
62 | audit_log_untrustedstring(ab, inode->i_sb->s_id); | |
63 | audit_log_format(ab, " ino=%lu", inode->i_ino); | |
64 | } | |
2f845882 | 65 | audit_log_format(ab, " res=%d errno=%d", !result, errno); |
3323eec9 MZ |
66 | audit_log_end(ab); |
67 | } |