]>
git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blob - security/lsm_audit.c
1 // SPDX-License-Identifier: GPL-2.0-only
3 * common LSM auditing functions
5 * Based on code written for SELinux by :
6 * Stephen Smalley, <sds@tycho.nsa.gov>
7 * James Morris <jmorris@redhat.com>
8 * Author : Etienne Basset, <etienne.basset@ensta.org>
11 #include <linux/types.h>
12 #include <linux/stddef.h>
13 #include <linux/kernel.h>
14 #include <linux/gfp.h>
16 #include <linux/init.h>
19 #include <net/af_unix.h>
20 #include <linux/audit.h>
21 #include <linux/ipv6.h>
25 #include <linux/tcp.h>
26 #include <linux/udp.h>
27 #include <linux/dccp.h>
28 #include <linux/sctp.h>
29 #include <linux/lsm_audit.h>
30 #include <linux/security.h>
33 * ipv4_skb_to_auditdata : fill auditdata from skb
35 * @ad : the audit data to fill
36 * @proto : the layer 4 protocol
40 int ipv4_skb_to_auditdata(struct sk_buff
*skb
,
41 struct common_audit_data
*ad
, u8
*proto
)
50 ad
->u
.net
->v4info
.saddr
= ih
->saddr
;
51 ad
->u
.net
->v4info
.daddr
= ih
->daddr
;
54 *proto
= ih
->protocol
;
55 /* non initial fragment */
56 if (ntohs(ih
->frag_off
) & IP_OFFSET
)
59 switch (ih
->protocol
) {
61 struct tcphdr
*th
= tcp_hdr(skb
);
65 ad
->u
.net
->sport
= th
->source
;
66 ad
->u
.net
->dport
= th
->dest
;
70 struct udphdr
*uh
= udp_hdr(skb
);
74 ad
->u
.net
->sport
= uh
->source
;
75 ad
->u
.net
->dport
= uh
->dest
;
79 struct dccp_hdr
*dh
= dccp_hdr(skb
);
83 ad
->u
.net
->sport
= dh
->dccph_sport
;
84 ad
->u
.net
->dport
= dh
->dccph_dport
;
88 struct sctphdr
*sh
= sctp_hdr(skb
);
91 ad
->u
.net
->sport
= sh
->source
;
92 ad
->u
.net
->dport
= sh
->dest
;
100 #if IS_ENABLED(CONFIG_IPV6)
102 * ipv6_skb_to_auditdata : fill auditdata from skb
104 * @ad : the audit data to fill
105 * @proto : the layer 4 protocol
107 * return 0 on success
109 int ipv6_skb_to_auditdata(struct sk_buff
*skb
,
110 struct common_audit_data
*ad
, u8
*proto
)
120 ad
->u
.net
->v6info
.saddr
= ip6
->saddr
;
121 ad
->u
.net
->v6info
.daddr
= ip6
->daddr
;
123 /* IPv6 can have several extension header before the Transport header
125 offset
= skb_network_offset(skb
);
126 offset
+= sizeof(*ip6
);
127 nexthdr
= ip6
->nexthdr
;
128 offset
= ipv6_skip_exthdr(skb
, offset
, &nexthdr
, &frag_off
);
135 struct tcphdr _tcph
, *th
;
137 th
= skb_header_pointer(skb
, offset
, sizeof(_tcph
), &_tcph
);
141 ad
->u
.net
->sport
= th
->source
;
142 ad
->u
.net
->dport
= th
->dest
;
146 struct udphdr _udph
, *uh
;
148 uh
= skb_header_pointer(skb
, offset
, sizeof(_udph
), &_udph
);
152 ad
->u
.net
->sport
= uh
->source
;
153 ad
->u
.net
->dport
= uh
->dest
;
157 struct dccp_hdr _dccph
, *dh
;
159 dh
= skb_header_pointer(skb
, offset
, sizeof(_dccph
), &_dccph
);
163 ad
->u
.net
->sport
= dh
->dccph_sport
;
164 ad
->u
.net
->dport
= dh
->dccph_dport
;
168 struct sctphdr _sctph
, *sh
;
170 sh
= skb_header_pointer(skb
, offset
, sizeof(_sctph
), &_sctph
);
173 ad
->u
.net
->sport
= sh
->source
;
174 ad
->u
.net
->dport
= sh
->dest
;
185 static inline void print_ipv6_addr(struct audit_buffer
*ab
,
186 struct in6_addr
*addr
, __be16 port
,
187 char *name1
, char *name2
)
189 if (!ipv6_addr_any(addr
))
190 audit_log_format(ab
, " %s=%pI6c", name1
, addr
);
192 audit_log_format(ab
, " %s=%d", name2
, ntohs(port
));
195 static inline void print_ipv4_addr(struct audit_buffer
*ab
, __be32 addr
,
196 __be16 port
, char *name1
, char *name2
)
199 audit_log_format(ab
, " %s=%pI4", name1
, &addr
);
201 audit_log_format(ab
, " %s=%d", name2
, ntohs(port
));
205 * dump_common_audit_data - helper to dump common audit data
206 * @a : common audit data
209 static void dump_common_audit_data(struct audit_buffer
*ab
,
210 struct common_audit_data
*a
)
212 char comm
[sizeof(current
->comm
)];
215 * To keep stack sizes in check force programers to notice if they
216 * start making this union too large! See struct lsm_network_audit
217 * as an example of how to deal with large data.
219 BUILD_BUG_ON(sizeof(a
->u
) > sizeof(void *)*2);
221 audit_log_format(ab
, " pid=%d comm=", task_tgid_nr(current
));
222 audit_log_untrustedstring(ab
, memcpy(comm
, current
->comm
, sizeof(comm
)));
225 case LSM_AUDIT_DATA_NONE
:
227 case LSM_AUDIT_DATA_IPC
:
228 audit_log_format(ab
, " key=%d ", a
->u
.ipc_id
);
230 case LSM_AUDIT_DATA_CAP
:
231 audit_log_format(ab
, " capability=%d ", a
->u
.cap
);
233 case LSM_AUDIT_DATA_PATH
: {
236 audit_log_d_path(ab
, " path=", &a
->u
.path
);
238 inode
= d_backing_inode(a
->u
.path
.dentry
);
240 audit_log_format(ab
, " dev=");
241 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
242 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
246 case LSM_AUDIT_DATA_FILE
: {
249 audit_log_d_path(ab
, " path=", &a
->u
.file
->f_path
);
251 inode
= file_inode(a
->u
.file
);
253 audit_log_format(ab
, " dev=");
254 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
255 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
259 case LSM_AUDIT_DATA_IOCTL_OP
: {
262 audit_log_d_path(ab
, " path=", &a
->u
.op
->path
);
264 inode
= a
->u
.op
->path
.dentry
->d_inode
;
266 audit_log_format(ab
, " dev=");
267 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
268 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
271 audit_log_format(ab
, " ioctlcmd=0x%hx", a
->u
.op
->cmd
);
274 case LSM_AUDIT_DATA_DENTRY
: {
277 audit_log_format(ab
, " name=");
278 audit_log_untrustedstring(ab
, a
->u
.dentry
->d_name
.name
);
280 inode
= d_backing_inode(a
->u
.dentry
);
282 audit_log_format(ab
, " dev=");
283 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
284 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
288 case LSM_AUDIT_DATA_INODE
: {
289 struct dentry
*dentry
;
293 dentry
= d_find_alias(inode
);
295 audit_log_format(ab
, " name=");
296 audit_log_untrustedstring(ab
,
297 dentry
->d_name
.name
);
300 audit_log_format(ab
, " dev=");
301 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
302 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
305 case LSM_AUDIT_DATA_TASK
: {
306 struct task_struct
*tsk
= a
->u
.tsk
;
308 pid_t pid
= task_tgid_nr(tsk
);
310 char comm
[sizeof(tsk
->comm
)];
311 audit_log_format(ab
, " opid=%d ocomm=", pid
);
312 audit_log_untrustedstring(ab
,
313 memcpy(comm
, tsk
->comm
, sizeof(comm
)));
318 case LSM_AUDIT_DATA_NET
:
320 struct sock
*sk
= a
->u
.net
->sk
;
322 struct unix_address
*addr
;
326 switch (sk
->sk_family
) {
328 struct inet_sock
*inet
= inet_sk(sk
);
330 print_ipv4_addr(ab
, inet
->inet_rcv_saddr
,
333 print_ipv4_addr(ab
, inet
->inet_daddr
,
338 #if IS_ENABLED(CONFIG_IPV6)
340 struct inet_sock
*inet
= inet_sk(sk
);
342 print_ipv6_addr(ab
, &sk
->sk_v6_rcv_saddr
,
345 print_ipv6_addr(ab
, &sk
->sk_v6_daddr
,
353 addr
= smp_load_acquire(&u
->addr
);
356 if (u
->path
.dentry
) {
357 audit_log_d_path(ab
, " path=", &u
->path
);
360 len
= addr
->len
-sizeof(short);
361 p
= &addr
->name
->sun_path
[0];
362 audit_log_format(ab
, " path=");
364 audit_log_untrustedstring(ab
, p
);
366 audit_log_n_hex(ab
, p
, len
);
371 switch (a
->u
.net
->family
) {
373 print_ipv4_addr(ab
, a
->u
.net
->v4info
.saddr
,
376 print_ipv4_addr(ab
, a
->u
.net
->v4info
.daddr
,
381 print_ipv6_addr(ab
, &a
->u
.net
->v6info
.saddr
,
384 print_ipv6_addr(ab
, &a
->u
.net
->v6info
.daddr
,
389 if (a
->u
.net
->netif
> 0) {
390 struct net_device
*dev
;
392 /* NOTE: we always use init's namespace */
393 dev
= dev_get_by_index(&init_net
, a
->u
.net
->netif
);
395 audit_log_format(ab
, " netif=%s", dev
->name
);
401 case LSM_AUDIT_DATA_KEY
:
402 audit_log_format(ab
, " key_serial=%u", a
->u
.key_struct
.key
);
403 if (a
->u
.key_struct
.key_desc
) {
404 audit_log_format(ab
, " key_desc=");
405 audit_log_untrustedstring(ab
, a
->u
.key_struct
.key_desc
);
409 case LSM_AUDIT_DATA_KMOD
:
410 audit_log_format(ab
, " kmod=");
411 audit_log_untrustedstring(ab
, a
->u
.kmod_name
);
413 case LSM_AUDIT_DATA_IBPKEY
: {
414 struct in6_addr sbn_pfx
;
416 memset(&sbn_pfx
.s6_addr
, 0,
417 sizeof(sbn_pfx
.s6_addr
));
418 memcpy(&sbn_pfx
.s6_addr
, &a
->u
.ibpkey
->subnet_prefix
,
419 sizeof(a
->u
.ibpkey
->subnet_prefix
));
420 audit_log_format(ab
, " pkey=0x%x subnet_prefix=%pI6c",
421 a
->u
.ibpkey
->pkey
, &sbn_pfx
);
424 case LSM_AUDIT_DATA_IBENDPORT
:
425 audit_log_format(ab
, " device=%s port_num=%u",
426 a
->u
.ibendport
->dev_name
,
427 a
->u
.ibendport
->port
);
429 case LSM_AUDIT_DATA_LOCKDOWN
:
430 audit_log_format(ab
, " lockdown_reason=");
431 audit_log_string(ab
, lockdown_reasons
[a
->u
.reason
]);
433 } /* switch (a->type) */
437 * common_lsm_audit - generic LSM auditing function
438 * @a: auxiliary audit data
439 * @pre_audit: lsm-specific pre-audit callback
440 * @post_audit: lsm-specific post-audit callback
442 * setup the audit buffer for common security information
443 * uses callback to print LSM specific information
445 void common_lsm_audit(struct common_audit_data
*a
,
446 void (*pre_audit
)(struct audit_buffer
*, void *),
447 void (*post_audit
)(struct audit_buffer
*, void *))
449 struct audit_buffer
*ab
;
453 /* we use GFP_ATOMIC so we won't sleep */
454 ab
= audit_log_start(audit_context(), GFP_ATOMIC
| __GFP_NOWARN
,
463 dump_common_audit_data(ab
, a
);