1 // SPDX-License-Identifier: GPL-2.0-only
3 * common LSM auditing functions
5 * Based on code written for SELinux by :
6 * Stephen Smalley, <sds@tycho.nsa.gov>
7 * James Morris <jmorris@redhat.com>
8 * Author : Etienne Basset, <etienne.basset@ensta.org>
11 #include <linux/types.h>
12 #include <linux/stddef.h>
13 #include <linux/kernel.h>
14 #include <linux/gfp.h>
16 #include <linux/init.h>
19 #include <net/af_unix.h>
20 #include <linux/audit.h>
21 #include <linux/ipv6.h>
25 #include <linux/tcp.h>
26 #include <linux/udp.h>
27 #include <linux/dccp.h>
28 #include <linux/sctp.h>
29 #include <linux/lsm_audit.h>
30 #include <linux/security.h>
33 * ipv4_skb_to_auditdata : fill auditdata from skb
35 * @ad : the audit data to fill
36 * @proto : the layer 4 protocol
40 int ipv4_skb_to_auditdata(struct sk_buff
*skb
,
41 struct common_audit_data
*ad
, u8
*proto
)
50 ad
->u
.net
->v4info
.saddr
= ih
->saddr
;
51 ad
->u
.net
->v4info
.daddr
= ih
->daddr
;
54 *proto
= ih
->protocol
;
55 /* non initial fragment */
56 if (ntohs(ih
->frag_off
) & IP_OFFSET
)
59 switch (ih
->protocol
) {
61 struct tcphdr
*th
= tcp_hdr(skb
);
65 ad
->u
.net
->sport
= th
->source
;
66 ad
->u
.net
->dport
= th
->dest
;
70 struct udphdr
*uh
= udp_hdr(skb
);
74 ad
->u
.net
->sport
= uh
->source
;
75 ad
->u
.net
->dport
= uh
->dest
;
79 struct dccp_hdr
*dh
= dccp_hdr(skb
);
83 ad
->u
.net
->sport
= dh
->dccph_sport
;
84 ad
->u
.net
->dport
= dh
->dccph_dport
;
88 struct sctphdr
*sh
= sctp_hdr(skb
);
91 ad
->u
.net
->sport
= sh
->source
;
92 ad
->u
.net
->dport
= sh
->dest
;
100 #if IS_ENABLED(CONFIG_IPV6)
102 * ipv6_skb_to_auditdata : fill auditdata from skb
104 * @ad : the audit data to fill
105 * @proto : the layer 4 protocol
107 * return 0 on success
109 int ipv6_skb_to_auditdata(struct sk_buff
*skb
,
110 struct common_audit_data
*ad
, u8
*proto
)
120 ad
->u
.net
->v6info
.saddr
= ip6
->saddr
;
121 ad
->u
.net
->v6info
.daddr
= ip6
->daddr
;
123 /* IPv6 can have several extension header before the Transport header
125 offset
= skb_network_offset(skb
);
126 offset
+= sizeof(*ip6
);
127 nexthdr
= ip6
->nexthdr
;
128 offset
= ipv6_skip_exthdr(skb
, offset
, &nexthdr
, &frag_off
);
135 struct tcphdr _tcph
, *th
;
137 th
= skb_header_pointer(skb
, offset
, sizeof(_tcph
), &_tcph
);
141 ad
->u
.net
->sport
= th
->source
;
142 ad
->u
.net
->dport
= th
->dest
;
146 struct udphdr _udph
, *uh
;
148 uh
= skb_header_pointer(skb
, offset
, sizeof(_udph
), &_udph
);
152 ad
->u
.net
->sport
= uh
->source
;
153 ad
->u
.net
->dport
= uh
->dest
;
157 struct dccp_hdr _dccph
, *dh
;
159 dh
= skb_header_pointer(skb
, offset
, sizeof(_dccph
), &_dccph
);
163 ad
->u
.net
->sport
= dh
->dccph_sport
;
164 ad
->u
.net
->dport
= dh
->dccph_dport
;
168 struct sctphdr _sctph
, *sh
;
170 sh
= skb_header_pointer(skb
, offset
, sizeof(_sctph
), &_sctph
);
173 ad
->u
.net
->sport
= sh
->source
;
174 ad
->u
.net
->dport
= sh
->dest
;
185 static inline void print_ipv6_addr(struct audit_buffer
*ab
,
186 struct in6_addr
*addr
, __be16 port
,
187 char *name1
, char *name2
)
189 if (!ipv6_addr_any(addr
))
190 audit_log_format(ab
, " %s=%pI6c", name1
, addr
);
192 audit_log_format(ab
, " %s=%d", name2
, ntohs(port
));
195 static inline void print_ipv4_addr(struct audit_buffer
*ab
, __be32 addr
,
196 __be16 port
, char *name1
, char *name2
)
199 audit_log_format(ab
, " %s=%pI4", name1
, &addr
);
201 audit_log_format(ab
, " %s=%d", name2
, ntohs(port
));
205 * dump_common_audit_data - helper to dump common audit data
206 * @a : common audit data
209 static void dump_common_audit_data(struct audit_buffer
*ab
,
210 struct common_audit_data
*a
)
212 char comm
[sizeof(current
->comm
)];
215 * To keep stack sizes in check force programers to notice if they
216 * start making this union too large! See struct lsm_network_audit
217 * as an example of how to deal with large data.
219 BUILD_BUG_ON(sizeof(a
->u
) > sizeof(void *)*2);
221 audit_log_format(ab
, " pid=%d comm=", task_tgid_nr(current
));
222 audit_log_untrustedstring(ab
, memcpy(comm
, current
->comm
, sizeof(comm
)));
225 case LSM_AUDIT_DATA_NONE
:
227 case LSM_AUDIT_DATA_IPC
:
228 audit_log_format(ab
, " key=%d ", a
->u
.ipc_id
);
230 case LSM_AUDIT_DATA_CAP
:
231 audit_log_format(ab
, " capability=%d ", a
->u
.cap
);
233 case LSM_AUDIT_DATA_PATH
: {
236 audit_log_d_path(ab
, " path=", &a
->u
.path
);
238 inode
= d_backing_inode(a
->u
.path
.dentry
);
240 audit_log_format(ab
, " dev=");
241 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
242 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
247 case LSM_AUDIT_DATA_FILE
: {
250 audit_log_d_path(ab
, " path=", &a
->u
.file
->f_path
);
252 inode
= file_inode(a
->u
.file
);
254 audit_log_format(ab
, " dev=");
255 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
256 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
261 case LSM_AUDIT_DATA_IOCTL_OP
: {
264 audit_log_d_path(ab
, " path=", &a
->u
.op
->path
);
266 inode
= a
->u
.op
->path
.dentry
->d_inode
;
268 audit_log_format(ab
, " dev=");
269 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
270 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
273 audit_log_format(ab
, " ioctlcmd=0x%hx", a
->u
.op
->cmd
);
277 case LSM_AUDIT_DATA_DENTRY
: {
280 audit_log_format(ab
, " name=");
281 audit_log_untrustedstring(ab
, a
->u
.dentry
->d_name
.name
);
283 inode
= d_backing_inode(a
->u
.dentry
);
285 audit_log_format(ab
, " dev=");
286 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
287 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
292 case LSM_AUDIT_DATA_INODE
: {
293 struct dentry
*dentry
;
297 dentry
= d_find_alias(inode
);
299 audit_log_format(ab
, " name=");
300 audit_log_untrustedstring(ab
,
301 dentry
->d_name
.name
);
304 audit_log_format(ab
, " dev=");
305 audit_log_untrustedstring(ab
, inode
->i_sb
->s_id
);
306 audit_log_format(ab
, " ino=%lu", inode
->i_ino
);
310 case LSM_AUDIT_DATA_TASK
: {
311 struct task_struct
*tsk
= a
->u
.tsk
;
313 pid_t pid
= task_tgid_nr(tsk
);
315 char comm
[sizeof(tsk
->comm
)];
316 audit_log_format(ab
, " opid=%d ocomm=", pid
);
317 audit_log_untrustedstring(ab
,
318 memcpy(comm
, tsk
->comm
, sizeof(comm
)));
323 case LSM_AUDIT_DATA_NET
:
325 struct sock
*sk
= a
->u
.net
->sk
;
327 struct unix_address
*addr
;
331 switch (sk
->sk_family
) {
333 struct inet_sock
*inet
= inet_sk(sk
);
335 print_ipv4_addr(ab
, inet
->inet_rcv_saddr
,
338 print_ipv4_addr(ab
, inet
->inet_daddr
,
343 #if IS_ENABLED(CONFIG_IPV6)
345 struct inet_sock
*inet
= inet_sk(sk
);
347 print_ipv6_addr(ab
, &sk
->sk_v6_rcv_saddr
,
350 print_ipv6_addr(ab
, &sk
->sk_v6_daddr
,
358 addr
= smp_load_acquire(&u
->addr
);
361 if (u
->path
.dentry
) {
362 audit_log_d_path(ab
, " path=", &u
->path
);
365 len
= addr
->len
-sizeof(short);
366 p
= &addr
->name
->sun_path
[0];
367 audit_log_format(ab
, " path=");
369 audit_log_untrustedstring(ab
, p
);
371 audit_log_n_hex(ab
, p
, len
);
376 switch (a
->u
.net
->family
) {
378 print_ipv4_addr(ab
, a
->u
.net
->v4info
.saddr
,
381 print_ipv4_addr(ab
, a
->u
.net
->v4info
.daddr
,
386 print_ipv6_addr(ab
, &a
->u
.net
->v6info
.saddr
,
389 print_ipv6_addr(ab
, &a
->u
.net
->v6info
.daddr
,
394 if (a
->u
.net
->netif
> 0) {
395 struct net_device
*dev
;
397 /* NOTE: we always use init's namespace */
398 dev
= dev_get_by_index(&init_net
, a
->u
.net
->netif
);
400 audit_log_format(ab
, " netif=%s", dev
->name
);
406 case LSM_AUDIT_DATA_KEY
:
407 audit_log_format(ab
, " key_serial=%u", a
->u
.key_struct
.key
);
408 if (a
->u
.key_struct
.key_desc
) {
409 audit_log_format(ab
, " key_desc=");
410 audit_log_untrustedstring(ab
, a
->u
.key_struct
.key_desc
);
414 case LSM_AUDIT_DATA_KMOD
:
415 audit_log_format(ab
, " kmod=");
416 audit_log_untrustedstring(ab
, a
->u
.kmod_name
);
418 case LSM_AUDIT_DATA_IBPKEY
: {
419 struct in6_addr sbn_pfx
;
421 memset(&sbn_pfx
.s6_addr
, 0,
422 sizeof(sbn_pfx
.s6_addr
));
423 memcpy(&sbn_pfx
.s6_addr
, &a
->u
.ibpkey
->subnet_prefix
,
424 sizeof(a
->u
.ibpkey
->subnet_prefix
));
425 audit_log_format(ab
, " pkey=0x%x subnet_prefix=%pI6c",
426 a
->u
.ibpkey
->pkey
, &sbn_pfx
);
429 case LSM_AUDIT_DATA_IBENDPORT
:
430 audit_log_format(ab
, " device=%s port_num=%u",
431 a
->u
.ibendport
->dev_name
,
432 a
->u
.ibendport
->port
);
434 case LSM_AUDIT_DATA_LOCKDOWN
:
435 audit_log_format(ab
, " lockdown_reason=\"%s\"",
436 lockdown_reasons
[a
->u
.reason
]);
438 } /* switch (a->type) */
442 * common_lsm_audit - generic LSM auditing function
443 * @a: auxiliary audit data
444 * @pre_audit: lsm-specific pre-audit callback
445 * @post_audit: lsm-specific post-audit callback
447 * setup the audit buffer for common security information
448 * uses callback to print LSM specific information
450 void common_lsm_audit(struct common_audit_data
*a
,
451 void (*pre_audit
)(struct audit_buffer
*, void *),
452 void (*post_audit
)(struct audit_buffer
*, void *))
454 struct audit_buffer
*ab
;
458 /* we use GFP_ATOMIC so we won't sleep */
459 ab
= audit_log_start(audit_context(), GFP_ATOMIC
| __GFP_NOWARN
,
468 dump_common_audit_data(ab
, a
);