cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

integrity_audit.c (1974B)


      1// SPDX-License-Identifier: GPL-2.0-only
      2/*
      3 * Copyright (C) 2008 IBM Corporation
      4 * Author: Mimi Zohar <zohar@us.ibm.com>
      5 *
      6 * File: integrity_audit.c
      7 *	Audit calls for the integrity subsystem
      8 */
      9
     10#include <linux/fs.h>
     11#include <linux/gfp.h>
     12#include <linux/audit.h>
     13#include "integrity.h"
     14
     15static int integrity_audit_info;
     16
     17/* ima_audit_setup - enable informational auditing messages */
     18static int __init integrity_audit_setup(char *str)
     19{
     20	unsigned long audit;
     21
     22	if (!kstrtoul(str, 0, &audit))
     23		integrity_audit_info = audit ? 1 : 0;
     24	return 1;
     25}
     26__setup("integrity_audit=", integrity_audit_setup);
     27
     28void integrity_audit_msg(int audit_msgno, struct inode *inode,
     29			 const unsigned char *fname, const char *op,
     30			 const char *cause, int result, int audit_info)
     31{
     32	integrity_audit_message(audit_msgno, inode, fname, op, cause,
     33				result, audit_info, 0);
     34}
     35
     36void integrity_audit_message(int audit_msgno, struct inode *inode,
     37			     const unsigned char *fname, const char *op,
     38			     const char *cause, int result, int audit_info,
     39			     int errno)
     40{
     41	struct audit_buffer *ab;
     42	char name[TASK_COMM_LEN];
     43
     44	if (!integrity_audit_info && audit_info == 1)	/* Skip info messages */
     45		return;
     46
     47	ab = audit_log_start(audit_context(), GFP_KERNEL, audit_msgno);
     48	if (!ab)
     49		return;
     50	audit_log_format(ab, "pid=%d uid=%u auid=%u ses=%u",
     51			 task_pid_nr(current),
     52			 from_kuid(&init_user_ns, current_uid()),
     53			 from_kuid(&init_user_ns, audit_get_loginuid(current)),
     54			 audit_get_sessionid(current));
     55	audit_log_task_context(ab);
     56	audit_log_format(ab, " op=%s cause=%s comm=", op, cause);
     57	audit_log_untrustedstring(ab, get_task_comm(name, current));
     58	if (fname) {
     59		audit_log_format(ab, " name=");
     60		audit_log_untrustedstring(ab, fname);
     61	}
     62	if (inode) {
     63		audit_log_format(ab, " dev=");
     64		audit_log_untrustedstring(ab, inode->i_sb->s_id);
     65		audit_log_format(ab, " ino=%lu", inode->i_ino);
     66	}
     67	audit_log_format(ab, " res=%d errno=%d", !result, errno);
     68	audit_log_end(ab);
     69}