mirror of
https://github.com/torvalds/linux.git
synced 2024-12-27 13:22:23 +00:00
audit/stable-5.18 PR 20220321
-----BEGIN PGP SIGNATURE----- iQJIBAABCAAyFiEES0KozwfymdVUl37v6iDy2pc3iXMFAmI474wUHHBhdWxAcGF1 bC1tb29yZS5jb20ACgkQ6iDy2pc3iXPiAQ/8DM7Za/Fef1dPq2Vl/hWa3I0qfVNt JxlP2kuyzItkmvjoF+eXeRq0Zv32WDSCoXhKwlAaonchXuKbM7NDkyvPNXQlvQng Bfs5u2gPJvGWPmkrwGJNZn1I6nlujwsnVk9td4Un8OzLT9RsB4godH8eqCQEZC/M vj5JI+YYMo3iaciCNcKm+H6MCDr7X+rN6b8e8DK8JzYpfIwRsHmRIHix0BIVk28W mh8ZtFRgOY3DXdYTYMbatOpZDvtSbhKYiIBiEeHygrviUABOe/pewXGoP3myvl7L S7qr8msOC9c/auugeGhukrT17bGmkloTPjS84LYPm9WySN8FwkwlqD3d4kqPKghD fj6br/nSgV5bqa1HSh3cwyIHauC0sGOfGIoVvVZt1gIViuHBsBYM1Y2wau3Hg9y3 BfIXiHckFmWSfzlJDj4fsS+lv9BdJwjeiMbepJQJ1btyMIUMu2V3MJwAXn2SzfuO 91feKrn3Fbkx7Xgg6dbZbt4BZhNURWRf6ZCZXR0oiDxUNfE+tI6s8wjMKfDzaUuu Gj+BlvC+hOqgLczuSKQ1rK3D38uOl2qc2HwXlTuFdtCWNmF9AJ464YBT6UzrHGdB 8OIqMp+zaTxk7Mrx2AYqnddB/tAga1F0jVaIqkpW1s3EdSrDTEgHJniW0skMz6hw /FouCKV8IhP7SNI= =0YvJ -----END PGP SIGNATURE----- Merge tag 'audit-pr-20220321' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit Pull audit update from Paul Moore: "Just one audit patch queued for v5.18: - Change the AUDIT_TIME_* record generation so that they are generated at syscall exit time and subject to all of the normal syscall exit filtering. This should help reduce noise and ensure those records which are most relevant to the admin's audit configuration are recorded in the audit log" * tag 'audit-pr-20220321' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit: audit: log AUDIT_TIME_* records only from rules
This commit is contained in:
commit
b47d5a4f6b
@ -201,6 +201,10 @@ struct audit_context {
|
||||
struct {
|
||||
char *name;
|
||||
} module;
|
||||
struct {
|
||||
struct audit_ntp_data ntp_data;
|
||||
struct timespec64 tk_injoffset;
|
||||
} time;
|
||||
};
|
||||
int fds[2];
|
||||
struct audit_proctitle proctitle;
|
||||
|
@ -1340,6 +1340,53 @@ static void audit_log_fcaps(struct audit_buffer *ab, struct audit_names *name)
|
||||
from_kuid(&init_user_ns, name->fcap.rootid));
|
||||
}
|
||||
|
||||
static void audit_log_time(struct audit_context *context, struct audit_buffer **ab)
|
||||
{
|
||||
const struct audit_ntp_data *ntp = &context->time.ntp_data;
|
||||
const struct timespec64 *tk = &context->time.tk_injoffset;
|
||||
static const char * const ntp_name[] = {
|
||||
"offset",
|
||||
"freq",
|
||||
"status",
|
||||
"tai",
|
||||
"tick",
|
||||
"adjust",
|
||||
};
|
||||
int type;
|
||||
|
||||
if (context->type == AUDIT_TIME_ADJNTPVAL) {
|
||||
for (type = 0; type < AUDIT_NTP_NVALS; type++) {
|
||||
if (ntp->vals[type].newval != ntp->vals[type].oldval) {
|
||||
if (!*ab) {
|
||||
*ab = audit_log_start(context,
|
||||
GFP_KERNEL,
|
||||
AUDIT_TIME_ADJNTPVAL);
|
||||
if (!*ab)
|
||||
return;
|
||||
}
|
||||
audit_log_format(*ab, "op=%s old=%lli new=%lli",
|
||||
ntp_name[type],
|
||||
ntp->vals[type].oldval,
|
||||
ntp->vals[type].newval);
|
||||
audit_log_end(*ab);
|
||||
*ab = NULL;
|
||||
}
|
||||
}
|
||||
}
|
||||
if (tk->tv_sec != 0 || tk->tv_nsec != 0) {
|
||||
if (!*ab) {
|
||||
*ab = audit_log_start(context, GFP_KERNEL,
|
||||
AUDIT_TIME_INJOFFSET);
|
||||
if (!*ab)
|
||||
return;
|
||||
}
|
||||
audit_log_format(*ab, "sec=%lli nsec=%li",
|
||||
(long long)tk->tv_sec, tk->tv_nsec);
|
||||
audit_log_end(*ab);
|
||||
*ab = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
static void show_special(struct audit_context *context, int *call_panic)
|
||||
{
|
||||
struct audit_buffer *ab;
|
||||
@ -1454,6 +1501,11 @@ static void show_special(struct audit_context *context, int *call_panic)
|
||||
audit_log_format(ab, "(null)");
|
||||
|
||||
break;
|
||||
case AUDIT_TIME_ADJNTPVAL:
|
||||
case AUDIT_TIME_INJOFFSET:
|
||||
/* this call deviates from the rest, eating the buffer */
|
||||
audit_log_time(context, &ab);
|
||||
break;
|
||||
}
|
||||
audit_log_end(ab);
|
||||
}
|
||||
@ -2849,31 +2901,26 @@ void __audit_fanotify(unsigned int response)
|
||||
|
||||
void __audit_tk_injoffset(struct timespec64 offset)
|
||||
{
|
||||
audit_log(audit_context(), GFP_KERNEL, AUDIT_TIME_INJOFFSET,
|
||||
"sec=%lli nsec=%li",
|
||||
(long long)offset.tv_sec, offset.tv_nsec);
|
||||
}
|
||||
struct audit_context *context = audit_context();
|
||||
|
||||
static void audit_log_ntp_val(const struct audit_ntp_data *ad,
|
||||
const char *op, enum audit_ntp_type type)
|
||||
{
|
||||
const struct audit_ntp_val *val = &ad->vals[type];
|
||||
|
||||
if (val->newval == val->oldval)
|
||||
return;
|
||||
|
||||
audit_log(audit_context(), GFP_KERNEL, AUDIT_TIME_ADJNTPVAL,
|
||||
"op=%s old=%lli new=%lli", op, val->oldval, val->newval);
|
||||
/* only set type if not already set by NTP */
|
||||
if (!context->type)
|
||||
context->type = AUDIT_TIME_INJOFFSET;
|
||||
memcpy(&context->time.tk_injoffset, &offset, sizeof(offset));
|
||||
}
|
||||
|
||||
void __audit_ntp_log(const struct audit_ntp_data *ad)
|
||||
{
|
||||
audit_log_ntp_val(ad, "offset", AUDIT_NTP_OFFSET);
|
||||
audit_log_ntp_val(ad, "freq", AUDIT_NTP_FREQ);
|
||||
audit_log_ntp_val(ad, "status", AUDIT_NTP_STATUS);
|
||||
audit_log_ntp_val(ad, "tai", AUDIT_NTP_TAI);
|
||||
audit_log_ntp_val(ad, "tick", AUDIT_NTP_TICK);
|
||||
audit_log_ntp_val(ad, "adjust", AUDIT_NTP_ADJUST);
|
||||
struct audit_context *context = audit_context();
|
||||
int type;
|
||||
|
||||
for (type = 0; type < AUDIT_NTP_NVALS; type++)
|
||||
if (ad->vals[type].newval != ad->vals[type].oldval) {
|
||||
/* unconditionally set type, overwriting TK */
|
||||
context->type = AUDIT_TIME_ADJNTPVAL;
|
||||
memcpy(&context->time.ntp_data, ad, sizeof(*ad));
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
void __audit_log_nfcfg(const char *name, u8 af, unsigned int nentries,
|
||||
|
Loading…
Reference in New Issue
Block a user