Merge branch 'header-fixes-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-2.6] / security / integrity / ima / ima_audit.c
1 /*
2  * Copyright (C) 2008 IBM Corporation
3  * Author: Mimi Zohar <zohar@us.ibm.com>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License as published by
7  * the Free Software Foundation, version 2 of the License.
8  *
9  * File: integrity_audit.c
10  *      Audit calls for the integrity subsystem
11  */
12
13 #include <linux/fs.h>
14 #include <linux/audit.h>
15 #include "ima.h"
16
17 static int ima_audit;
18
19 #ifdef CONFIG_IMA_AUDIT
20
21 /* ima_audit_setup - enable informational auditing messages */
22 static int __init ima_audit_setup(char *str)
23 {
24         unsigned long audit;
25         int rc, result = 0;
26         char *op = "ima_audit";
27         char *cause;
28
29         rc = strict_strtoul(str, 0, &audit);
30         if (rc || audit > 1)
31                 result = 1;
32         else
33                 ima_audit = audit;
34         cause = ima_audit ? "enabled" : "not_enabled";
35         integrity_audit_msg(AUDIT_INTEGRITY_STATUS, NULL, NULL,
36                             op, cause, result, 0);
37         return 1;
38 }
39 __setup("ima_audit=", ima_audit_setup);
40 #endif
41
42 void integrity_audit_msg(int audit_msgno, struct inode *inode,
43                          const unsigned char *fname, const char *op,
44                          const char *cause, int result, int audit_info)
45 {
46         struct audit_buffer *ab;
47
48         if (!ima_audit && audit_info == 1) /* Skip informational messages */
49                 return;
50
51         ab = audit_log_start(current->audit_context, GFP_KERNEL, audit_msgno);
52         audit_log_format(ab, "integrity: pid=%d uid=%u auid=%u ses=%u",
53                          current->pid, current->cred->uid,
54                          audit_get_loginuid(current),
55                          audit_get_sessionid(current));
56         audit_log_task_context(ab);
57         switch (audit_msgno) {
58         case AUDIT_INTEGRITY_DATA:
59         case AUDIT_INTEGRITY_METADATA:
60         case AUDIT_INTEGRITY_PCR:
61         case AUDIT_INTEGRITY_STATUS:
62                 audit_log_format(ab, " op=%s cause=%s", op, cause);
63                 break;
64         case AUDIT_INTEGRITY_HASH:
65                 audit_log_format(ab, " op=%s hash=%s", op, cause);
66                 break;
67         default:
68                 audit_log_format(ab, " op=%s", op);
69         }
70         audit_log_format(ab, " comm=");
71         audit_log_untrustedstring(ab, current->comm);
72         if (fname) {
73                 audit_log_format(ab, " name=");
74                 audit_log_untrustedstring(ab, fname);
75         }
76         if (inode)
77                 audit_log_format(ab, " dev=%s ino=%lu",
78                                  inode->i_sb->s_id, inode->i_ino);
79         audit_log_format(ab, " res=%d", !result ? 0 : 1);
80         audit_log_end(ab);
81 }