Skip to content

Commit

Permalink
audit: add call argument to socketcall auditing
Browse files Browse the repository at this point in the history
socketcall auditing misses the call argument:

type=SOCKETCALL msg=audit: nargs=3 a0=10 a1=3 a2=c

which renders socketcall auditing (almost) useless. Add the call
argument so it is possible to decode the actual syscall from the
audit log:

type=SOCKETCALL msg=audit: call=1 nargs=3 a0=10 a1=3 a2=c

Signed-off-by: Sven Schnelle <svens@linux.ibm.com>
  • Loading branch information
svens-s390 authored and intel-lab-lkp committed May 3, 2022
1 parent 9050ba3 commit b89caae
Show file tree
Hide file tree
Showing 5 changed files with 12 additions and 9 deletions.
10 changes: 5 additions & 5 deletions include/linux/audit.h
Expand Up @@ -405,7 +405,7 @@ static inline void audit_ptrace(struct task_struct *t)
extern void __audit_ipc_obj(struct kern_ipc_perm *ipcp);
extern void __audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, umode_t mode);
extern void __audit_bprm(struct linux_binprm *bprm);
extern int __audit_socketcall(int nargs, unsigned long *args);
extern int __audit_socketcall(int call, int nargs, unsigned long *args);
extern int __audit_sockaddr(int len, void *addr);
extern void __audit_fd_pair(int fd1, int fd2);
extern void __audit_mq_open(int oflag, umode_t mode, struct mq_attr *attr);
Expand Down Expand Up @@ -445,14 +445,14 @@ static inline void audit_bprm(struct linux_binprm *bprm)
if (unlikely(!audit_dummy_context()))
__audit_bprm(bprm);
}
static inline int audit_socketcall(int nargs, unsigned long *args)
static inline int audit_socketcall(int call, int nargs, unsigned long *args)
{
if (unlikely(!audit_dummy_context()))
return __audit_socketcall(nargs, args);
return __audit_socketcall(call, nargs, args);
return 0;
}

static inline int audit_socketcall_compat(int nargs, u32 *args)
static inline int audit_socketcall_compat(int call, int nargs, u32 *args)
{
unsigned long a[AUDITSC_ARGS];
int i;
Expand All @@ -462,7 +462,7 @@ static inline int audit_socketcall_compat(int nargs, u32 *args)

for (i = 0; i < nargs; i++)
a[i] = (unsigned long)args[i];
return __audit_socketcall(nargs, a);
return __audit_socketcall(call, nargs, a);
}

static inline int audit_sockaddr(int len, void *addr)
Expand Down
1 change: 1 addition & 0 deletions kernel/audit.h
Expand Up @@ -153,6 +153,7 @@ struct audit_context {
int type;
union {
struct {
int call;
int nargs;
long args[6];
} socketcall;
Expand Down
6 changes: 4 additions & 2 deletions kernel/auditsc.c
Expand Up @@ -1399,8 +1399,9 @@ static void show_special(struct audit_context *context, int *call_panic)
switch (context->type) {
case AUDIT_SOCKETCALL: {
int nargs = context->socketcall.nargs;
int call = context->socketcall.call;

audit_log_format(ab, "nargs=%d", nargs);
audit_log_format(ab, "call=%d nargs=%d", call, nargs);
for (i = 0; i < nargs; i++)
audit_log_format(ab, " a%d=%lx", i,
context->socketcall.args[i]);
Expand Down Expand Up @@ -2684,13 +2685,14 @@ void __audit_bprm(struct linux_binprm *bprm)
* @args: args array
*
*/
int __audit_socketcall(int nargs, unsigned long *args)
int __audit_socketcall(int call, int nargs, unsigned long *args)
{
struct audit_context *context = audit_context();

if (nargs <= 0 || nargs > AUDITSC_ARGS || !args)
return -EINVAL;
context->type = AUDIT_SOCKETCALL;
context->socketcall.call = call;
context->socketcall.nargs = nargs;
memcpy(context->socketcall.args, args, nargs * sizeof(unsigned long));
return 0;
Expand Down
2 changes: 1 addition & 1 deletion net/compat.c
Expand Up @@ -437,7 +437,7 @@ COMPAT_SYSCALL_DEFINE2(socketcall, int, call, u32 __user *, args)
if (copy_from_user(a, args, len))
return -EFAULT;

ret = audit_socketcall_compat(len / sizeof(a[0]), a);
ret = audit_socketcall_compat(call, len / sizeof(a[0]), a);
if (ret)
return ret;

Expand Down
2 changes: 1 addition & 1 deletion net/socket.c
Expand Up @@ -2921,7 +2921,7 @@ SYSCALL_DEFINE2(socketcall, int, call, unsigned long __user *, args)
if (copy_from_user(a, args, len))
return -EFAULT;

err = audit_socketcall(nargs[call] / sizeof(unsigned long), a);
err = audit_socketcall(call, nargs[call] / sizeof(unsigned long), a);
if (err)
return err;

Expand Down

0 comments on commit b89caae

Please sign in to comment.