mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-25 13:14:07 +08:00
audit: add support for the openat2 syscall
The openat2(2) syscall was added in kernel v5.6 with commit
fddb5d430a
("open: introduce openat2(2) syscall").
Add the openat2(2) syscall to the audit syscall classifier.
Link: https://github.com/linux-audit/audit-kernel/issues/67
Link: https://lore.kernel.org/r/f5f1a4d8699613f8c02ce762807228c841c2e26f.1621363275.git.rgb@redhat.com
Signed-off-by: Richard Guy Briggs <rgb@redhat.com>
Acked-by: Christian Brauner <christian.brauner@ubuntu.com>
[PM: merge fuzz due to previous header rename, commit line wraps]
Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
42f355ef59
commit
1c30e3af8a
@ -42,6 +42,8 @@ int audit_classify_syscall(int abi, unsigned syscall)
|
||||
return AUDITSC_OPENAT;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_NATIVE;
|
||||
}
|
||||
|
@ -43,6 +43,8 @@ int audit_classify_syscall(int abi, unsigned syscall)
|
||||
return AUDITSC_OPENAT;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_NATIVE;
|
||||
}
|
||||
|
@ -52,6 +52,8 @@ int audit_classify_syscall(int abi, unsigned syscall)
|
||||
return AUDITSC_OPENAT;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_NATIVE;
|
||||
}
|
||||
|
@ -36,6 +36,8 @@ int parisc32_classify_syscall(unsigned syscall)
|
||||
return AUDITSC_OPENAT;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_COMPAT;
|
||||
}
|
||||
|
@ -54,6 +54,8 @@ int audit_classify_syscall(int abi, unsigned syscall)
|
||||
return AUDITSC_SOCKETCALL;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_NATIVE;
|
||||
}
|
||||
|
@ -39,6 +39,8 @@ int ppc32_classify_syscall(unsigned syscall)
|
||||
return AUDITSC_SOCKETCALL;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_COMPAT;
|
||||
}
|
||||
|
@ -54,6 +54,8 @@ int audit_classify_syscall(int abi, unsigned syscall)
|
||||
return AUDITSC_SOCKETCALL;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_NATIVE;
|
||||
}
|
||||
|
@ -40,6 +40,8 @@ int s390_classify_syscall(unsigned syscall)
|
||||
return AUDITSC_SOCKETCALL;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_COMPAT;
|
||||
}
|
||||
|
@ -55,6 +55,8 @@ int audit_classify_syscall(int abi, unsigned int syscall)
|
||||
return AUDITSC_SOCKETCALL;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_NATIVE;
|
||||
}
|
||||
|
@ -40,6 +40,8 @@ int sparc32_classify_syscall(unsigned int syscall)
|
||||
return AUDITSC_SOCKETCALL;
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_COMPAT;
|
||||
}
|
||||
|
@ -40,6 +40,8 @@ int ia32_classify_syscall(unsigned syscall)
|
||||
case __NR_execve:
|
||||
case __NR_execveat:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_COMPAT;
|
||||
}
|
||||
|
@ -53,6 +53,8 @@ int audit_classify_syscall(int abi, unsigned syscall)
|
||||
case __NR_execve:
|
||||
case __NR_execveat:
|
||||
return AUDITSC_EXECVE;
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
default:
|
||||
return AUDITSC_NATIVE;
|
||||
}
|
||||
|
@ -16,6 +16,7 @@ enum auditsc_class_t {
|
||||
AUDITSC_OPENAT,
|
||||
AUDITSC_SOCKETCALL,
|
||||
AUDITSC_EXECVE,
|
||||
AUDITSC_OPENAT2,
|
||||
|
||||
AUDITSC_NVALS /* count */
|
||||
};
|
||||
|
@ -63,6 +63,7 @@
|
||||
#include <linux/fsnotify_backend.h>
|
||||
#include <uapi/linux/limits.h>
|
||||
#include <uapi/linux/netfilter/nf_tables.h>
|
||||
#include <uapi/linux/openat2.h>
|
||||
|
||||
#include "audit.h"
|
||||
|
||||
@ -183,6 +184,8 @@ static int audit_match_perm(struct audit_context *ctx, int mask)
|
||||
return ((mask & AUDIT_PERM_WRITE) && ctx->argv[0] == SYS_BIND);
|
||||
case AUDITSC_EXECVE:
|
||||
return mask & AUDIT_PERM_EXEC;
|
||||
case AUDITSC_OPENAT2:
|
||||
return mask & ACC_MODE((u32)((struct open_how *)ctx->argv[2])->flags);
|
||||
default:
|
||||
return 0;
|
||||
}
|
||||
|
@ -60,6 +60,10 @@ int audit_classify_syscall(int abi, unsigned syscall)
|
||||
#endif
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
#ifdef __NR_openat2
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
#endif
|
||||
default:
|
||||
return AUDITSC_NATIVE;
|
||||
}
|
||||
|
@ -46,6 +46,10 @@ int audit_classify_compat_syscall(int abi, unsigned syscall)
|
||||
#endif
|
||||
case __NR_execve:
|
||||
return AUDITSC_EXECVE;
|
||||
#ifdef __NR_openat2
|
||||
case __NR_openat2:
|
||||
return AUDITSC_OPENAT2;
|
||||
#endif
|
||||
default:
|
||||
return AUDITSC_COMPAT;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user