selinux: log anon inode class name
Log the anonymous inode class name in the security hook inode_init_security_anon. This name is the key for name based type transitions on the anon_inode security class on creation. Example: type=AVC msg=audit(02/16/22 22:02:50.585:216) : avc: granted \ { create } for pid=2136 comm=mariadbd anonclass=[io_uring] \ scontext=system_u:system_r:mysqld_t:s0 \ tcontext=system_u:system_r:mysqld_iouring_t:s0 tclass=anon_inode Add a new LSM audit data type holding the inode and the class name. Signed-off-by: Christian Göttsche <cgzones@googlemail.com> [PM: adjusted 'anonclass' to be a trusted string, cgzones approved] Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
ded34574d4
commit
c29722fad4
@ -76,6 +76,7 @@ struct common_audit_data {
|
|||||||
#define LSM_AUDIT_DATA_IBENDPORT 14
|
#define LSM_AUDIT_DATA_IBENDPORT 14
|
||||||
#define LSM_AUDIT_DATA_LOCKDOWN 15
|
#define LSM_AUDIT_DATA_LOCKDOWN 15
|
||||||
#define LSM_AUDIT_DATA_NOTIFICATION 16
|
#define LSM_AUDIT_DATA_NOTIFICATION 16
|
||||||
|
#define LSM_AUDIT_DATA_ANONINODE 17
|
||||||
union {
|
union {
|
||||||
struct path path;
|
struct path path;
|
||||||
struct dentry *dentry;
|
struct dentry *dentry;
|
||||||
@ -96,6 +97,7 @@ struct common_audit_data {
|
|||||||
struct lsm_ibpkey_audit *ibpkey;
|
struct lsm_ibpkey_audit *ibpkey;
|
||||||
struct lsm_ibendport_audit *ibendport;
|
struct lsm_ibendport_audit *ibendport;
|
||||||
int reason;
|
int reason;
|
||||||
|
const char *anonclass;
|
||||||
} u;
|
} u;
|
||||||
/* this union contains LSM specific data */
|
/* this union contains LSM specific data */
|
||||||
union {
|
union {
|
||||||
|
@ -433,6 +433,9 @@ static void dump_common_audit_data(struct audit_buffer *ab,
|
|||||||
audit_log_format(ab, " lockdown_reason=\"%s\"",
|
audit_log_format(ab, " lockdown_reason=\"%s\"",
|
||||||
lockdown_reasons[a->u.reason]);
|
lockdown_reasons[a->u.reason]);
|
||||||
break;
|
break;
|
||||||
|
case LSM_AUDIT_DATA_ANONINODE:
|
||||||
|
audit_log_format(ab, " anonclass=%s", a->u.anonclass);
|
||||||
|
break;
|
||||||
} /* switch (a->type) */
|
} /* switch (a->type) */
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2964,8 +2964,8 @@ static int selinux_inode_init_security_anon(struct inode *inode,
|
|||||||
* allowed to actually create this type of anonymous inode.
|
* allowed to actually create this type of anonymous inode.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
ad.type = LSM_AUDIT_DATA_INODE;
|
ad.type = LSM_AUDIT_DATA_ANONINODE;
|
||||||
ad.u.inode = inode;
|
ad.u.anonclass = name ? (const char *)name->name : "?";
|
||||||
|
|
||||||
return avc_has_perm(&selinux_state,
|
return avc_has_perm(&selinux_state,
|
||||||
tsec->sid,
|
tsec->sid,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user