diff options
author | Jeff Vander Stoep <jeffv@google.com> | 2015-07-10 23:19:55 +0200 |
---|---|---|
committer | Paul Moore <pmoore@redhat.com> | 2015-07-13 19:31:58 +0200 |
commit | 671a2781ff01abf4fdc8904881fc3abd3a8279af (patch) | |
tree | d4bacc22ccd65b486f6f71360ac128ad365edcf3 /security/lsm_audit.c | |
parent | selinux: fix mprotect PROT_EXEC regression caused by mm change (diff) | |
download | linux-671a2781ff01abf4fdc8904881fc3abd3a8279af.tar.xz linux-671a2781ff01abf4fdc8904881fc3abd3a8279af.zip |
security: add ioctl specific auditing to lsm_audit
Add information about ioctl calls to the LSM audit data. Log the
file path and command number.
Signed-off-by: Jeff Vander Stoep <jeffv@google.com>
Acked-by: Nick Kralevich <nnk@google.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <pmoore@redhat.com>
Diffstat (limited to 'security/lsm_audit.c')
-rw-r--r-- | security/lsm_audit.c | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/security/lsm_audit.c b/security/lsm_audit.c index 1d34277dc402..9f6c649c65e9 100644 --- a/security/lsm_audit.c +++ b/security/lsm_audit.c @@ -245,6 +245,21 @@ static void dump_common_audit_data(struct audit_buffer *ab, } break; } + case LSM_AUDIT_DATA_IOCTL_OP: { + struct inode *inode; + + audit_log_d_path(ab, " path=", &a->u.op->path); + + inode = a->u.op->path.dentry->d_inode; + if (inode) { + audit_log_format(ab, " dev="); + audit_log_untrustedstring(ab, inode->i_sb->s_id); + audit_log_format(ab, " ino=%lu", inode->i_ino); + } + + audit_log_format(ab, " ioctlcmd=%hx", a->u.op->cmd); + break; + } case LSM_AUDIT_DATA_DENTRY: { struct inode *inode; |