]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/basic/audit-util.c
seccomp-util: allowlist open_tree() as part of @file-system
[thirdparty/systemd.git] / src / basic / audit-util.c
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
d7832d2c 2
b5efdb8a 3#include "alloc-util.h"
430f0182 4#include "audit-util.h"
a5c32cff 5#include "fileio.h"
6bedfcbb 6#include "parse-util.h"
0c15577a 7#include "pidref.h"
3ffd4af2 8#include "process-util.h"
7e02ee98 9#include "stat-util.h"
b1d4f8e1 10#include "user-util.h"
7e02ee98 11#include "virt.h"
d7832d2c 12
7e02ee98 13static int audit_read_field(const PidRef *pid, const char *field, char **ret) {
d7832d2c
KS
14 int r;
15
7e02ee98
LP
16 assert(field);
17 assert(ret);
d7832d2c 18
7e02ee98
LP
19 if (!pidref_is_set(pid))
20 return -ESRCH;
d7e46e01 21
7e02ee98
LP
22 /* Auditing is currently not virtualized for containers. Let's hence not use the audit session ID or
23 * login UID for now, it will be leaked in from the host */
24 if (detect_container() > 0)
25 return -ENODATA;
d7832d2c 26
7e02ee98
LP
27 const char *p = procfs_file_alloca(pid->pid, field);
28
29 _cleanup_free_ char *s = NULL;
30 bool enoent = false;
e0c4b80f 31 r = read_full_virtual_file(p, &s, /* ret_size= */ NULL);
7e02ee98
LP
32 if (r == -ENOENT) {
33 if (proc_mounted() == 0)
34 return -ENOSYS;
35 enoent = true;
36 } else if (r < 0)
d7832d2c
KS
37 return r;
38
7e02ee98 39 r = pidref_verify(pid);
d7832d2c
KS
40 if (r < 0)
41 return r;
42
7e02ee98
LP
43 if (enoent) /* We got ENOENT, but /proc/ was mounted and the PID still valid? In that case it appears
44 * auditing is not supported by the kernel. */
d7e46e01 45 return -ENODATA;
d7832d2c 46
7e02ee98
LP
47 delete_trailing_chars(s, NEWLINE);
48
49 *ret = TAKE_PTR(s);
d7832d2c
KS
50 return 0;
51}
52
7e02ee98 53int audit_session_from_pid(const PidRef *pid, uint32_t *ret_id) {
5b12334d 54 _cleanup_free_ char *s = NULL;
d7832d2c
KS
55 int r;
56
7e02ee98
LP
57 r = audit_read_field(pid, "sessionid", &s);
58 if (r < 0)
59 return r;
d7832d2c 60
7e02ee98
LP
61 uint32_t u;
62 r = safe_atou32(s, &u);
d7832d2c
KS
63 if (r < 0)
64 return r;
65
7e02ee98 66 if (!audit_session_is_valid(u))
d7e46e01 67 return -ENODATA;
7e02ee98
LP
68
69 if (ret_id)
70 *ret_id = u;
71
72 return 0;
73}
74
75int audit_loginuid_from_pid(const PidRef *pid, uid_t *ret_uid) {
76 _cleanup_free_ char *s = NULL;
77 int r;
78
79 r = audit_read_field(pid, "loginuid", &s);
d7832d2c
KS
80 if (r < 0)
81 return r;
82
7e02ee98
LP
83 if (streq(s, "4294967295")) /* loginuid as 4294967295 means not part of any session. */
84 return -ENODATA;
85
86 return parse_uid(s, ret_uid);
d7832d2c 87}