1 /* SPDX-License-Identifier: LGPL-2.1+ */
3 #include "alloc-util.h"
4 #include "audit-type.h"
8 #include "journald-audit.h"
10 #include "string-util.h"
12 typedef struct MapField
{
13 const char *audit_field
;
14 const char *journal_field
;
15 int (*map
)(const char *field
, const char **p
, struct iovec
**iov
, size_t *n_iov_allocated
, size_t *n_iov
);
18 static int map_simple_field(const char *field
, const char **p
, struct iovec
**iov
, size_t *n_iov_allocated
, size_t *n_iov
) {
19 _cleanup_free_
char *c
= NULL
;
20 size_t l
= 0, allocated
= 0;
30 c
= malloc(allocated
);
35 for (e
= *p
; !IN_SET(*e
, 0, ' '); e
++) {
36 if (!GREEDY_REALLOC(c
, allocated
, l
+2))
44 if (!GREEDY_REALLOC(*iov
, *n_iov_allocated
, *n_iov
+ 1))
47 (*iov
)[(*n_iov
)++] = IOVEC_MAKE(c
, l
);
55 static int map_string_field_internal(const char *field
, const char **p
, struct iovec
**iov
, size_t *n_iov_allocated
, size_t *n_iov
, bool filter_printable
) {
56 _cleanup_free_
char *c
= NULL
;
65 /* The kernel formats string fields in one of two formats. */
68 /* Normal quoted syntax */
74 l
= strlen(field
) + (e
- s
);
79 *((char*) mempcpy(stpcpy(c
, field
), s
, e
- s
)) = 0;
83 } else if (unhexchar(**p
) >= 0) {
84 /* Hexadecimal escaping */
89 c
= malloc(allocated
);
94 for (e
= *p
; !IN_SET(*e
, 0, ' '); e
+= 2) {
106 x
= ((uint8_t) a
<< 4 | (uint8_t) b
);
108 if (filter_printable
&& x
< (uint8_t) ' ')
111 if (!GREEDY_REALLOC(c
, allocated
, l
+2))
121 if (!GREEDY_REALLOC(*iov
, *n_iov_allocated
, *n_iov
+ 1))
124 (*iov
)[(*n_iov
)++] = IOVEC_MAKE(c
, l
);
132 static int map_string_field(const char *field
, const char **p
, struct iovec
**iov
, size_t *n_iov_allocated
, size_t *n_iov
) {
133 return map_string_field_internal(field
, p
, iov
, n_iov_allocated
, n_iov
, false);
136 static int map_string_field_printable(const char *field
, const char **p
, struct iovec
**iov
, size_t *n_iov_allocated
, size_t *n_iov
) {
137 return map_string_field_internal(field
, p
, iov
, n_iov_allocated
, n_iov
, true);
140 static int map_generic_field(const char *prefix
, const char **p
, struct iovec
**iov
, size_t *n_iov_allocated
, size_t *n_iov
) {
145 /* Implements fallback mappings for all fields we don't know */
147 for (e
= *p
; e
< *p
+ 16; e
++) {
149 if (IN_SET(*e
, 0, ' '))
155 if (!((*e
>= 'a' && *e
<= 'z') ||
156 (*e
>= 'A' && *e
<= 'Z') ||
157 (*e
>= '0' && *e
<= '9') ||
158 IN_SET(*e
, '_', '-')))
162 if (e
<= *p
|| e
>= *p
+ 16)
165 c
= alloca(strlen(prefix
) + (e
- *p
) + 2);
167 t
= stpcpy(c
, prefix
);
168 for (f
= *p
; f
< e
; f
++) {
171 if (*f
>= 'a' && *f
<= 'z')
172 x
= (*f
- 'a') + 'A'; /* uppercase */
174 x
= '_'; /* dashes → underscores */
184 r
= map_simple_field(c
, &e
, iov
, n_iov_allocated
, n_iov
);
192 /* Kernel fields are those occurring in the audit string before
193 * msg='. All of these fields are trusted, hence carry the "_" prefix.
194 * We try to translate the fields we know into our native names. The
195 * other's are generically mapped to _AUDIT_FIELD_XYZ= */
196 static const MapField map_fields_kernel
[] = {
198 /* First, we map certain well-known audit fields into native
199 * well-known fields */
200 { "pid=", "_PID=", map_simple_field
},
201 { "ppid=", "_PPID=", map_simple_field
},
202 { "uid=", "_UID=", map_simple_field
},
203 { "euid=", "_EUID=", map_simple_field
},
204 { "fsuid=", "_FSUID=", map_simple_field
},
205 { "gid=", "_GID=", map_simple_field
},
206 { "egid=", "_EGID=", map_simple_field
},
207 { "fsgid=", "_FSGID=", map_simple_field
},
208 { "tty=", "_TTY=", map_simple_field
},
209 { "ses=", "_AUDIT_SESSION=", map_simple_field
},
210 { "auid=", "_AUDIT_LOGINUID=", map_simple_field
},
211 { "subj=", "_SELINUX_CONTEXT=", map_simple_field
},
212 { "comm=", "_COMM=", map_string_field
},
213 { "exe=", "_EXE=", map_string_field
},
214 { "proctitle=", "_CMDLINE=", map_string_field_printable
},
216 /* Some fields don't map to native well-known fields. However,
217 * we know that they are string fields, hence let's undo
218 * string field escaping for them, though we stick to the
219 * generic field names. */
220 { "path=", "_AUDIT_FIELD_PATH=", map_string_field
},
221 { "dev=", "_AUDIT_FIELD_DEV=", map_string_field
},
222 { "name=", "_AUDIT_FIELD_NAME=", map_string_field
},
226 /* Userspace fields are those occurring in the audit string after
227 * msg='. All of these fields are untrusted, hence carry no "_"
228 * prefix. We map the fields we don't know to AUDIT_FIELD_XYZ= */
229 static const MapField map_fields_userspace
[] = {
230 { "cwd=", "AUDIT_FIELD_CWD=", map_string_field
},
231 { "cmd=", "AUDIT_FIELD_CMD=", map_string_field
},
232 { "acct=", "AUDIT_FIELD_ACCT=", map_string_field
},
233 { "exe=", "AUDIT_FIELD_EXE=", map_string_field
},
234 { "comm=", "AUDIT_FIELD_COMM=", map_string_field
},
238 static int map_all_fields(
240 const MapField map_fields
[],
244 size_t *n_iov_allocated
,
251 assert(n_iov_allocated
);
259 p
+= strspn(p
, WHITESPACE
);
265 v
= startswith(p
, "msg='");
270 /* Userspace message. It's enclosed in
271 simple quotation marks, is not
272 escaped, but the last field in the
273 line, hence let's remove the
274 quotation mark, and apply the
275 userspace mapping instead of the
278 e
= endswith(v
, "'");
280 return 0; /* don't continue splitting up if the final quotation mark is missing */
282 c
= strndupa(v
, e
- v
);
283 return map_all_fields(c
, map_fields_userspace
, "AUDIT_FIELD_", false, iov
, n_iov_allocated
, n_iov
);
287 /* Try to map the kernel fields to our own names */
288 for (m
= map_fields
; m
->audit_field
; m
++) {
289 v
= startswith(p
, m
->audit_field
);
293 r
= m
->map(m
->journal_field
, &v
, iov
, n_iov_allocated
, n_iov
);
295 return log_debug_errno(r
, "Failed to parse audit array: %m");
305 r
= map_generic_field(prefix
, &p
, iov
, n_iov_allocated
, n_iov
);
307 return log_debug_errno(r
, "Failed to parse audit array: %m");
310 /* Couldn't process as generic field, let's just skip over it */
311 p
+= strcspn(p
, WHITESPACE
);
316 void process_audit_string(Server
*s
, int type
, const char *data
, size_t size
) {
317 size_t n_iov_allocated
= 0, n_iov
= 0, z
;
318 _cleanup_free_
struct iovec
*iov
= NULL
;
319 uint64_t seconds
, msec
, id
;
320 const char *p
, *type_name
;
321 char id_field
[sizeof("_AUDIT_ID=") + DECIMAL_STR_MAX(uint64_t)],
322 type_field
[sizeof("_AUDIT_TYPE=") + DECIMAL_STR_MAX(int)],
323 source_time_field
[sizeof("_SOURCE_REALTIME_TIMESTAMP=") + DECIMAL_STR_MAX(usec_t
)];
324 char *m
, *type_field_name
;
335 /* Note that the input buffer is NUL terminated, but let's
336 * check whether there is a spurious NUL byte */
337 if (memchr(data
, 0, size
))
340 p
= startswith(data
, "audit");
345 if (sscanf(p
, "(%" PRIu64
".%" PRIu64
":%" PRIu64
"):%n",
353 p
+= strspn(p
, WHITESPACE
);
358 n_iov_allocated
= N_IOVEC_META_FIELDS
+ 8;
359 iov
= new(struct iovec
, n_iov_allocated
);
365 iov
[n_iov
++] = IOVEC_MAKE_STRING("_TRANSPORT=audit");
367 sprintf(source_time_field
, "_SOURCE_REALTIME_TIMESTAMP=%" PRIu64
,
368 (usec_t
) seconds
* USEC_PER_SEC
+ (usec_t
) msec
* USEC_PER_MSEC
);
369 iov
[n_iov
++] = IOVEC_MAKE_STRING(source_time_field
);
371 sprintf(type_field
, "_AUDIT_TYPE=%i", type
);
372 iov
[n_iov
++] = IOVEC_MAKE_STRING(type_field
);
374 sprintf(id_field
, "_AUDIT_ID=%" PRIu64
, id
);
375 iov
[n_iov
++] = IOVEC_MAKE_STRING(id_field
);
377 assert_cc(4 == LOG_FAC(LOG_AUTH
));
378 iov
[n_iov
++] = IOVEC_MAKE_STRING("SYSLOG_FACILITY=4");
379 iov
[n_iov
++] = IOVEC_MAKE_STRING("SYSLOG_IDENTIFIER=audit");
381 type_name
= audit_type_name_alloca(type
);
383 type_field_name
= strjoina("_AUDIT_TYPE_NAME=", type_name
);
384 iov
[n_iov
++] = IOVEC_MAKE_STRING(type_field_name
);
386 m
= strjoina("MESSAGE=", type_name
, " ", p
);
387 iov
[n_iov
++] = IOVEC_MAKE_STRING(m
);
391 map_all_fields(p
, map_fields_kernel
, "_AUDIT_FIELD_", true, &iov
, &n_iov_allocated
, &n_iov
);
393 if (!GREEDY_REALLOC(iov
, n_iov_allocated
, n_iov
+ N_IOVEC_META_FIELDS
)) {
398 server_dispatch_message(s
, iov
, n_iov
, n_iov_allocated
, NULL
, NULL
, LOG_NOTICE
, 0);
401 /* free() all entries that map_all_fields() added. All others
402 * are allocated on the stack or are constant. */
404 for (; z
< n_iov
; z
++)
405 free(iov
[z
].iov_base
);
408 void server_process_audit_message(
412 const struct ucred
*ucred
,
413 const union sockaddr_union
*sa
,
416 const struct nlmsghdr
*nl
= buffer
;
420 if (buffer_size
< ALIGN(sizeof(struct nlmsghdr
)))
425 /* Filter out fake data */
427 salen
!= sizeof(struct sockaddr_nl
) ||
428 sa
->nl
.nl_family
!= AF_NETLINK
||
429 sa
->nl
.nl_pid
!= 0) {
430 log_debug("Audit netlink message from invalid sender.");
434 if (!ucred
|| ucred
->pid
!= 0) {
435 log_debug("Audit netlink message with invalid credentials.");
439 if (!NLMSG_OK(nl
, buffer_size
)) {
440 log_error("Audit netlink message truncated.");
444 /* Ignore special Netlink messages */
445 if (IN_SET(nl
->nlmsg_type
, NLMSG_NOOP
, NLMSG_ERROR
))
448 /* Except AUDIT_USER, all messsages below AUDIT_FIRST_USER_MSG are control messages, let's ignore those */
449 if (nl
->nlmsg_type
< AUDIT_FIRST_USER_MSG
&& nl
->nlmsg_type
!= AUDIT_USER
)
452 process_audit_string(s
, nl
->nlmsg_type
, NLMSG_DATA(nl
), nl
->nlmsg_len
- ALIGN(sizeof(struct nlmsghdr
)));
455 static int enable_audit(int fd
, bool b
) {
458 struct nlmsghdr header
;
459 uint8_t header_space
[NLMSG_HDRLEN
];
461 struct audit_status body
;
462 } _packed_ request
= {
463 .header
.nlmsg_len
= NLMSG_LENGTH(sizeof(struct audit_status
)),
464 .header
.nlmsg_type
= AUDIT_SET
,
465 .header
.nlmsg_flags
= NLM_F_REQUEST
,
466 .header
.nlmsg_seq
= 1,
467 .header
.nlmsg_pid
= 0,
468 .body
.mask
= AUDIT_STATUS_ENABLED
,
471 union sockaddr_union sa
= {
472 .nl
.nl_family
= AF_NETLINK
,
475 struct iovec iovec
= {
476 .iov_base
= &request
,
477 .iov_len
= NLMSG_LENGTH(sizeof(struct audit_status
)),
483 .msg_namelen
= sizeof(sa
.nl
),
488 n
= sendmsg(fd
, &mh
, MSG_NOSIGNAL
);
491 if (n
!= NLMSG_LENGTH(sizeof(struct audit_status
)))
494 /* We don't wait for the result here, we can't do anything
500 int server_open_audit(Server
*s
) {
503 if (s
->audit_fd
< 0) {
504 static const union sockaddr_union sa
= {
505 .nl
.nl_family
= AF_NETLINK
,
507 .nl
.nl_groups
= AUDIT_NLGRP_READLOG
,
510 s
->audit_fd
= socket(AF_NETLINK
, SOCK_RAW
|SOCK_CLOEXEC
|SOCK_NONBLOCK
, NETLINK_AUDIT
);
511 if (s
->audit_fd
< 0) {
512 if (IN_SET(errno
, EAFNOSUPPORT
, EPROTONOSUPPORT
))
513 log_debug("Audit not supported in the kernel.");
515 log_warning_errno(errno
, "Failed to create audit socket, ignoring: %m");
520 if (bind(s
->audit_fd
, &sa
.sa
, sizeof(sa
.nl
)) < 0) {
521 log_warning_errno(errno
,
522 "Failed to join audit multicast group. "
523 "The kernel is probably too old or multicast reading is not supported. "
525 s
->audit_fd
= safe_close(s
->audit_fd
);
529 (void) fd_nonblock(s
->audit_fd
, true);
531 r
= setsockopt_int(s
->audit_fd
, SOL_SOCKET
, SO_PASSCRED
, true);
533 return log_error_errno(r
, "Failed to set SO_PASSCRED on audit socket: %m");
535 r
= sd_event_add_io(s
->event
, &s
->audit_event_source
, s
->audit_fd
, EPOLLIN
, server_process_datagram
, s
);
537 return log_error_errno(r
, "Failed to add audit fd to event loop: %m");
539 /* We are listening now, try to enable audit */
540 r
= enable_audit(s
->audit_fd
, true);
542 log_warning_errno(r
, "Failed to issue audit enable call: %m");