> On 15 Dec 2023, at 15:24, Yonghong Song <yonghong.song@xxxxxxxxx> wrote: > > > On 12/15/23 6:38 AM, Dave Tucker wrote: >> Current output from auditd is as follows: >> >> time->Wed Dec 13 21:39:24 2023 >> type=BPF msg=audit(1702503564.519:11241): prog-id=439 op=LOAD >> >> This only tells you that a BPF program was loaded, but without >> any context. If we include the prog-name, pid, uid and comm we get >> output as follows: >> >> time->Wed Dec 13 21:59:59 2023 >> type=BPF msg=audit(1702504799.156:99528): op=UNLOAD prog-id=50092 >> prog-name="test" pid=27279 uid=0 comm="new_name" >> >> With pid, uid a system administrator has much better context >> over which processes and user loaded which eBPF programs. >> comm is useful since processes may be short-lived. >> >> Signed-off-by: Dave Tucker <dave@xxxxxxxxxxxxx> >> --- >> >> Changes: >> >> v1->v2: >> - Move 'op' to the front of the audit messages >> - Add 'prog-name' to the audit messages >> - Replace deprecated in_irq() with in_hardirq() >> - Remove in_irq() check from bpf_audit_prog since it's always called >> from the task context > > Is this true? For condition '(in_hardirq() || irqs_disabled()) > ', the context will be the task context. But what about nmi and > softirq? The context maynot be the task context, right? You’re right, my mistake. > Not sure whether this is relevant or not. There was a discussion > in the past about the above condition. See > https://lore.kernel.org/bpf/a93079f2-fcd4-e3ef-3b92-92d443b8e8c6@xxxxxxxx/ > > The recommended change was > > diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c index a75c54b6f8a3..11df562e481b 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -2147,7 +2147,7 @@ static void __bpf_prog_put(struct bpf_prog *prog) struct bpf_prog_aux *aux = prog->aux; > > if (atomic64_dec_and_test(&aux->refcnt)) { > - if (in_irq() || irqs_disabled()) { + if (!in_interrupt()) { INIT_WORK(&aux->work, bpf_prog_put_deferred); > schedule_work(&aux->work); > } else { include/linux/preempt.h says that in_interrupt is also deprecated. The condition could also be expressed as in_task(). > If the above change was true, then audit will not be able to > get any meaning task specific information, you might need to > gather such informaiton before hand. Hmmm. Would storing that information in bpf_prog_aux work? - Dave > > >> - Only populate pid, uid and comm if not in a kthread >> >> kernel/bpf/syscall.c | 27 ++++++++++++++++++++++----- >> 1 file changed, 22 insertions(+), 5 deletions(-) >> >> diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c >> index 06320d9abf33..fbbaf3b8ad48 100644 >> --- a/kernel/bpf/syscall.c >> +++ b/kernel/bpf/syscall.c >> @@ -35,6 +35,7 @@ >> #include <linux/rcupdate_trace.h> >> #include <linux/memcontrol.h> >> #include <linux/trace_events.h> >> +#include <linux/uidgid.h> >> #include <net/netfilter/nf_bpf_link.h> >> #include <net/netkit.h> >> @@ -2110,18 +2111,34 @@ static void bpf_audit_prog(const struct bpf_prog *prog, unsigned int op) >> { >> struct audit_context *ctx = NULL; >> struct audit_buffer *ab; >> + const struct cred *cred; >> + char comm[sizeof(current->comm)]; >> if (WARN_ON_ONCE(op >= BPF_AUDIT_MAX)) >> return; >> if (audit_enabled == AUDIT_OFF) >> return; >> - if (!in_irq() && !irqs_disabled()) >> - ctx = audit_context(); >> + >> + ctx = audit_context(); >> ab = audit_log_start(ctx, GFP_ATOMIC, AUDIT_BPF); >> if (unlikely(!ab)) >> return; >> - audit_log_format(ab, "prog-id=%u op=%s", >> - prog->aux->id, bpf_audit_str[op]); >> + >> + audit_log_format(ab, "op=%s prog-id=%u", >> + bpf_audit_str[op], prog->aux->id); >> + audit_log_format(ab, " prog-name="); >> + audit_log_untrustedstring(ab, prog->aux->name ?: "(none)"); >> + >> + if (current->mm) { >> + cred = current_cred(); >> + audit_log_format(ab, " pid=%u uid=%u", >> + task_pid_nr(current), >> + from_kuid(&init_user_ns, cred->uid)); >> + audit_log_format(ab, " comm="); >> + audit_log_untrustedstring(ab, get_task_comm(comm, current)); >> + } else { >> + audit_log_format(ab, " pid=? uid=? comm=?"); >> + } >> audit_log_end(ab); >> } >> @@ -2212,7 +2229,7 @@ static void __bpf_prog_put(struct bpf_prog *prog) >> struct bpf_prog_aux *aux = prog->aux; >> if (atomic64_dec_and_test(&aux->refcnt)) { >> - if (in_irq() || irqs_disabled()) { >> + if (in_hardirq() || irqs_disabled()) { >> INIT_WORK(&aux->work, bpf_prog_put_deferred); >> schedule_work(&aux->work); >> } else {