Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3821981imm; Tue, 29 May 2018 14:32:02 -0700 (PDT) X-Google-Smtp-Source: ADUXVKL4oEo6DWed4LOPUKTbDX8vJ64UPUXysZhFhGodOjREeC08AFlMqCeW6ltOopjge2dwPkCT X-Received: by 2002:a65:61a6:: with SMTP id i6-v6mr95319pgv.88.1527629522449; Tue, 29 May 2018 14:32:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527629522; cv=none; d=google.com; s=arc-20160816; b=H9NX/35iSaz5Rx/8G5edEGAZgrRQyowjsYc8ElNPzzOQIYm7TzS7429v8HMOyYB8IJ HUH1eANUxqZ+qIKJC8vYMAmtKd0bQbPmjJsbzpkaUIgbc5mXKHUykvX/u3xJWDmWouVb ho2XYA5tGmVRksSkdOARbya3qcxZyk/OEsGJ64mGjILa0tGlS0EOZ8NzInAqg0W/0YG1 qMGkElS+RvDjxqX01pcxWjQqmU9bJ6tcbQuSpyintCfFz21WbYW0PBnxPYsHZ7IVNVDQ 7tSZig1Zj71NdJSM68JIDVUKEN+vHNpqQNdlp1gDRy1zoJnWkoOvm/Ta+Njqvg1j0LW/ LilA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:organization:message-id:date:subject:cc:to :from:arc-authentication-results; bh=JdLEQGI/LAVxzStzLbWR47QLU9JZzzuiYd/vM/uyNdY=; b=eoFXQJFzD0BJasehvbtDXAIPWeCjBBjGxSYlGHMqjlboEenjQ/866EEPlMEI7WIbGR /bv9YYQ1EUQLDdXlQeQS1oKC7U8gIRLu6i7h167lwYfvCzuK+z53Zj4UzEjRbKoUXEdl ooQt68kykReVztfQZ3Ol1JNydA+nodoVe1u/95ehtlGFefOP1v6oMYpxoULS+pLIXNpo A5DHW28LLIzSkAYZV2oSuBwgEAq18HmhmQpP+hv+fKHTVgsNPRRTHv9wB6HsZMV0hMIw 8YnUF0qiILY9I5P+a8IsxKn45TSRpYnnDVkcMX7EWNVp3HbDMjHOMbDF3exp2wlzsbMM j9Sg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b35-v6si33423340plh.36.2018.05.29.14.31.47; Tue, 29 May 2018 14:32:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S967250AbeE2VaJ (ORCPT + 99 others); Tue, 29 May 2018 17:30:09 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:55142 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S966989AbeE2VaI (ORCPT ); Tue, 29 May 2018 17:30:08 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 6C7618424E; Tue, 29 May 2018 21:30:07 +0000 (UTC) Received: from x2.localnet (ovpn-121-112.rdu2.redhat.com [10.10.121.112]) by smtp.corp.redhat.com (Postfix) with ESMTP id 308FB210C6CE; Tue, 29 May 2018 21:30:07 +0000 (UTC) From: Steve Grubb To: Stefan Berger Cc: zohar@linux.vnet.ibm.com, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, linux-audit@redhat.com Subject: Re: [PATCH 8/8] ima: Differentiate auditing policy rules from "audit" actions Date: Tue, 29 May 2018 17:30:06 -0400 Message-ID: <1569841.KfYyxMilWs@x2> Organization: Red Hat In-Reply-To: <20180524201105.3179904-9-stefanb@linux.vnet.ibm.com> References: <20180524201105.3179904-1-stefanb@linux.vnet.ibm.com> <20180524201105.3179904-9-stefanb@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.2]); Tue, 29 May 2018 21:30:07 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.2]); Tue, 29 May 2018 21:30:07 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'sgrubb@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, On Thursday, May 24, 2018 4:11:05 PM EDT Stefan Berger wrote: > The AUDIT_INTEGRITY_RULE is used for auditing IMA policy rules and > the IMA "audit" policy action. This patch defines > AUDIT_INTEGRITY_POLICY_RULE to reflect the IMA policy rules. > > With this change we now call integrity_audit_msg_common() to get > common integrity auditing fields. This now produces the following > record when parsing an IMA policy rule: > > type=UNKNOWN[1806] msg=audit(1527004216.690:311): action=dont_measure \ > fsmagic=0x9fa0 pid=1613 uid=0 auid=0 ses=2 \ > subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 \ > op=policy_update cause=parse_rule comm="echo" exe="/usr/bin/echo" \ > tty=tty2 res=1 Since this is a new event, do you mind moving the tty field to be between auid= and ses= ? That is the more natural place for it. Also, it might be more natural for the op= and cause= fields to be before the pid= portion. This doesn't matter as much to me because those are not searchable fields and they are skipped right over. But moving the tty field is the main comment from me. Thanks, -Steve > Signed-off-by: Stefan Berger > --- > include/uapi/linux/audit.h | 3 ++- > security/integrity/ima/ima_policy.c | 5 +++-- > 2 files changed, 5 insertions(+), 3 deletions(-) > > diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h > index 4e61a9e05132..776e0abd35cf 100644 > --- a/include/uapi/linux/audit.h > +++ b/include/uapi/linux/audit.h > @@ -146,7 +146,8 @@ > #define AUDIT_INTEGRITY_STATUS 1802 /* Integrity enable status */ > #define AUDIT_INTEGRITY_HASH 1803 /* Integrity HASH type */ > #define AUDIT_INTEGRITY_PCR 1804 /* PCR invalidation msgs */ > -#define AUDIT_INTEGRITY_RULE 1805 /* policy rule */ > +#define AUDIT_INTEGRITY_RULE 1805 /* IMA "audit" action policy msgs > */ +#define AUDIT_INTEGRITY_POLICY_RULE 1806 /* IMA policy rules */ > > #define AUDIT_KERNEL 2000 /* Asynchronous audit record. NOT A REQUEST. */ > > diff --git a/security/integrity/ima/ima_policy.c > b/security/integrity/ima/ima_policy.c index 3aed25a7178a..a8ae47a386b4 > 100644 > --- a/security/integrity/ima/ima_policy.c > +++ b/security/integrity/ima/ima_policy.c > @@ -634,7 +634,7 @@ static int ima_parse_rule(char *rule, struct > ima_rule_entry *entry) int result = 0; > > ab = integrity_audit_log_start(NULL, GFP_KERNEL, > - AUDIT_INTEGRITY_RULE); > + AUDIT_INTEGRITY_POLICY_RULE); > > entry->uid = INVALID_UID; > entry->fowner = INVALID_UID; > @@ -926,7 +926,8 @@ static int ima_parse_rule(char *rule, struct > ima_rule_entry *entry) temp_ima_appraise |= IMA_APPRAISE_FIRMWARE; > else if (entry->func == POLICY_CHECK) > temp_ima_appraise |= IMA_APPRAISE_POLICY; > - audit_log_format(ab, "res=%d", !result); > + integrity_audit_msg_common(ab, NULL, NULL, > + "policy_update", "parse_rule", result); > audit_log_end(ab); > return result; > }