Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2382192imm; Thu, 14 Jun 2018 13:24:00 -0700 (PDT) X-Google-Smtp-Source: ADUXVKL8gMR3ckYC15o2jBlHzRi0WTdBa9WEl/HERAzdG/zkO3D9NgTvDZ54vl0H7VOAdZRojKGt X-Received: by 2002:a62:8d03:: with SMTP id z3-v6mr10791603pfd.112.1529007840746; Thu, 14 Jun 2018 13:24:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529007840; cv=none; d=google.com; s=arc-20160816; b=gd3L10VSazn0iNOM0hOjWw1z2+pp4C3B+qsFN+8jj/UraXor6M+rl+mXF6HwtprgFy 2k0qPfC9xzMExUgQRYEIqc97Bdp7p1p6SxR4nwrI6Bzkp9iNnUPT2ssXdMgEQnI7wEjR wNxGeW6aJF+kbnvdeYHJOvaSHCcxrNNqNkf4mFgeeGJlhcE73qAnJNejZeEu0O96IYAQ 7R+sLgoODKwv2W7N0SIdvFx4kBRy6gfWae1msnqzBiXlJEzYlvm/JFdyHONb5wbAlgSZ aI4CKgATam5ItOeQbPwUV/OgaZrOarRy01HNTN343bw/25/2p2PISsStBudzvuVzo1A7 nXUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=E4L5FaosTXElSCAnfZDCaa9QK6K6roc7gIMeV5TmXPM=; b=hGM+JejRcDPHvlP1LxOs4ohOrTM45N9QXA5O6Kjse6dIjaWlXr15zR18VOJLZBZMsN OZebs6NjKPWuFV2aWXWEwUttXObuNLmn9ArvBdLlsw9ctbcfFpiOLo0vZI3PZ3V4JsnJ fSZb+MYc2yRjv/tmHNyzh4319/WOAW8ueFrJvR67DkuDVZ0uc7HZbjC2oREHh9zMb+Ou WmyWUcrAqfWSU7NcWtCM/RAKEF73i8NZzYgojlocjqn80KScb8/pU0Q227H9YBENkHDk fCOovRWjol7YQnEB/VkwN7ngz46CM9qrzwWkGypR3IqQn0JYCEFfdJcplO+ZocuZ9Ltw g1vA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p9-v6si845705pge.143.2018.06.14.13.23.45; Thu, 14 Jun 2018 13:24:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755427AbeFNUXN (ORCPT + 99 others); Thu, 14 Jun 2018 16:23:13 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:47644 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754695AbeFNUXM (ORCPT ); Thu, 14 Jun 2018 16:23:12 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 81EDC406E897; Thu, 14 Jun 2018 20:23:11 +0000 (UTC) Received: from madcap2.tricolour.ca (ovpn-112-45.rdu2.redhat.com [10.10.112.45]) by smtp.corp.redhat.com (Postfix) with ESMTP id 288C31116700; Thu, 14 Jun 2018 20:23:09 +0000 (UTC) From: Richard Guy Briggs To: Linux-Audit Mailing List , LKML Cc: eparis@parisplace.org, Paul Moore , Steve Grubb , Alexander Viro , Richard Guy Briggs Subject: [RFC PATCH ghak59 V1 1/6] audit: give a clue what CONFIG_CHANGE op was involved Date: Thu, 14 Jun 2018 16:21:11 -0400 Message-Id: <17f22b579c28c6cd9475a57e792b5d4fb4dde1dc.1529003588.git.rgb@redhat.com> In-Reply-To: References: In-Reply-To: References: X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Thu, 14 Jun 2018 20:23:11 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Thu, 14 Jun 2018 20:23:11 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'rgb@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The failure to add an audit rule due to audit locked gives no clue what CONFIG_CHANGE operation failed. Similarly the set operation is the only other operation that doesn't give the "op=" field to indicate the action. All other CONFIG_CHANGE records include an op= field to give a clue as to what sort of configuration change is being executed. Since these are the only CONFIG_CHANGE records that that do not have an op= field, add them to bring them in line with the rest. Old records: type=CONFIG_CHANGE msg=audit(1519812997.781:374): pid=610 uid=0 auid=0 ses=1 subj=... audit_enabled=2 res=0 type=CONFIG_CHANGE msg=audit(2018-06-14 14:55:04.507:47) : audit_enabled=1 old=1 auid=unset ses=unset subj=... res=yes New records: type=CONFIG_CHANGE msg=audit(1520958477.855:100): pid=610 uid=0 auid=0 ses=1 subj=... op=add_rule audit_enabled=2 res=0 type=CONFIG_CHANGE msg=audit(2018-06-14 14:55:04.507:47) : op=set audit_enabled=1 old=1 auid=unset ses=unset subj=... res=yes See: https://github.com/linux-audit/audit-kernel/issues/59 Signed-off-by: Richard Guy Briggs --- kernel/audit.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/kernel/audit.c b/kernel/audit.c index e7478cb..ad54339 100644 --- a/kernel/audit.c +++ b/kernel/audit.c @@ -403,7 +403,7 @@ static int audit_log_config_change(char *function_name, u32 new, u32 old, ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_CONFIG_CHANGE); if (unlikely(!ab)) return rc; - audit_log_format(ab, "%s=%u old=%u", function_name, new, old); + audit_log_format(ab, "op=set %s=%u old=%u", function_name, new, old); audit_log_session_info(ab); rc = audit_log_task_context(ab); if (rc) @@ -1365,7 +1365,9 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) return -EINVAL; if (audit_enabled == AUDIT_LOCKED) { audit_log_common_recv_msg(&ab, AUDIT_CONFIG_CHANGE); - audit_log_format(ab, " audit_enabled=%d res=0", audit_enabled); + audit_log_format(ab, " op=%s_rule audit_enabled=%d res=0", + msg_type == AUDIT_ADD_RULE ? "add" : "remove", + audit_enabled); audit_log_end(ab); return -EPERM; } -- 1.8.3.1