Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp527780pxa; Fri, 14 Aug 2020 10:24:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxS73NflGMhq60DRBYiWFPXT2j74tRJcXDp2D323uc214EOCgXaS0gzLd5q95PNwGYVun+J X-Received: by 2002:a17:906:37c3:: with SMTP id o3mr3617685ejc.54.1597425854593; Fri, 14 Aug 2020 10:24:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597425854; cv=none; d=google.com; s=arc-20160816; b=rnz0MtJJT7GvPhbbdtY5mWPiaZWzaST2Pg7KcjU14jr3XxYN/Ur8cqFj2MKyBp/ub3 TW17Sc/vCZH3u5Va95vudSa4vbVPYghA6eoQ7G994isoL4dRr4ykdrJCERWRWbkurzAo 7/D9c/ewzKBJLFGX4BXICSEeasMPIMG6lUAwYvWfXoi2gpnzcsmeRkRP1mbMqTb1HQRV aNWvslPTQilSCJLcQYNpfeqzsbbY3TR03BKAMDCbehdDtVtj9gBYugpMoIxQPO38Vx8+ xuGtshlRMFbxsesSbG13lmHbe9eQN9YPSAsqWeHk+dGEV23TeDPEilXETERMdQD823+M d3Ow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=evN5Py7SsRUpEGj3P28r6BAVWWq3NKadBfsAU0LIUPE=; b=TyUij5Cy3YuhF/5si86oyuJzYyO7OrP0HWAgEG77LlMBc56AFR7Ri1Hl4/rBsppq4C DIMScDXe3UxP57N9chD4Mt201nBY46ocpWBUOddWnv2mu7iHbZ0nhBv6sLjbNFP2ySyH 9tGotwcKIwQdzkqOgDLG3gkvA/XtjM2B07zT1loxttMPolPY68/2bR83uPZWTBw5Pxp6 ZY7+qrwfazHcEzdPOUN7QLPcjsSL8F+x1tPWLkGJnNoOE62cJ5HjO90VAzeKy7DiePpo 6mNPaUP1g2nCfNDwQznoTr5UZGpu/GYqxj0QY5lDuwP2d+T5++iOunXW2bEncKSEpRhP h3Kw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=sony.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ds7si7899054ejc.511.2020.08.14.10.23.51; Fri, 14 Aug 2020 10:24:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=sony.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728350AbgHNRWS convert rfc822-to-8bit (ORCPT + 99 others); Fri, 14 Aug 2020 13:22:18 -0400 Received: from seldsegrel01.sonyericsson.com ([37.139.156.29]:4067 "EHLO SELDSEGREL01.sonyericsson.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727894AbgHNRWQ (ORCPT ); Fri, 14 Aug 2020 13:22:16 -0400 Subject: Re: [PATCH v2 1/2] selinux: add tracepoint on denials To: Stephen Smalley CC: =?UTF-8?Q?Thi=c3=a9baud_Weksteen?= , Paul Moore , Nick Kralevich , Joel Fernandes , Eric Paris , Steven Rostedt , Ingo Molnar , Mauro Carvalho Chehab , "David S. Miller" , Rob Herring , Arnd Bergmann , linux-kernel , SElinux list References: <20200813144914.737306-1-tweek@google.com> <15e2e26d-fe4b-679c-b5c0-c96d56e09853@gmail.com> From: peter enderborg Message-ID: <3518887d-9083-2836-a8db-c7c27a70c990@sony.com> Date: Fri, 14 Aug 2020 19:22:13 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8BIT Content-Language: en-GB X-SEG-SpamProfiler-Analysis: v=2.3 cv=frmim2wf c=1 sm=1 tr=0 a=Jtaq2Av1iV2Yg7i8w6AGMw==:117 a=IkcTkHD0fZMA:10 a=y4yBn9ojGxQA:10 a=z6gsHLkEAAAA:8 a=1XWaLZrsAAAA:8 a=pGLkceISAAAA:8 a=xtmVrf9aUzyO47Hdho8A:9 a=QEXdDO2ut3YA:10 a=d-OLMTCWyvARjPbQ-enb:22 X-SEG-SpamProfiler-Score: 0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/14/20 7:08 PM, Stephen Smalley wrote: > On Fri, Aug 14, 2020 at 1:07 PM peter enderborg > wrote: >> On 8/14/20 6:51 PM, Stephen Smalley wrote: >>> On Fri, Aug 14, 2020 at 9:05 AM ThiƩbaud Weksteen wrote: >>>> On Thu, Aug 13, 2020 at 5:41 PM Stephen Smalley >>>> wrote: >>>>> An explanation here of how one might go about decoding audited and >>>>> tclass would be helpful to users (even better would be a script to do it >>>>> for them). Again, I know how to do that but not everyone using >>>>> perf/ftrace will. >>>> What about something along those lines: >>>> >>>> The tclass value can be mapped to a class by searching >>>> security/selinux/flask.h. The audited value is a bit field of the >>>> permissions described in security/selinux/av_permissions.h for the >>>> corresponding class. >>> Sure, I guess that works. Would be nice if we just included the class >>> and permission name(s) in the event itself but I guess you viewed that >>> as too heavyweight? >> The class name is added in part 2. Im not sure how a proper format for permission >> would look like in trace terms. It is a list, right? > Yes. See avc_audit_pre_callback() for example code to log the permission names. I wrote about that on some of the previous sets. The problem is that trace format is quite fixed. So it is lists are not that easy to handle if you want to filter in them. You can have a trace event for each of them. You can also add additional trace event "selinux_audied_permission" for each permission. With that you can filter out tclass or permissions. But the basic thing we would like at the moment is a event that we can debug in user space.