Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2666562pxa; Mon, 17 Aug 2020 16:01:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwGIbVwKwMHqZCE9D7DWxG8PHcR8bB/FqQtAS/VNIcC9+TxkgGhOi2PV0KLzHzRUZBLPHze X-Received: by 2002:aa7:d758:: with SMTP id a24mr17706734eds.379.1597705311740; Mon, 17 Aug 2020 16:01:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597705311; cv=none; d=google.com; s=arc-20160816; b=YaDp5JRl6uFhAmxT3P54/3WA1Ndq7cgPP2w9BU8Dl18W8tUm74yOLR7aAhfUiW39wu /qDuUCmT0jAATH4h1oy3zwyuu51x8i8nrVOdGngqNSwjZfnaE33iZ0tMLqBcUACHLXaL 17OTbHS6ArunRErD1voJxl+e0b3YQ0QjIUqBWLdu3Zbq2IFZThlupKSIPvKMcFVTsSIt GM6KYEzgk/3VgBZEfUWtX7mNJy2LTS8y9xrCXM9fCV2XeZk5Gp5Gb7A6vEzx/jFiAXYo dnGnicxN/oN4Mro2Mh+Nfjt2QUXP4zRAgYtEkPKz5Q6Bx2Oazg2IClA6mdc4YLdYH4+T jNlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=zt/7bcE3rheAEIDkdYnD+DA7k8FVJTMGh0E4kEj1Ywo=; b=z1CCtyKNV9iw8ihXALxesVkVMUp6Bjo1jWQCDXFBenk1u+b452i22UYtM9J+AHCqhE PPO6Vxv9PIixr8RMBsSy3tGdxN8wyNE7eqzKGXVhZ61dCUVrXHbEz0/9FueOyFaXVOPR KkwNpvgsiEBi0xEbG702pwWhT3mj5LxmzUwsM8ARJqFxguVq9iZlwz48SSVS0QTFPk3D Hajb1rCZJBC7eUErs7nT/HzM0a9JvIM9zeQFyewMjJ5OrJJCz5T8kJ+LTE/XHsTANEzC 3b9yaqYmVKvTE/U0AbZWfa/mhuguu6gZc8w/oD71iTRFCDUrhF9TpeEAs+q5i1WfP0Nr G2OA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ESZ2E0xm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cn12si11483994edb.561.2020.08.17.16.01.28; Mon, 17 Aug 2020 16:01:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ESZ2E0xm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726721AbgHQUNf (ORCPT + 99 others); Mon, 17 Aug 2020 16:13:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50050 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726133AbgHQUNc (ORCPT ); Mon, 17 Aug 2020 16:13:32 -0400 Received: from mail-qt1-x842.google.com (mail-qt1-x842.google.com [IPv6:2607:f8b0:4864:20::842]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 35D21C061389; Mon, 17 Aug 2020 13:13:32 -0700 (PDT) Received: by mail-qt1-x842.google.com with SMTP id s16so13436843qtn.7; Mon, 17 Aug 2020 13:13:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=zt/7bcE3rheAEIDkdYnD+DA7k8FVJTMGh0E4kEj1Ywo=; b=ESZ2E0xmMQv1mWWmfIDLDh8ElbMLOrMjACpT1NtfcDZAkPcK1cx7Tqq5wJCtNEoGkv sNw5WzTK45vDd7RivwzHNzmA+PcKiL/XxM9Ood/DKjXdOeiydUXFP/EEfZeqmRP4bw8Z +io4TpeIColjCVGs36mDk0I6bxguWRgcFAL3veyxZTAvhvNBDMSmG8R8h2Kt/8bndqtQ jQ0MZZFuMLhLKGH0ysqarbbMykNQs6XMViTx/MXWvSd6io25Qj/YSKqPwbQh0bjRTaUF ZsgdSXj/DbEAmcXu8+jNw9Mig59+a3k37b+Fy3vvGyZcKxqxNeP7dIRR3NMpTm1jtFcB ljKw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=zt/7bcE3rheAEIDkdYnD+DA7k8FVJTMGh0E4kEj1Ywo=; b=FXY5ligulFCgMjVmI5NSv7VXHK1fLdcnAuFFvLejxLhph7Jp7U4jEcoywk6QHNs3OH u7w5Wg2SeuLtLyaSPWNfqXmrv59COhq7gduPYpyCOK4zJMQpOJPaPUlllK5VXVgIL2n0 vRx1CA9WLkGKo/VhR6fNwueOBKe4skuSWeEFTcJka0SaOSZgaSZyX1ztjEYgQYmoonUW Wj+9FolUDjELZcT5ATXpImEJ3cn6TeU4SV9hnYm84EC0NyKegEjVdc3j63neHf/KDOR1 W+fPunQ/oO2go3B4IqLcHn3rgEmfzCy9Lj/me2zP9UMppc8Igz1JUBVBGDxHe4M8Ye78 ehHw== X-Gm-Message-State: AOAM531yeubrws6Nbf1d7YIeCcO6j9s2DvmCxWKEEJYymwOkLJnP5XNw zN9R2tCFVedMLfbHo/GKu7uBfjKNihU= X-Received: by 2002:ac8:2ab9:: with SMTP id b54mr14845227qta.323.1597695211196; Mon, 17 Aug 2020 13:13:31 -0700 (PDT) Received: from [192.168.1.190] (pool-68-134-6-11.bltmmd.fios.verizon.net. [68.134.6.11]) by smtp.gmail.com with ESMTPSA id 95sm19509597qtc.29.2020.08.17.13.13.30 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 17 Aug 2020 13:13:30 -0700 (PDT) Subject: Re: [PATCH v3 3/3] selinux: add permission names to trace event To: =?UTF-8?Q?Thi=c3=a9baud_Weksteen?= , Paul Moore Cc: Nick Kralevich , Peter Enderborg , Steven Rostedt , Eric Paris , Ingo Molnar , Mauro Carvalho Chehab , "David S. Miller" , Rob Herring , linux-kernel@vger.kernel.org, selinux@vger.kernel.org References: <20200817170729.2605279-1-tweek@google.com> <20200817170729.2605279-4-tweek@google.com> From: Stephen Smalley Message-ID: <0bb62de9-1020-a7c4-3a7f-48ae2f78e3b7@gmail.com> Date: Mon, 17 Aug 2020 16:13:29 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200817170729.2605279-4-tweek@google.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/17/20 1:07 PM, Thiébaud Weksteen wrote: > From: Peter Enderborg > > In the print out add permissions, it will look like: > <...>-1042 [007] .... 201.965142: selinux_audited: > requested=0x4000000 denied=0x4000000 audited=0x4000000 > result=-13 > scontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 > tcontext=system_u:object_r:bin_t:s0 > tclass=file permissions={ !entrypoint } > > This patch is adding the "permissions={ !entrypoint }". > The permissions preceded by "!" have been denied and the permissions > without have been accepted. > > Note that permission filtering is done on the audited, denied or > requested attributes. > > Suggested-by: Steven Rostedt > Suggested-by: Stephen Smalley > Reviewed-by: Thiébaud Weksteen > Signed-off-by: Peter Enderborg > --- Does this require a corresponding patch to userspace?  Otherwise, I get the following: libtraceevent: No such file or directory   [avc:selinux_audited] function avc_trace_perm_to_name not defined