Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp3750431pxb; Wed, 13 Oct 2021 12:09:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+fN4vghfFDmlnsg0FV9Ywjvwk261+591zTRf0FQkiDj1zflAoKxRSp5BvaFC2xHZI33C0 X-Received: by 2002:a17:90a:d801:: with SMTP id a1mr15311064pjv.109.1634152173480; Wed, 13 Oct 2021 12:09:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634152173; cv=none; d=google.com; s=arc-20160816; b=GHuvKTQ+46hmrONz3gFui4zrTBEScaDUYR28lfmFdlEXVVkcIB+V3THYO5hlzpfMIE 8Cpzs+urhT42h/iAlsAgw/5zzKucQB3WB+o3uqTfs2KNyhW8pnwouizl9vC6sFk3FnBK LFNzGPwG3P3edKu9+HLW3o2xOxh8XoRwhpFbQ0dQDGj0hVZ3XOTJvisX9uhndkxwBL4u IDfNist/dEuvl1uGGG/7ksDzvG07SIYqRIGb/bBq+EKJ4SkwN2guzosRIgvQaWkKcRpg g1GS/ugWsR1pSYxtYz4fXeITODT25DB5AU02oDI9c8ZkJ3rhGPr/GfEs4SMjdXM8Xwxl ey7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature:dkim-filter; bh=yIxQ/i84K/WAWPXS3Zi8wDxbgHtCOMqXXBG94r/Of8Y=; b=u7gYtbid+DKZdc74SYdwjs2gfDm4UwK4udJwZzPzCosdaQ7h6+jhzkvP3Y1ahaAxV9 fazPT0PPfXhxEYG6uAFCg8NK6/bB+AGSVaH1/Pv5vDbVBBI5QamPWl/sdtkT6iwhN0/s Msw8nCZaT2WkAtC095YxlxI/WQiGcEmRl/kiTc7XmXZyvKrhdpTLca2JwGLNCYhQq69N tmAa+rvO5Ai5uidqrnP9ZfqO8o5OmySzcf7aNP4tjNnfj47EkNYfEZBYKXCYGPP75GCi JMk8MgilyhNV65Kfm/O/ABpfruh4gyj8iPIcoFiEq45BsKflJDVmKq4Qc7Dea+wvuOWM VCeg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=K6wGOGS+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 136si445042pgb.534.2021.10.13.12.09.20; Wed, 13 Oct 2021 12:09:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=K6wGOGS+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239023AbhJMTJf (ORCPT + 99 others); Wed, 13 Oct 2021 15:09:35 -0400 Received: from linux.microsoft.com ([13.77.154.182]:49066 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236976AbhJMTIp (ORCPT ); Wed, 13 Oct 2021 15:08:45 -0400 Received: from linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net (linux.microsoft.com [13.77.154.182]) by linux.microsoft.com (Postfix) with ESMTPSA id D3D7520B9D01; Wed, 13 Oct 2021 12:06:39 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com D3D7520B9D01 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1634151999; bh=yIxQ/i84K/WAWPXS3Zi8wDxbgHtCOMqXXBG94r/Of8Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=K6wGOGS+Ey7bkWdMeWCjxzJKMzzFdZXH+M3f46+W4anu6w4EJhH+EO2ui6Rz0NFXm GFlg8s5fkqvAQf8aBR8XlKYr7HnPNTtQvsScPHpRgMK4Z/Oh+Y2Osa4Wdg3q193Pad 1XSkidWOiJ6s/wIqg7jgpyLrymzluhi+AvQOTCzU= From: deven.desai@linux.microsoft.com To: corbet@lwn.net, axboe@kernel.dk, agk@redhat.com, snitzer@redhat.com, ebiggers@kernel.org, tytso@mit.edu, paul@paul-moore.com, eparis@redhat.com, jmorris@namei.org, serge@hallyn.com Cc: jannh@google.com, dm-devel@redhat.com, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-block@vger.kernel.org, linux-fscrypt@vger.kernel.org, linux-audit@redhat.com, linux-security-module@vger.kernel.org Subject: [RFC PATCH v7 06/16] uapi|audit: add trust audit message definitions Date: Wed, 13 Oct 2021 12:06:25 -0700 Message-Id: <1634151995-16266-7-git-send-email-deven.desai@linux.microsoft.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1634151995-16266-1-git-send-email-deven.desai@linux.microsoft.com> References: <1634151995-16266-1-git-send-email-deven.desai@linux.microsoft.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Deven Bowers Introduce new definitions to audit.h centered around trust decisions and policy loading and activation, as an extension of the mandatory access control fields. Signed-off-by: Deven Bowers --- Relevant changes since v6: * Change audit records to MAC region (14XX) from Integrity region (18XX), as IPE is an effectively a MAC system around trust versus an extension to the integrity subsystem. * Generalize the #defines to support the class of trust-based Access-Control LSMs. --- include/uapi/linux/audit.h | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h index daa481729e9b..3a83b3605896 100644 --- a/include/uapi/linux/audit.h +++ b/include/uapi/linux/audit.h @@ -139,6 +139,10 @@ #define AUDIT_MAC_UNLBL_STCDEL 1417 /* NetLabel: del a static label */ #define AUDIT_MAC_CALIPSO_ADD 1418 /* NetLabel: add CALIPSO DOI entry */ #define AUDIT_MAC_CALIPSO_DEL 1419 /* NetLabel: del CALIPSO DOI entry */ +#define AUDIT_TRUST_RESULT 1420 /* IPE Denial or Grant */ +#define AUDIT_TRUST_POLICY_LOAD 1421 /* IPE Policy Load */ +#define AUDIT_TRUST_POLICY_ACTIVATE 1422 /* IPE Policy Activate */ +#define AUDIT_TRUST_STATUS 1423 /* IPE enforcing,permissive */ #define AUDIT_FIRST_KERN_ANOM_MSG 1700 #define AUDIT_LAST_KERN_ANOM_MSG 1799 -- 2.33.0