From: "Thiébaud Weksteen" <tweek@google.com>
To: Paul Moore <paul@paul-moore.com>
Cc: "Nick Kralevich" <nnk@google.com>,
"Thiébaud Weksteen" <tweek@google.com>,
"Stephen Smalley" <stephen.smalley.work@gmail.com>,
"Eric Paris" <eparis@parisplace.org>,
"Steven Rostedt" <rostedt@goodmis.org>,
"Ingo Molnar" <mingo@redhat.com>,
"Mauro Carvalho Chehab" <mchehab+huawei@kernel.org>,
"David S. Miller" <davem@davemloft.net>,
"Rob Herring" <robh@kernel.org>,
linux-kernel@vger.kernel.org, selinux@vger.kernel.org
Subject: [PATCH v4 0/2] selinux: add detailed tracepoint on audited events
Date: Fri, 21 Aug 2020 16:08:20 +0200 [thread overview]
Message-ID: <20200821140836.3707282-1-tweek@google.com> (raw)
The audit data currently captures which process and which target
is responsible for a denial. There is no data on where exactly in the
process that call occurred. Debugging can be made easier by adding a
trace point when an event is audited.
This series of patch defines this new trace point and extra attributes
to easily match the tracepoint event with the audit event. It is also
possible to filter the events based on these attributes.
Changes since v3
================
- Remove patch to include decoded permissions.
- Remove extra braces in patch 2.
Changes since v2
================
- Add patch to include decoded permissions.
- Remove ssid and tsid from attributes list.
- Update commit log with more context.
Peter Enderborg (1):
selinux: add basic filtering for audit trace events
Thiébaud Weksteen (1):
selinux: add tracepoint on audited events
MAINTAINERS | 1 +
include/trace/events/avc.h | 53 ++++++++++++++++++++++++++++++++++++++
security/selinux/avc.c | 29 +++++++++++++--------
3 files changed, 72 insertions(+), 11 deletions(-)
create mode 100644 include/trace/events/avc.h
--
2.28.0.297.g1956fa8f8d-goog
next reply other threads:[~2020-08-21 14:08 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-08-21 14:08 Thiébaud Weksteen [this message]
2020-08-21 14:08 ` [PATCH v4 1/2] selinux: add tracepoint on audited events Thiébaud Weksteen
2020-08-21 15:33 ` Stephen Smalley
2020-08-21 21:08 ` Paul Moore
2020-08-24 8:01 ` Thiébaud Weksteen
2020-08-21 14:08 ` [PATCH v4 2/2] selinux: add basic filtering for audit trace events Thiébaud Weksteen
2020-08-21 15:35 ` Stephen Smalley
2020-08-21 21:09 ` Paul Moore
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200821140836.3707282-1-tweek@google.com \
--to=tweek@google.com \
--cc=davem@davemloft.net \
--cc=eparis@parisplace.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mchehab+huawei@kernel.org \
--cc=mingo@redhat.com \
--cc=nnk@google.com \
--cc=paul@paul-moore.com \
--cc=robh@kernel.org \
--cc=rostedt@goodmis.org \
--cc=selinux@vger.kernel.org \
--cc=stephen.smalley.work@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox