• Deven Bowers's avatar
    audit,ipe: add IPE auditing support · f44554b5
    Deven Bowers authored
    Users of IPE require a way to identify when and why an operation fails,
    allowing them to both respond to violations of policy and be notified
    of potentially malicious actions on their systems with respect to IPE
    itself.
    
    This patch introduces 3 new audit events.
    
    AUDIT_IPE_ACCESS(1420) indicates the result of an IPE policy evaluation
    of a resource.
    AUDIT_IPE_CONFIG_CHANGE(1421) indicates the current active IPE policy
    has been changed to another loaded policy.
    AUDIT_IPE_POLICY_LOAD(1422) indicates a new IPE policy has been loaded
    into the kernel.
    
    This patch also adds support for success auditing, allowing users to
    identify why an allow decision was made for a resource. However, it is
    recommended to use this option with caution, as it is quite noisy.
    
    Here are some examples of the new audit record types:
    
    AUDIT_IPE_ACCESS(1420):
    
        audit: AUDIT1420 ipe_op=EXECUTE ipe_hook=BPRM_CHECK enforcing=1
          pid=297 comm="sh" path="/root/vol/bin/hello" dev="tmpfs"
          ino=38...
    f44554b5
policy.c 5.21 KB