@@ -423,7 +423,7 @@ Field descriptions:
423423
424424Event Example::
425425
426- type=1422 audit(1653425529.927:53): policy_name="boot_verified" policy_version=0.0.0 policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F26765076DD8EED7B8F4DB auid=4294967295 ses=4294967295 lsm=ipe res=1
426+ type=1422 audit(1653425529.927:53): policy_name="boot_verified" policy_version=0.0.0 policy_digest=sha256:820EEA5B40CA42B51F68962354BA083122A20BB846F26765076DD8EED7B8F4DB auid=4294967295 ses=4294967295 lsm=ipe res=1 errno=0
427427 type=1300 audit(1653425529.927:53): arch=c000003e syscall=1 success=yes exit=2567 a0=3 a1=5596fcae1fb0 a2=a07 a3=2 items=0 ppid=184 pid=229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=4294967295 comm="python3" exe="/usr/bin/python3.10" key=(null)
428428 type=1327 audit(1653425529.927:53): PROCTITLE proctitle=707974686F6E3300746573742F6D61696E2E7079002D66002E2E
429429
@@ -433,24 +433,55 @@ This record will always be emitted in conjunction with a ``AUDITSYSCALL`` record
433433
434434Field descriptions:
435435
436- +----------------+------------+-----------+---------------------------------------------------+
437- | Field | Value Type | Optional? | Description of Value |
438- +================+============+===========+===================================================+
439- | policy_name | string | No | The policy_name |
440- +----------------+------------+-----------+---------------------------------------------------+
441- | policy_version | string | No | The policy_version |
442- +----------------+------------+-----------+---------------------------------------------------+
443- | policy_digest | string | No | The policy hash |
444- +----------------+------------+-----------+---------------------------------------------------+
445- | auid | integer | No | The login user ID |
446- +----------------+------------+-----------+---------------------------------------------------+
447- | ses | integer | No | The login session ID |
448- +----------------+------------+-----------+---------------------------------------------------+
449- | lsm | string | No | The lsm name associated with the event |
450- +----------------+------------+-----------+---------------------------------------------------+
451- | res | integer | No | The result of the audited operation(success/fail) |
452- +----------------+------------+-----------+---------------------------------------------------+
453-
436+ +----------------+------------+-----------+-------------------------------------------------------------+
437+ | Field | Value Type | Optional? | Description of Value |
438+ +================+============+===========+=============================================================+
439+ | policy_name | string | Yes | The policy_name |
440+ +----------------+------------+-----------+-------------------------------------------------------------+
441+ | policy_version | string | Yes | The policy_version |
442+ +----------------+------------+-----------+-------------------------------------------------------------+
443+ | policy_digest | string | Yes | The policy hash |
444+ +----------------+------------+-----------+-------------------------------------------------------------+
445+ | auid | integer | No | The login user ID |
446+ +----------------+------------+-----------+-------------------------------------------------------------+
447+ | ses | integer | No | The login session ID |
448+ +----------------+------------+-----------+-------------------------------------------------------------+
449+ | lsm | string | No | The lsm name associated with the event |
450+ +----------------+------------+-----------+-------------------------------------------------------------+
451+ | res | integer | No | The result of the audited operation(success/fail) |
452+ +----------------+------------+-----------+-------------------------------------------------------------+
453+ | errno | integer | No | Error code from policy loading operations (see table below) |
454+ +----------------+------------+-----------+-------------------------------------------------------------+
455+
456+ Policy error codes (errno):
457+
458+ The following table lists the error codes that may appear in the errno field while loading or updating the policy:
459+
460+ +----------------+--------------------------------------------------------+
461+ | Error Code | Description |
462+ +================+========================================================+
463+ | 0 | Success |
464+ +----------------+--------------------------------------------------------+
465+ | -EPERM | Insufficient permission |
466+ +----------------+--------------------------------------------------------+
467+ | -EEXIST | Same name policy already deployed |
468+ +----------------+--------------------------------------------------------+
469+ | -EBADMSG | Policy is invalid |
470+ +----------------+--------------------------------------------------------+
471+ | -ENOMEM | Out of memory (OOM) |
472+ +----------------+--------------------------------------------------------+
473+ | -ERANGE | Policy version number overflow |
474+ +----------------+--------------------------------------------------------+
475+ | -EINVAL | Policy version parsing error |
476+ +----------------+--------------------------------------------------------+
477+ | -ENOKEY | Key used to sign the IPE policy not found in keyring |
478+ +----------------+--------------------------------------------------------+
479+ | -EKEYREJECTED | Policy signature verification failed |
480+ +----------------+--------------------------------------------------------+
481+ | -ESTALE | Attempting to update an IPE policy with older version |
482+ +----------------+--------------------------------------------------------+
483+ | -ENOENT | Policy was deleted while updating |
484+ +----------------+--------------------------------------------------------+
454485
4554861404 AUDIT_MAC_STATUS
456487^^^^^^^^^^^^^^^^^^^^^
0 commit comments