diff options
author | Richard Guy Briggs <rgb@redhat.com> | 2014-01-29 16:17:58 -0500 |
---|---|---|
committer | Eric Paris <eparis@redhat.com> | 2014-09-23 16:21:26 -0400 |
commit | 84db564aad45774ab64375ee019d5e7a42675b1f (patch) | |
tree | 6d1d2ffb45f6dfe862c6e14da9bccf2d979a70ca /kernel | |
parent | 4a99854c5840065e7d3a464523cbe1993acb4f00 (diff) |
audit: add arch field to seccomp event log
The AUDIT_SECCOMP record looks something like this:
type=SECCOMP msg=audit(1373478171.953:32775): auid=4325 uid=4325 gid=4325 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0 pid=12381 comm="test" sig=31 syscall=231 compat=0 ip=0x39ea8bca89 code=0x0
In order to determine what syscall 231 maps to, we need to have the arch= field right before it.
To see the event, compile this test.c program:
=====
int main(void)
{
return seccomp_load(seccomp_init(SCMP_ACT_KILL));
}
=====
gcc -g test.c -o test -lseccomp
After running the program, find the record by: ausearch --start recent -m SECCOMP -i
Signed-off-by: Richard Guy Briggs <rgb@redhat.com>
signed-off-by: Eric Paris <eparis@redhat.com>
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/auditsc.c | 9 |
1 files changed, 4 insertions, 5 deletions
diff --git a/kernel/auditsc.c b/kernel/auditsc.c index dff2a2325655..9f03ac205e1f 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c | |||
@@ -67,6 +67,7 @@ | |||
67 | #include <linux/binfmts.h> | 67 | #include <linux/binfmts.h> |
68 | #include <linux/highmem.h> | 68 | #include <linux/highmem.h> |
69 | #include <linux/syscalls.h> | 69 | #include <linux/syscalls.h> |
70 | #include <asm/syscall.h> | ||
70 | #include <linux/capability.h> | 71 | #include <linux/capability.h> |
71 | #include <linux/fs_struct.h> | 72 | #include <linux/fs_struct.h> |
72 | #include <linux/compat.h> | 73 | #include <linux/compat.h> |
@@ -2488,11 +2489,9 @@ void __audit_seccomp(unsigned long syscall, long signr, int code) | |||
2488 | if (unlikely(!ab)) | 2489 | if (unlikely(!ab)) |
2489 | return; | 2490 | return; |
2490 | audit_log_task(ab); | 2491 | audit_log_task(ab); |
2491 | audit_log_format(ab, " sig=%ld", signr); | 2492 | audit_log_format(ab, " sig=%ld arch=%x syscall=%ld compat=%d ip=0x%lx code=0x%x", |
2492 | audit_log_format(ab, " syscall=%ld", syscall); | 2493 | signr, syscall_get_arch(), syscall, is_compat_task(), |
2493 | audit_log_format(ab, " compat=%d", is_compat_task()); | 2494 | KSTK_EIP(current), code); |
2494 | audit_log_format(ab, " ip=0x%lx", KSTK_EIP(current)); | ||
2495 | audit_log_format(ab, " code=0x%x", code); | ||
2496 | audit_log_end(ab); | 2495 | audit_log_end(ab); |
2497 | } | 2496 | } |
2498 | 2497 | ||