summaryrefslogtreecommitdiffstats
path: root/kernel/ksysfs.c
diff options
context:
space:
mode:
authorRichard Guy Briggs <rgb@redhat.com>2014-01-29 22:17:58 +0100
committerEric Paris <eparis@redhat.com>2014-09-23 22:21:26 +0200
commit84db564aad45774ab64375ee019d5e7a42675b1f (patch)
tree6d1d2ffb45f6dfe862c6e14da9bccf2d979a70ca /kernel/ksysfs.c
parentaudit: __audit_syscall_entry: ignore arch arg and call syscall_get_arch() dir... (diff)
downloadlinux-84db564aad45774ab64375ee019d5e7a42675b1f.tar.xz
linux-84db564aad45774ab64375ee019d5e7a42675b1f.zip
audit: add arch field to seccomp event log
The AUDIT_SECCOMP record looks something like this: type=SECCOMP msg=audit(1373478171.953:32775): auid=4325 uid=4325 gid=4325 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0 pid=12381 comm="test" sig=31 syscall=231 compat=0 ip=0x39ea8bca89 code=0x0 In order to determine what syscall 231 maps to, we need to have the arch= field right before it. To see the event, compile this test.c program: ===== int main(void) { return seccomp_load(seccomp_init(SCMP_ACT_KILL)); } ===== gcc -g test.c -o test -lseccomp After running the program, find the record by: ausearch --start recent -m SECCOMP -i Signed-off-by: Richard Guy Briggs <rgb@redhat.com> signed-off-by: Eric Paris <eparis@redhat.com>
Diffstat (limited to 'kernel/ksysfs.c')
0 files changed, 0 insertions, 0 deletions