public inbox for linux-audit@redhat.com
 help / color / mirror / Atom feed
* SYSCALL and you...err...and me...
@ 2013-10-25 12:29 leam hall
  2013-10-25 12:45 ` Steve Grubb
  2013-10-25 12:48 ` Alexander Viro
  0 siblings, 2 replies; 3+ messages in thread
From: leam hall @ 2013-10-25 12:29 UTC (permalink / raw)
  To: linux-audit


[-- Attachment #1.1: Type: text/plain, Size: 737 bytes --]

I'm making a little progress in identifying the unknown syscalls. It often
helps if you are not so cold and remember to look for a log...

The failed call below is root doing a grep. I do not know why it failed.
The PPID is a bash shell. Any good docs available to explain the codes?

Thanks!

Leam

###

grep SYSCALL audit.log | grep "success=no" | tail -1

type=SYSCALL msg=audit(1382703881.711:2677787): arch=c000003e syscall=2
success=no exit=-2 a0=7914b20 a1=0 a2=0 a3=3a89724793 items=1 ppid=25339
pid=26563 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
tty=pts1 ses=4445 comm="grep" exe="/bin/grep"
subj=root:system_r:unconfined_t:s0-s0:c0.c1023 key=(null)


-- 
Mind on a Mission <http://leamhall.blogspot.com/>

[-- Attachment #1.2: Type: text/html, Size: 931 bytes --]

[-- Attachment #2: Type: text/plain, Size: 0 bytes --]



^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: SYSCALL and you...err...and me...
  2013-10-25 12:29 SYSCALL and you...err...and me leam hall
@ 2013-10-25 12:45 ` Steve Grubb
  2013-10-25 12:48 ` Alexander Viro
  1 sibling, 0 replies; 3+ messages in thread
From: Steve Grubb @ 2013-10-25 12:45 UTC (permalink / raw)
  To: linux-audit

On Friday, October 25, 2013 08:29:00 AM leam hall wrote:
> I'm making a little progress in identifying the unknown syscalls. It often
> helps if you are not so cold and remember to look for a log...
> 
> The failed call below is root doing a grep. I do not know why it failed.
> The PPID is a bash shell. Any good docs available to explain the codes?

Ausearch automatically interprets the codes for you.


> grep SYSCALL audit.log | grep "success=no" | tail -1
> 
> type=SYSCALL msg=audit(1382703881.711:2677787): arch=c000003e syscall=2
> success=no exit=-2 a0=7914b20 a1=0 a2=0 a3=3a89724793 items=1 ppid=25339
> pid=26563 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
> tty=pts1 ses=4445 comm="grep" exe="/bin/grep"
> subj=root:system_r:unconfined_t:s0-s0:c0.c1023 key=(null)

Try ausearch --start today -m syscall -sv no -i

-Steve

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: SYSCALL and you...err...and me...
  2013-10-25 12:29 SYSCALL and you...err...and me leam hall
  2013-10-25 12:45 ` Steve Grubb
@ 2013-10-25 12:48 ` Alexander Viro
  1 sibling, 0 replies; 3+ messages in thread
From: Alexander Viro @ 2013-10-25 12:48 UTC (permalink / raw)
  To: leam hall; +Cc: linux-audit

On Fri, Oct 25, 2013 at 08:29:00AM -0400, leam hall wrote:
> I'm making a little progress in identifying the unknown syscalls. It often
> helps if you are not so cold and remember to look for a log...
> 
> The failed call below is root doing a grep. I do not know why it failed.
> The PPID is a bash shell. Any good docs available to explain the codes?
> 
> Thanks!
> 
> Leam
> 
> ###
> 
> grep SYSCALL audit.log | grep "success=no" | tail -1
> 
> type=SYSCALL msg=audit(1382703881.711:2677787): arch=c000003e syscall=2
> success=no exit=-2 a0=7914b20 a1=0 a2=0 a3=3a89724793 items=1 ppid=25339
> pid=26563 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
> tty=pts1 ses=4445 comm="grep" exe="/bin/grep"
> subj=root:system_r:unconfined_t:s0-s0:c0.c1023 key=(null)

open() failing with ENOENT.  Which can happen for any number of reasons,
such as looking for config in .some_shite before going for /etc/some_shite.
Hard to tell without seeing the pathname involved...

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2013-10-25 12:48 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-10-25 12:29 SYSCALL and you...err...and me leam hall
2013-10-25 12:45 ` Steve Grubb
2013-10-25 12:48 ` Alexander Viro

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox