From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alexander Viro Subject: Re: Abnormal End of Processes Date: Wed, 18 Apr 2007 16:06:10 -0400 Message-ID: <20070418200610.GA25344@devserv.devel.redhat.com> References: <200704181209.50302.sgrubb@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <200704181209.50302.sgrubb@redhat.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: Steve Grubb Cc: Linux Audit List-Id: linux-audit@redhat.com On Wed, Apr 18, 2007 at 12:09:50PM -0400, Steve Grubb wrote: > Hi, > > I have been working on some code that detects abnormal events based on > audit system events. One kind of event that we currently have no visibility for is > when a program terminates due to segfault - which should never happen on a > production machine. And if it did, you'd want to investigate it. Attached is a > patch that collects these events and sends them into the audit system. > > Signed-off-by: Steve Grubb I'd suggest taking that into a separate function somewhere in kernel/audit*.c; no need to clutter fs/exec.c with it. Leave if (unlikely(audit_enabled)) in inlined wrapper as usual, pass signr as argument...