From: Jeff Layton <jlayton@redhat.com>
To: Steve Grubb <sgrubb@redhat.com>
Cc: linux-audit@redhat.com, Al Viro <viro@zeniv.linux.org.uk>
Subject: Re: [PATCH] audit: log the audit_names record type
Date: Thu, 9 May 2013 10:57:38 -0400 [thread overview]
Message-ID: <20130509105738.49ef2d58@corrin.poochiereds.net> (raw)
In-Reply-To: <2241937.l4WCYqQx0s@x2>
On Thu, 09 May 2013 09:21:50 -0400
Steve Grubb <sgrubb@redhat.com> wrote:
> On Wednesday, May 08, 2013 10:32:23 AM Jeff Layton wrote:
> > ...to make it clear what the intent behind each record's operation was.
> >
> > In many cases you can infer this, based on the context of the syscall
> > and the result. In other cases it's not so obvious. For instance, in
> > the case where you have a file being renamed over another, you'll have
> > two different records with the same filename but different inode info.
> > By logging this information we can clearly tell which one was created
> > and which was deleted.
>
> Space is generally at a premium. Every byte counts. Rather than print strings,
> which we usually avoid, it might be better to just print the number and let
> user space convert that to something readable.
>
> All of these records are to point out what the object of the syscall is. And
> my understanding is that these labels are to describe the action or operation
> being performed. So, maybe naming the field "objact=" or "objop=" would save
> a couple bytes?
>
> -Steve
>
> > Signed-off-by: Jeff Layton <jlayton@redhat.com>
> > ---
> > kernel/auditsc.c | 20 ++++++++++++++++++++
> > 1 files changed, 20 insertions(+), 0 deletions(-)
> >
> > diff --git a/kernel/auditsc.c b/kernel/auditsc.c
> > index 8d87439..4f90536 100644
> > --- a/kernel/auditsc.c
> > +++ b/kernel/auditsc.c
> > @@ -1575,6 +1575,26 @@ static void audit_log_name(struct audit_context
> > *context, struct audit_names *n, }
> > }
> >
> > + /* log the audit_names record type */
> > + audit_log_format(ab, " nametype=");
> > + switch(n->type) {
> > + case AUDIT_TYPE_NORMAL:
> > + audit_log_format(ab, "NORMAL");
> > + break;
> > + case AUDIT_TYPE_PARENT:
> > + audit_log_format(ab, "PARENT");
> > + break;
> > + case AUDIT_TYPE_CHILD_DELETE:
> > + audit_log_format(ab, "DELETE");
> > + break;
> > + case AUDIT_TYPE_CHILD_CREATE:
> > + audit_log_format(ab, "CREATE");
> > + break;
> > + default:
> > + audit_log_format(ab, "UNKNOWN");
> > + break;
> > + }
> > +
> > audit_log_fcaps(ab, n);
> >
> > audit_log_end(ab);
The numerical values of these types is an implementation detail in a
private kernel header. I don't think we really want to expose those
values to userland.
How about something like this instead?
--------------------[snip]------------------
[PATCH] audit: log the audit_names record type
...to make it clear what the intent behind each record's operation was.
In many cases you can infer this, based on the context of the syscall
and the result. In other cases it's not so obvious. For instance, in
the case where you have a file being renamed over another, you'll have
two different records with the same filename but different inode info.
By logging this information we can clearly tell which one was created
and which was deleted.
Signed-off-by: Jeff Layton <jlayton@redhat.com>
---
kernel/auditsc.c | 20 ++++++++++++++++++++
1 files changed, 20 insertions(+), 0 deletions(-)
diff --git a/kernel/auditsc.c b/kernel/auditsc.c
index 8d87439..0e44eec 100644
--- a/kernel/auditsc.c
+++ b/kernel/auditsc.c
@@ -1575,6 +1575,26 @@ static void audit_log_name(struct audit_context *context, struct audit_names *n,
}
}
+ /* log the audit_names record type */
+ audit_log_format(ab, " objact=");
+ switch(n->type) {
+ case AUDIT_TYPE_NORMAL:
+ audit_log_format(ab, "N");
+ break;
+ case AUDIT_TYPE_PARENT:
+ audit_log_format(ab, "P");
+ break;
+ case AUDIT_TYPE_CHILD_DELETE:
+ audit_log_format(ab, "D");
+ break;
+ case AUDIT_TYPE_CHILD_CREATE:
+ audit_log_format(ab, "C");
+ break;
+ default:
+ audit_log_format(ab, "U");
+ break;
+ }
+
audit_log_fcaps(ab, n);
audit_log_end(ab);
--
1.7.1
next prev parent reply other threads:[~2013-05-09 14:57 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-05-08 14:32 [PATCH] audit: log the audit_names record type Jeff Layton
2013-05-09 13:21 ` Steve Grubb
2013-05-09 14:57 ` Jeff Layton [this message]
2013-05-23 14:48 ` [PATCH v2] " Jeff Layton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20130509105738.49ef2d58@corrin.poochiereds.net \
--to=jlayton@redhat.com \
--cc=linux-audit@redhat.com \
--cc=sgrubb@redhat.com \
--cc=viro@zeniv.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox