public inbox for linux-audit@redhat.com
 help / color / mirror / Atom feed
* auditing syscalls made 'by' an inode?
@ 2012-06-07 22:31 Peter Moody
  2012-06-08 13:35 ` Steve Grubb
  0 siblings, 1 reply; 8+ messages in thread
From: Peter Moody @ 2012-06-07 22:31 UTC (permalink / raw)
  To: linux-audit

Is there anyway to audit syscalls made by a particular, not yet
running, application? For example, if I'm interested in seeing all
exec's by google-chrome, can I do something like the following?

auditctl -a exit,always -F arch=b64 -S execve -F success=1 -F
inode=inode-of-chrome

experimenting seems to indicate that will only tell me when
inode-of-chrome is exec'd, basically a watch rule.

The sort of inverse of this rule that got me thinking about this
initially was auditing a syscall and seeing if it was/wasn't called by
a particular program. For example, audting all bind() calls which
*aren't* made by chrome (a silly rule to be sure, but just thrown out
as a hypothetical)

If it's not possible to do this now, is there interest in adding this feature?

Cheers,
peter

-- 
Peter Moody      Google    1.650.253.7306
Security Engineer  pgp:0xC3410038

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2012-07-03 22:03 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-06-07 22:31 auditing syscalls made 'by' an inode? Peter Moody
2012-06-08 13:35 ` Steve Grubb
2012-06-08 13:51   ` Steve Grubb
2012-06-08 14:49     ` Daniel J Walsh
2012-06-08 15:36       ` Peter Moody
2012-06-08 16:01         ` Steve Grubb
2012-06-08 16:01       ` Casey Schaufler
2012-07-03 22:02     ` Peter Moody

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox