All of lore.kernel.org
 help / color / mirror / Atom feed
* retrieve EIP/RIP for syscall in audit
@ 2012-07-12 19:04 Xiaokui Shu
  2012-07-12 19:06 ` Xiaokui Shu
  2012-07-13 17:27 ` Steve Grubb
  0 siblings, 2 replies; 4+ messages in thread
From: Xiaokui Shu @ 2012-07-12 19:04 UTC (permalink / raw)
  To: linux-audit

Hello,

I have a question about one of the features of audit.
Can I use audit to log the EIP/RIP at time of syscall? There is a "-i"
flag in strace that does the work.

When I compare the mechanisms of audit and strace(ptrace), I find
maybe it is not possible for strace to do so. Audit is on the kernel
side of a syscall, and does not know the audited program's internal
information (I am not sure if I understand it right). However, one can
still fetch extra information out of the syscall event (e.g. block a
syscall when coming, check the audited program stack and clear
blocking), but it may bring much overhead.

Best,
Xiaokui

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2012-07-13 17:39 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-07-12 19:04 retrieve EIP/RIP for syscall in audit Xiaokui Shu
2012-07-12 19:06 ` Xiaokui Shu
2012-07-13 17:27 ` Steve Grubb
2012-07-13 17:39   ` Xiaokui Shu

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.