![IBM Novell 10 SP1 EAL4 Design Manual Download Page 154](http://html1.mh-extra.com/html/ibm/novell-10-sp1-eal4/novell-10-sp1-eal4_design-manual_4190246154.webp)
generates the audit record, and sends the record to netlink socket. Both
audit_syscall_entry()
and
audit_syscall_exit()
call
audit_filter_syscall()
to apply filter logic, to check whether to
audit or not to audit the call.
Filtering logic allows an administrative user to filter out events based on the rules set, as described in the
auditctl
man page.
5.6.3.1.3 File system audit record generation
The file system code is hooked with the inotify subsystem. The audit subsystem registers its notification
function
audit_handle_ievent()
, which the inotify subsystem calls when a security-relevant operation
occurs on a watched object. The notification function covers creation, deletion, moving, renaming, link, and
unlink,
Permission changes, as well as access and modification of the object security attributes,
chown
,
chmod
,
setxattr
, and
removexattr
are audited by
audit_inode()
hooks inserted into the system calls.
The hooks directly update the inode information in the audit context.
When a watched object is accessed by a system call, the audit subsystem's information about the inode and its
watches is updated. A typical sequence of file system operations that generates audit records for a watched
object follows these steps:
1. A system call is entered.
2. The system call modifies a watched file's inode information, triggering an inotify event that calls the
audit_handle_ievent()
function with the inotify watch event information, which updates the
audit context's inode information; or, in certain cases, a hooked system call updates the audit context's
inode information.
3. At syscall exit,
audit_log_exit()
detects the updated inode information in the audit context and
emits
PATH
and
SYSCALL
records for the watch event via the audit netlink interface.
142
Figure 5-74: Extension to system calls interface
Summary of Contents for Novell 10 SP1 EAL4
Page 1: ...SUSE Linux Enterprise Server 10 SP1 EAL4 High Level Design Version 1 2 1...
Page 23: ...11...
Page 29: ...17...
Page 43: ...31...
Page 54: ...42 Figure 5 8 New data blocks are allocated and initialized for an ext3 field...
Page 117: ...105 Figure 5 48 Page Address Translation and access control...
Page 125: ...113 Figure 5 54 31 bit Dynamic Address Translation with page table protection...
Page 126: ...114 Figure 5 55 64 bit Dynamic Address Translation with page table protection...
Page 172: ...160 Figure 5 79 System x SLES boot sequence...
Page 214: ...202...