[PATCH] new predicate - AUDIT_FILETYPE
Argument is S_IF... | <index>, where index is normally 0 or 1. Triggers if chosen element of ctx->names[] is present and the mode of object in question matches the upper bits of argument. I.e. for things like "is the argument of that chmod a directory", etc. Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
This commit is contained in:
@@ -280,6 +280,19 @@ static int audit_match_perm(struct audit_context *ctx, int mask)
|
||||
}
|
||||
}
|
||||
|
||||
static int audit_match_filetype(struct audit_context *ctx, int which)
|
||||
{
|
||||
unsigned index = which & ~S_IFMT;
|
||||
mode_t mode = which & S_IFMT;
|
||||
if (index >= ctx->name_count)
|
||||
return 0;
|
||||
if (ctx->names[index].ino == -1)
|
||||
return 0;
|
||||
if ((ctx->names[index].mode ^ mode) & S_IFMT)
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
/*
|
||||
* We keep a linked list of fixed-sized (31 pointer) arrays of audit_chunk *;
|
||||
* ->first_trees points to its beginning, ->trees - to the current end of data.
|
||||
@@ -589,6 +602,9 @@ static int audit_filter_rules(struct task_struct *tsk,
|
||||
case AUDIT_PERM:
|
||||
result = audit_match_perm(ctx, f->val);
|
||||
break;
|
||||
case AUDIT_FILETYPE:
|
||||
result = audit_match_filetype(ctx, f->val);
|
||||
break;
|
||||
}
|
||||
|
||||
if (!result)
|
||||
|
Reference in New Issue
Block a user