--- "Timothy R. Chavez" <chavezt(a)gmail.com> wrote:
 
 I'd appreciate any and all comments / feedback.  
Not bad. Couple of comments/questions:
 +	/* The root directory cannot be watched */
 +	if (!strcmp(path, "/")) {
 +		ret = -EPERM;
 +		goto audit_remove_watch_exit; 
What are the implications regarding a chroot
environment? I can imagine (although it strikes
me as somewhat insane) an admin wanting to audit
everything that goes on in a chroot environment,
say for a honeypot. The watching would have to
be enabled from outside. Not a bad thing, but is
it what you want?
 +/* The structure that stores information about
files/directories being
 + * watched in the filesystem, that the syscall 
accessed.
 + */
 +
 +struct audit_file {
 +	struct audit_watch *watch;
 +	struct list_head list;
 +	unsigned long ino;
 +	umode_t mode;
 +	uid_t uid;
 +	gid_t gid;
 +	dev_t rdev;
 +	int mask;
 +}; 
Where does one put the ACL, MAC label, and/or
capability set of the file? I may not be able
to go get it later, as it may change or worse,
the file might be gone by then.
=====
Casey Schaufler
casey(a)schaufler-ca.com
		
__________________________________ 
Do you Yahoo!? 
Yahoo! Mail - Helps protect you from nasty viruses. 
http://promotions.yahoo.com/new_mail