1. 04 7月, 2006 26 次提交
  2. 03 7月, 2006 3 次提交
  3. 02 7月, 2006 6 次提交
  4. 01 7月, 2006 5 次提交
    • A
      [PATCH] audit syscall classes · b915543b
      Al Viro 提交于
      Allow to tie upper bits of syscall bitmap in audit rules to kernel-defined
      sets of syscalls.  Infrastructure, a couple of classes (with 32bit counterparts
      for biarch targets) and actual tie-in on i386, amd64 and ia64.
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      b915543b
    • D
      [PATCH] audit: support for object context filters · 6e5a2d1d
      Darrel Goeddel 提交于
      This patch introduces object audit filters based on the elements
      of the SELinux context.
      Signed-off-by: NDarrel Goeddel <dgoeddel@trustedcs.com>
      Acked-by: NStephen Smalley <sds@tycho.nsa.gov>
      
       kernel/auditfilter.c           |   25 +++++++++++++++++++++++++
       kernel/auditsc.c               |   40 ++++++++++++++++++++++++++++++++++++++++
       security/selinux/ss/services.c |   18 +++++++++++++++++-
       3 files changed, 82 insertions(+), 1 deletion(-)
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      6e5a2d1d
    • D
      [PATCH] audit: rename AUDIT_SE_* constants · 3a6b9f85
      Darrel Goeddel 提交于
      This patch renames some audit constant definitions and adds
      additional definitions used by the following patch.  The renaming
      avoids ambiguity with respect to the new definitions.
      Signed-off-by: NDarrel Goeddel <dgoeddel@trustedcs.com>
      
       include/linux/audit.h          |   15 ++++++++----
       kernel/auditfilter.c           |   50 ++++++++++++++++++++---------------------
       kernel/auditsc.c               |   10 ++++----
       security/selinux/ss/services.c |   32 +++++++++++++-------------
       4 files changed, 56 insertions(+), 51 deletions(-)
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      3a6b9f85
    • A
      [PATCH] add rule filterkey · 5adc8a6a
      Amy Griffis 提交于
      Add support for a rule key, which can be used to tie audit records to audit
      rules.  This is useful when a watched file is accessed through a link or
      symlink, as well as for general audit log analysis.
      
      Because this patch uses a string key instead of an integer key, there is a bit
      of extra overhead to do the kstrdup() when a rule fires.  However, we're also
      allocating memory for the audit record buffer, so it's probably not that
      significant.  I went ahead with a string key because it seems more
      user-friendly.
      
      Note that the user must ensure that filterkeys are unique.  The kernel only
      checks for duplicate rules.
      Signed-off-by: NAmy Griffis <amy.griffis@hpd.com>
      5adc8a6a
    • A
      [PATCH] cond_resched() fix · e7b38404
      Andrew Morton 提交于
      Fix a bug identified by Zou Nan hai <nanhai.zou@intel.com>:
      
      If the system is in state SYSTEM_BOOTING, and need_resched() is true,
      cond_resched() returns true even though it didn't reschedule.  Consequently
      need_resched() remains true and JBD locks up.
      
      Fix that by teaching cond_resched() to only return true if it really did call
      schedule().
      
      cond_resched_lock() and cond_resched_softirq() have a problem too.  If we're
      in SYSTEM_BOOTING state and need_resched() is true, these functions will drop
      the lock and will then try to call schedule(), but the SYSTEM_BOOTING state
      will prevent schedule() from being called.  So on return, need_resched() will
      still be true, but cond_resched_lock() has to return 1 to tell the caller that
      the lock was dropped.  The caller will probably lock up.
      
      Bottom line: if these functions dropped the lock, they _must_ call schedule()
      to clear need_resched().   Make it so.
      
      Also, uninline __cond_resched().  It's largeish, and slowpath.
      Acked-by: NIngo Molnar <mingo@elte.hu>
      Cc: <stable@kernel.org>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      e7b38404