1. 20 6月, 2006 4 次提交
    • S
      [PATCH] minor audit updates · 5d136a01
      Serge E. Hallyn 提交于
      Just a few minor proposed updates.  Only the last one will
      actually affect behavior.  The rest are just misleading
      code.
      
      Several AUDIT_SET functions return 'old' value, but only
      return value <0 is checked for.  So just return 0.
      
      propagate audit_set_rate_limit and audit_set_backlog_limit
      error values
      
      In audit_buffer_free, the audit_freelist_count was being
      incremented even when we discard the return buffer, so
      audit_freelist_count can end up wrong.  This could cause
      the actual freelist to shrink over time, eventually
      threatening to degrate audit performance.
      Signed-off-by: NSerge E. Hallyn <serue@us.ibm.com>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      5d136a01
    • A
      [PATCH] collect sid of those who send signals to auditd · e1396065
      Al Viro 提交于
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      e1396065
    • A
      [PATCH] execve argument logging · 473ae30b
      Al Viro 提交于
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      473ae30b
    • A
      [PATCH] fix deadlocks in AUDIT_LIST/AUDIT_LIST_RULES · 9044e6bc
      Al Viro 提交于
      We should not send a pile of replies while holding audit_netlink_mutex
      since we hold the same mutex when we receive commands.  As the result,
      we can get blocked while sending and sit there holding the mutex while
      auditctl is unable to send the next command and get around to receiving
      what we'd sent.
      
      Solution: create skb and put them into a queue instead of sending;
      once we are done, send what we've got on the list.  The former can
      be done synchronously while we are handling AUDIT_LIST or AUDIT_LIST_RULES;
      we are holding audit_netlink_mutex at that point.  The latter is done
      asynchronously and without messing with audit_netlink_mutex.
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      9044e6bc
  2. 01 5月, 2006 3 次提交
  3. 01 4月, 2006 1 次提交
    • O
      [PATCH] Don't pass boot parameters to argv_init[] · 9b41046c
      OGAWA Hirofumi 提交于
      The boot cmdline is parsed in parse_early_param() and
      parse_args(,unknown_bootoption).
      
      And __setup() is used in obsolete_checksetup().
      
      	start_kernel()
      		-> parse_args()
      			-> unknown_bootoption()
      				-> obsolete_checksetup()
      
      If __setup()'s callback (->setup_func()) returns 1 in
      obsolete_checksetup(), obsolete_checksetup() thinks a parameter was
      handled.
      
      If ->setup_func() returns 0, obsolete_checksetup() tries other
      ->setup_func().  If all ->setup_func() that matched a parameter returns 0,
      a parameter is seted to argv_init[].
      
      Then, when runing /sbin/init or init=app, argv_init[] is passed to the app.
      If the app doesn't ignore those arguments, it will warning and exit.
      
      This patch fixes a wrong usage of it, however fixes obvious one only.
      Signed-off-by: NOGAWA Hirofumi <hirofumi@mail.parknet.co.jp>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      9b41046c
  4. 21 3月, 2006 9 次提交
  5. 19 1月, 2006 1 次提交
    • A
      [PATCH] EDAC: atomic scrub operations · 715b49ef
      Alan Cox 提交于
      EDAC requires a way to scrub memory if an ECC error is found and the chipset
      does not do the work automatically.  That means rewriting memory locations
      atomically with respect to all CPUs _and_ bus masters.  That means we can't
      use atomic_add(foo, 0) as it gets optimised for non-SMP
      
      This adds a function to include/asm-foo/atomic.h for the platforms currently
      supported which implements a scrub of a mapped block.
      
      It also adjusts a few other files include order where atomic.h is included
      before types.h as this now causes an error as atomic_scrub uses u32.
      Signed-off-by: NAlan Cox <alan@redhat.com>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      715b49ef
  6. 09 1月, 2006 1 次提交
  7. 13 12月, 2005 1 次提交
  8. 28 10月, 2005 1 次提交
  9. 09 10月, 2005 1 次提交
  10. 30 8月, 2005 2 次提交
  11. 17 8月, 2005 1 次提交
  12. 19 7月, 2005 1 次提交
  13. 15 7月, 2005 1 次提交
  14. 14 7月, 2005 1 次提交
  15. 02 7月, 2005 1 次提交
    • D
      AUDIT: Stop waiting for backlog after audit_panic() happens · ac4cec44
      David Woodhouse 提交于
      We force a rate-limit on auditable events by making them wait for space 
      on the backlog queue. However, if auditd really is AWOL then this could 
      potentially bring the entire system to a halt, depending on the audit 
      rules in effect.
      
      Firstly, make sure the wait time is honoured correctly -- it's the 
      maximum time the process should wait, rather than the time to wait 
      _each_ time round the loop. We were getting re-woken _each_ time a 
      packet was dequeued, and the timeout was being restarted each time.
      
      Secondly, reset the wait time after audit_panic() is called. In general 
      this will be reset to zero, to allow progress to be made. If the system
      is configured to _actually_ panic on audit_panic() then that will 
      already have happened; otherwise we know that audit records are being 
      lost anyway. 
      
      These two tunables can't be exposed via AUDIT_GET and AUDIT_SET because 
      those aren't particularly well-designed. It probably should have been 
      done by sysctls or sysfs anyway -- one for a later patch.
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      ac4cec44
  16. 25 6月, 2005 1 次提交
  17. 24 6月, 2005 1 次提交
  18. 22 6月, 2005 3 次提交
  19. 21 6月, 2005 1 次提交
  20. 20 6月, 2005 2 次提交
  21. 24 5月, 2005 1 次提交
  22. 22 5月, 2005 1 次提交
  23. 21 5月, 2005 1 次提交