1. 01 5月, 2006 1 次提交
  2. 21 3月, 2006 12 次提交
    • I
      [PATCH] simplify audit_free() locking · 4023e020
      Ingo Molnar 提交于
      Simplify audit_free()'s locking: no need to lock a task that we are tearing
      down.  [the extra locking also caused false positives in the lock
      validator]
      Signed-off-by: NIngo Molnar <mingo@elte.hu>
      Cc: David Woodhouse <dwmw2@infradead.org>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      4023e020
    • S
      [PATCH] Add tty to syscall audit records · a6c043a8
      Steve Grubb 提交于
      Hi,
      
      >From the RBAC specs:
      
      FAU_SAR.1.1 The TSF shall provide the set of authorized
      RBAC administrators with the capability to read the following
      audit information from the audit records:
      
      <snip>
      (e) The User Session Identifier or Terminal Type
      
      A patch adding the tty for all syscalls is included in this email.
      Please apply.
      Signed-off-by: NSteve Grubb <sgrubb@redhat.com>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      a6c043a8
    • A
      [PATCH] audit string fields interface + consumer · 93315ed6
      Amy Griffis 提交于
      Updated patch to dynamically allocate audit rule fields in kernel's
      internal representation.  Added unlikely() calls for testing memory
      allocation result.
      
      Amy Griffis wrote:     [Wed Jan 11 2006, 02:02:31PM EST]
      > Modify audit's kernel-userspace interface to allow the specification
      > of string fields in audit rules.
      >
      > Signed-off-by: Amy Griffis <amy.griffis@hp.com>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      (cherry picked from 5ffc4a863f92351b720fe3e9c5cd647accff9e03 commit)
      93315ed6
    • D
      [PATCH] Fix audit record filtering with !CONFIG_AUDITSYSCALL · fe7752ba
      David Woodhouse 提交于
      This fixes the per-user and per-message-type filtering when syscall
      auditing isn't enabled.
      
      [AV: folded followup fix from the same author]
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      fe7752ba
    • D
      [PATCH] Miscellaneous bug and warning fixes · 7306a0b9
      Dustin Kirkland 提交于
      This patch fixes a couple of bugs revealed in new features recently
      added to -mm1:
      * fixes warnings due to inconsistent use of const struct inode *inode
      * fixes bug that prevent a kernel from booting with audit on, and SELinux off
        due to a missing function in security/dummy.c
      * fixes a bug that throws spurious audit_panic() messages due to a missing
        return just before an error_path label
      * some reasonable house cleaning in audit_ipc_context(),
        audit_inode_context(), and audit_log_task_context()
      Signed-off-by: NDustin Kirkland <dustin.kirkland@us.ibm.com>
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      7306a0b9
    • D
      [PATCH] Capture selinux subject/object context information. · 8c8570fb
      Dustin Kirkland 提交于
      This patch extends existing audit records with subject/object context
      information. Audit records associated with filesystem inodes, ipc, and
      tasks now contain SELinux label information in the field "subj" if the
      item is performing the action, or in "obj" if the item is the receiver
      of an action.
      
      These labels are collected via hooks in SELinux and appended to the
      appropriate record in the audit code.
      
      This additional information is required for Common Criteria Labeled
      Security Protection Profile (LSPP).
      
      [AV: fixed kmalloc flags use]
      [folded leak fixes]
      [folded cleanup from akpm (kfree(NULL)]
      [folded audit_inode_context() leak fix]
      [folded akpm's fix for audit_ipc_perm() definition in case of !CONFIG_AUDIT]
      Signed-off-by: NDustin Kirkland <dustin.kirkland@us.ibm.com>
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      8c8570fb
    • D
      [PATCH] Exclude messages by message type · c8edc80c
      Dustin Kirkland 提交于
          - Add a new, 5th filter called "exclude".
          - And add a new field AUDIT_MSGTYPE.
          - Define a new function audit_filter_exclude() that takes a message type
            as input and examines all rules in the filter.  It returns '1' if the
            message is to be excluded, and '0' otherwise.
          - Call the audit_filter_exclude() function near the top of
            audit_log_start() just after asserting audit_initialized.  If the
            message type is not to be audited, return NULL very early, before
            doing a lot of work.
      [combined with followup fix for bug in original patch, Nov 4, same author]
      [combined with later renaming AUDIT_FILTER_EXCLUDE->AUDIT_FILTER_TYPE
      and audit_filter_exclude() -> audit_filter_type()]
      Signed-off-by: NDustin Kirkland <dustin.kirkland@us.ibm.com>
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      c8edc80c
    • A
      [PATCH] Collect more inode information during syscall processing. · 73241ccc
      Amy Griffis 提交于
      This patch augments the collection of inode info during syscall
      processing. It represents part of the functionality that was provided
      by the auditfs patch included in RHEL4.
      
      Specifically, it:
      
      - Collects information for target inodes created or removed during
        syscalls.  Previous code only collects information for the target
        inode's parent.
      
      - Adds the audit_inode() hook to syscalls that operate on a file
        descriptor (e.g. fchown), enabling audit to do inode filtering for
        these calls.
      
      - Modifies filtering code to check audit context for either an inode #
        or a parent inode # matching a given rule.
      
      - Modifies logging to provide inode # for both parent and child.
      
      - Protect debug info from NULL audit_names.name.
      
      [AV: folded a later typo fix from the same author]
      Signed-off-by: NAmy Griffis <amy.griffis@hp.com>
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      73241ccc
    • A
      [PATCH] Pass dentry, not just name, in fsnotify creation hooks. · f38aa942
      Amy Griffis 提交于
      The audit hooks (to be added shortly) will want to see dentry->d_inode
      too, not just the name.
      Signed-off-by: NAmy Griffis <amy.griffis@hp.com>
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      f38aa942
    • D
      [PATCH] Filter rule comparators · b63862f4
      Dustin Kirkland 提交于
      Currently, audit only supports the "=" and "!=" operators in the -F
      filter rules.
      
      This patch reworks the support for "=" and "!=", and adds support
      for ">", ">=", "<", and "<=".
      
      This turned out to be a pretty clean, and simply process.  I ended up
      using the high order bits of the "field", as suggested by Steve and Amy.
      This allowed for no changes whatsoever to the netlink communications.
      See the documentation within the patch in the include/linux/audit.h
      area, where there is a table that explains the reasoning of the bitmask
      assignments clearly.
      
      The patch adds a new function, audit_comparator(left, op, right).
      This function will perform the specified comparison (op, which defaults
      to "==" for backward compatibility) between two values (left and right).
      If the negate bit is on, it will negate whatever that result was.  This
      value is returned.
      Signed-off-by: NDustin Kirkland <dustin.kirkland@us.ibm.com>
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      b63862f4
    • R
      [PATCH] AUDIT: kerneldoc for kernel/audit*.c · b0dd25a8
      Randy Dunlap 提交于
      - add kerneldoc for non-static functions;
      - don't init static data to 0;
      - limit lines to < 80 columns;
      - fix long-format style;
      - delete whitespace at end of some lines;
      
      (chrisw: resend and update to current audit-2.6 tree)
      Signed-off-by: NRandy Dunlap <rdunlap@xenotime.net>
      Signed-off-by: NChris Wright <chrisw@osdl.org>
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      b0dd25a8
    • J
      [PATCH] make vm86 call audit_syscall_exit · 7e7f8a03
      Jason Baron 提交于
      hi,
      
      The motivation behind the patch below was to address messages in
      /var/log/messages such as:
      
      Jan 31 10:54:15 mets kernel: audit(:0): major=252 name_count=0: freeing
      multiple contexts (1)
      Jan 31 10:54:15 mets kernel: audit(:0): major=113 name_count=0: freeing
      multiple contexts (2)
      
      I can reproduce by running 'get-edid' from:
      http://john.fremlin.de/programs/linux/read-edid/.
      
      These messages come about in the log b/c the vm86 calls do not exit via
      the normal system call exit paths and thus do not call
      'audit_syscall_exit'. The next system call will then free the context for
      itself and for the vm86 context, thus generating the above messages. This
      patch addresses the issue by simply adding a call to 'audit_syscall_exit'
      from the vm86 code.
      
      Besides fixing the above error messages the patch also now allows vm86
      system calls to become auditable. This is useful since strace does not
      appear to properly record the return values from sys_vm86.
      
      I think this patch is also a step in the right direction in terms of
      cleaning up some core auditing code. If we can correct any other paths
      that do not properly call the audit exit and entries points, then we can
      also eliminate the notion of context chaining.
      
      I've tested this patch by verifying that the log messages no longer
      appear, and that the audit records for sys_vm86 appear to be correct.
      Also, 'read_edid' produces itentical output.
      
      thanks,
      
      -Jason
      Signed-off-by: NJason Baron <jbaron@redhat.com>
      Signed-off-by: NAl Viro <viro@zeniv.linux.org.uk>
      7e7f8a03
  3. 19 2月, 2006 1 次提交
  4. 10 2月, 2006 1 次提交
  5. 19 1月, 2006 1 次提交
    • A
      [PATCH] EDAC: atomic scrub operations · 715b49ef
      Alan Cox 提交于
      EDAC requires a way to scrub memory if an ECC error is found and the chipset
      does not do the work automatically.  That means rewriting memory locations
      atomically with respect to all CPUs _and_ bus masters.  That means we can't
      use atomic_add(foo, 0) as it gets optimised for non-SMP
      
      This adds a function to include/asm-foo/atomic.h for the platforms currently
      supported which implements a scrub of a mapped block.
      
      It also adjusts a few other files include order where atomic.h is included
      before types.h as this now causes an error as atomic_scrub uses u32.
      Signed-off-by: NAlan Cox <alan@redhat.com>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      715b49ef
  6. 28 10月, 2005 1 次提交
  7. 27 8月, 2005 1 次提交
  8. 17 8月, 2005 3 次提交
  9. 19 7月, 2005 1 次提交
  10. 14 7月, 2005 3 次提交
  11. 02 7月, 2005 1 次提交
  12. 24 6月, 2005 3 次提交
  13. 22 6月, 2005 2 次提交
  14. 21 6月, 2005 1 次提交
  15. 20 6月, 2005 3 次提交
  16. 27 5月, 2005 1 次提交
  17. 26 5月, 2005 1 次提交
    • D
      AUDIT: Defer freeing aux items until audit_free_context() · 7551ced3
      David Woodhouse 提交于
      While they were all just simple blobs it made sense to just free them
      as we walked through and logged them. Now that there are pointers to
      other objects which need refcounting, we might as well revert to
      _only_ logging them in audit_log_exit(), and put the code to free them
      properly in only one place -- in audit_free_aux().
      Signed-off-by: NDavid Woodhouse <dwmw2@infradead.org>
      ----------------------------------------------------------
      7551ced3
  18. 24 5月, 2005 2 次提交
  19. 22 5月, 2005 1 次提交