<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/kernel/auditfilter.c, branch v2.6.19</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.19</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.19'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2006-10-04T12:31:16Z</updated>
<entry>
<title>[PATCH] arch filter lists with &lt; or &gt; should not be accepted</title>
<updated>2006-10-04T12:31:16Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2006-09-28T21:46:21Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=4b8a311bb161a3bd2ab44311f42c526b6dc76270'/>
<id>urn:sha1:4b8a311bb161a3bd2ab44311f42c526b6dc76270</id>
<content type='text'>
Currently the kernel audit system represents arch's as numbers and will
gladly accept comparisons between archs using &gt;, &lt;, &gt;=, &lt;= when the only
thing that makes sense is = or !=.  I'm told that the next revision of
auditctl will do this checking but this will provide enforcement in the
kernel even for old userspace.  A simple command to show the issue would
be to run

auditctl -d entry,always -F arch&gt;i686 -S chmod

with this patch the kernel will reject this with -EINVAL

Please comment/ack/nak as soon as possible.

-Eric

 kernel/auditfilter.c |    9 ++++++++-
 1 file changed, 8 insertions(+), 1 deletion(-)

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] selinux: rename selinux_ctxid_to_string</title>
<updated>2006-09-26T15:48:52Z</updated>
<author>
<name>Stephen Smalley</name>
<email>sds@tycho.nsa.gov</email>
</author>
<published>2006-09-26T06:31:57Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=1a70cd40cb291c25b67ec0da715a49d76719329d'/>
<id>urn:sha1:1a70cd40cb291c25b67ec0da715a49d76719329d</id>
<content type='text'>
Rename selinux_ctxid_to_string to selinux_sid_to_string to be
consistent with other interfaces.

Signed-off-by: Stephen Smalley &lt;sds@tycho.nsa.gov&gt;
Acked-by: James Morris &lt;jmorris@namei.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: AUDIT_PERM support</title>
<updated>2006-09-11T17:32:30Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2006-08-31T23:26:40Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=55669bfa141b488be865341ed12e188967d11308'/>
<id>urn:sha1:55669bfa141b488be865341ed12e188967d11308</id>
<content type='text'>
add support for AUDIT_PERM predicate

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] update audit rule change messages</title>
<updated>2006-09-11T17:32:17Z</updated>
<author>
<name>Amy Griffis</name>
<email>amy.griffis@hp.com</email>
</author>
<published>2006-09-07T21:46:18Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=5974501e2d44546748e67c635cec20ba66619a3d'/>
<id>urn:sha1:5974501e2d44546748e67c635cec20ba66619a3d</id>
<content type='text'>
Make the audit message for implicit rule removal more informative.
Make the rule update message consistent with other messages.

Signed-off-by: Amy Griffis &lt;amy.griffis@hp.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] fix ppid bug in 2.6.18 kernel</title>
<updated>2006-09-11T17:32:04Z</updated>
<author>
<name>Steve Grubb</name>
<email>sgrubb@redhat.com</email>
</author>
<published>2006-08-26T18:06:20Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=3b33ac3182a4554742757a0c61ee1df162cf8225'/>
<id>urn:sha1:3b33ac3182a4554742757a0c61ee1df162cf8225</id>
<content type='text'>
Hello,

During some troubleshooting, I found that ppid was accidentally omitted from
the legacy rule section. This resulted in EINVAL for any rule with ppid sent
with AUDIT_ADD.

Signed-off-by: Steve Grubb &lt;sgrubb@redhat.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] introduce audit rules counter</title>
<updated>2006-08-03T14:55:18Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2006-07-10T12:29:24Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=471a5c7c839114cc8b55876203aeb2817c33e3c5'/>
<id>urn:sha1:471a5c7c839114cc8b55876203aeb2817c33e3c5</id>
<content type='text'>
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] fix audit oops with invalid operator</title>
<updated>2006-08-03T14:54:43Z</updated>
<author>
<name>Amy Griffis</name>
<email>amy.griffis@hp.com</email>
</author>
<published>2006-08-01T21:52:26Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=5422e01ac16df7398b2bad1eccad0ae3be4dee32'/>
<id>urn:sha1:5422e01ac16df7398b2bad1eccad0ae3be4dee32</id>
<content type='text'>
Michael C Thompson wrote:  [Tue Aug 01 2006, 02:36:36PM EDT]
&gt; The trigger for this oops is:
&gt; # auditctl -a exit,always -S pread64 -F 'inode&lt;1'

Setting the err value will fix it.

Signed-off-by: Amy Griffis &lt;amy.griffis@hp.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit syscall classes</title>
<updated>2006-07-01T11:44:10Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2006-07-01T07:56:16Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=b915543b46a2aa599fdd2169e51bcfd88812a12b'/>
<id>urn:sha1:b915543b46a2aa599fdd2169e51bcfd88812a12b</id>
<content type='text'>
Allow to tie upper bits of syscall bitmap in audit rules to kernel-defined
sets of syscalls.  Infrastructure, a couple of classes (with 32bit counterparts
for biarch targets) and actual tie-in on i386, amd64 and ia64.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: support for object context filters</title>
<updated>2006-07-01T09:44:19Z</updated>
<author>
<name>Darrel Goeddel</name>
<email>dgoeddel@trustedcs.com</email>
</author>
<published>2006-06-29T21:57:08Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=6e5a2d1d32596850a0ebf7fb3e54c0d69901dabd'/>
<id>urn:sha1:6e5a2d1d32596850a0ebf7fb3e54c0d69901dabd</id>
<content type='text'>
This patch introduces object audit filters based on the elements
of the SELinux context.

Signed-off-by: Darrel Goeddel &lt;dgoeddel@trustedcs.com&gt;
Acked-by:  Stephen Smalley &lt;sds@tycho.nsa.gov&gt;

 kernel/auditfilter.c           |   25 +++++++++++++++++++++++++
 kernel/auditsc.c               |   40 ++++++++++++++++++++++++++++++++++++++++
 security/selinux/ss/services.c |   18 +++++++++++++++++-
 3 files changed, 82 insertions(+), 1 deletion(-)
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: rename AUDIT_SE_* constants</title>
<updated>2006-07-01T09:44:08Z</updated>
<author>
<name>Darrel Goeddel</name>
<email>dgoeddel@trustedcs.com</email>
</author>
<published>2006-06-29T21:56:39Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=3a6b9f85c641a3b89420b0c8150ed377526a1fe1'/>
<id>urn:sha1:3a6b9f85c641a3b89420b0c8150ed377526a1fe1</id>
<content type='text'>
This patch renames some audit constant definitions and adds
additional definitions used by the following patch.  The renaming
avoids ambiguity with respect to the new definitions.

Signed-off-by: Darrel Goeddel &lt;dgoeddel@trustedcs.com&gt;

 include/linux/audit.h          |   15 ++++++++----
 kernel/auditfilter.c           |   50 ++++++++++++++++++++---------------------
 kernel/auditsc.c               |   10 ++++----
 security/selinux/ss/services.c |   32 +++++++++++++-------------
 4 files changed, 56 insertions(+), 51 deletions(-)
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
</feed>
