<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/kernel/auditfilter.c, branch v2.6.23</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.23</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.23'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2007-07-22T13:57:02Z</updated>
<entry>
<title>[PATCH] allow audit filtering on bit &amp; operations</title>
<updated>2007-07-22T13:57:02Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2007-06-04T21:00:14Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=74f2345b6be1410f824cb7dd638d2c10a9709379'/>
<id>urn:sha1:74f2345b6be1410f824cb7dd638d2c10a9709379</id>
<content type='text'>
Right now the audit filter can match on = != &gt; &lt; &gt;= blah blah blah.
This allow the filter to also look at bitwise AND operations, &amp;

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: fix broken class-based syscall audit</title>
<updated>2007-07-22T13:57:02Z</updated>
<author>
<name>Klaus Weidner</name>
<email>klaus@atsec.com</email>
</author>
<published>2007-05-16T22:45:42Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=c926e4f432af0f61ac2b9b637fb51a4871a3fc91'/>
<id>urn:sha1:c926e4f432af0f61ac2b9b637fb51a4871a3fc91</id>
<content type='text'>
The sanity check in audit_match_class() is wrong.  We are able to audit
2048 syscalls but in audit_match_class() we were accidentally using
sizeof(_u32) instead of number of bits in _u32 when deciding how many
syscalls were valid.  On ia64 in particular we were hitting syscall
numbers over the (wrong) limit of 256.  Fixing the audit_match_class
check takes care of the problem.

Signed-off-by: Klaus Weidner &lt;klaus@atsec.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>kernel/auditfilter: kill bogus uninit'd-var compiler warning</title>
<updated>2007-07-17T20:17:59Z</updated>
<author>
<name>Jeff Garzik</name>
<email>jeff@garzik.org</email>
</author>
<published>2007-07-17T01:25:01Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=6f686d3d14621b90f3793b705bdf9fa624fd29ca'/>
<id>urn:sha1:6f686d3d14621b90f3793b705bdf9fa624fd29ca</id>
<content type='text'>
Kill this warning...

kernel/auditfilter.c: In function ‘audit_receive_filter’:
kernel/auditfilter.c:1213: warning: ‘ndw’ may be used uninitialized in this function
kernel/auditfilter.c:1213: warning: ‘ndp’ may be used uninitialized in this function

...with a simplification of the code.  audit_put_nd() can accept NULL
arguments, just like kfree().  It is cleaner to init two existing vars
to NULL, remove the redundant test variable 'putnd_needed' branches, and call
audit_put_nd() directly.

As a desired side effect, the warning goes away.

Signed-off-by: Jeff Garzik &lt;jeff@garzik.org&gt;
</content>
</entry>
<entry>
<title>audit: fix oops removing watch if audit disabled</title>
<updated>2007-06-24T15:59:12Z</updated>
<author>
<name>Tony Jones</name>
<email>tonyj@suse.de</email>
</author>
<published>2007-06-24T00:16:47Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=7b018b2888b32284e09bba9cccb5cd2e12199feb'/>
<id>urn:sha1:7b018b2888b32284e09bba9cccb5cd2e12199feb</id>
<content type='text'>
Removing a watched file will oops if audit is disabled (auditctl -e 0).

To reproduce:
- auditctl -e 1
- touch /tmp/foo
- auditctl -w /tmp/foo
- auditctl -e 0
- rm /tmp/foo (or mv)

Signed-off-by: Tony Jones &lt;tonyj@suse.de&gt;
Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Cc: &lt;stable@kernel.org&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>audit_match_signal() and friends are used only if CONFIG_AUDITSYSCALL is set</title>
<updated>2007-05-16T01:56:37Z</updated>
<author>
<name>Al Viro</name>
<email>viro@ftp.linux.org.uk</email>
</author>
<published>2007-05-15T19:37:10Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=327b9eebbf2b7ce632e93a9c1386d944af0dadf4'/>
<id>urn:sha1:327b9eebbf2b7ce632e93a9c1386d944af0dadf4</id>
<content type='text'>
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit signal recipients</title>
<updated>2007-05-11T09:38:25Z</updated>
<author>
<name>Amy Griffis</name>
<email>amy.griffis@hp.com</email>
</author>
<published>2007-03-29T22:01:04Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=e54dc2431d740a79a6bd013babade99d71b1714f'/>
<id>urn:sha1:e54dc2431d740a79a6bd013babade99d71b1714f</id>
<content type='text'>
When auditing syscalls that send signals, log the pid and security
context for each target process. Optimize the data collection by
adding a counter for signal-related rules, and avoiding allocating an
aux struct unless we have more than one target process. For process
groups, collect pid/context data in blocks of 16. Move the
audit_signal_info() hook up in check_kill_permission() so we audit
attempts where permission is denied.

Signed-off-by: Amy Griffis &lt;amy.griffis@hp.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] minor update to rule add/delete messages (ver 2)</title>
<updated>2007-02-18T02:30:09Z</updated>
<author>
<name>Steve Grubb</name>
<email>sgrubb redhat com</email>
</author>
<published>2006-12-14T16:48:47Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=a17b4ad778e1857944f5a1df95fb7758cd5cc58d'/>
<id>urn:sha1:a17b4ad778e1857944f5a1df95fb7758cd5cc58d</id>
<content type='text'>
I was looking at parsing some of these messages and found that I wanted what
it was doing next to an op= for the parser to key on. Also missing was the list
number and results.

Signed-off-by: Steve Grubb &lt;sgrubb@redhat.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: fix audit_filter_user_rules() initialization bug</title>
<updated>2007-02-11T18:51:34Z</updated>
<author>
<name>Ingo Molnar</name>
<email>mingo@elte.hu</email>
</author>
<published>2007-02-10T09:46:09Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=11f57cedcf382574a1e41d6cec2349f287fcea67'/>
<id>urn:sha1:11f57cedcf382574a1e41d6cec2349f287fcea67</id>
<content type='text'>
gcc emits this warning:

 kernel/auditfilter.c: In function 'audit_filter_user':
 kernel/auditfilter.c:1611: warning: 'state' is used uninitialized in this function

I tend to agree with gcc - there are a couple of plausible exit paths from
audit_filter_user_rules() where it does not set 'state', keeping the
variable uninitialized.  For example if a filter rule has an AUDIT_POSSIBLE
action.  Initialize to 'wont audit'.  Fix whitespace damage too.

Signed-off-by: Ingo Molnar &lt;mingo@elte.hu&gt;
Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: fix kstrdup() error check</title>
<updated>2006-12-22T16:55:49Z</updated>
<author>
<name>Akinobu Mita</name>
<email>akinobu.mita@gmail.com</email>
</author>
<published>2006-12-22T09:10:02Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=3e1fbd12c958591695f89b11f9c6ec08d002e358'/>
<id>urn:sha1:3e1fbd12c958591695f89b11f9c6ec08d002e358</id>
<content type='text'>
kstrdup() returns NULL on error.

Cc: David Woodhouse &lt;dwmw2@infradead.org&gt;
Signed-off-by: Akinobu Mita &lt;akinobu.mita@gmail.com&gt;
Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] kernel core: replace kmalloc+memset with kzalloc</title>
<updated>2006-12-07T16:39:41Z</updated>
<author>
<name>Burman Yan</name>
<email>yan_952@hotmail.com</email>
</author>
<published>2006-12-07T04:38:51Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=4668edc334ee90cf50c382c3e423cfc510b5a126'/>
<id>urn:sha1:4668edc334ee90cf50c382c3e423cfc510b5a126</id>
<content type='text'>
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
</feed>
