<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/kernel/auditsc.c, branch v2.6.28</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.28</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.28'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2008-12-09T07:27:41Z</updated>
<entry>
<title>[PATCH] fix broken timestamps in AVC generated by kernel threads</title>
<updated>2008-12-09T07:27:41Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2008-12-06T06:05:50Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=48887e63d6e057543067327da6b091297f7fe645'/>
<id>urn:sha1:48887e63d6e057543067327da6b091297f7fe645</id>
<content type='text'>
Timestamp in audit_context is valid only if -&gt;in_syscall is set.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[patch 1/1] audit: remove excess kernel-doc</title>
<updated>2008-12-09T07:27:40Z</updated>
<author>
<name>Randy Dunlap</name>
<email>randy.dunlap@oracle.com</email>
</author>
<published>2008-12-01T22:16:06Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=7f0ed77d241b60f70136f15b8eef30a3de1fa249'/>
<id>urn:sha1:7f0ed77d241b60f70136f15b8eef30a3de1fa249</id>
<content type='text'>
Delete excess kernel-doc notation in kernel/auditsc.c:

Warning(linux-2.6.27-git10//kernel/auditsc.c:1481): Excess function parameter or struct member 'tsk' description in 'audit_syscall_entry'
Warning(linux-2.6.27-git10//kernel/auditsc.c:1564): Excess function parameter or struct member 'tsk' description in 'audit_syscall_exit'

Signed-off-by: Randy Dunlap &lt;randy.dunlap@oracle.com&gt;
Cc: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Cc: Eric Paris &lt;eparis@redhat.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] return records for fork() both to child and parent</title>
<updated>2008-12-09T07:27:38Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2008-11-12T23:37:41Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=a64e64944f4b8ce3288519555dbaa0232414b8ac'/>
<id>urn:sha1:a64e64944f4b8ce3288519555dbaa0232414b8ac</id>
<content type='text'>
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>tty: Fix abusers of current-&gt;sighand-&gt;tty</title>
<updated>2008-10-13T16:51:42Z</updated>
<author>
<name>Alan Cox</name>
<email>alan@redhat.com</email>
</author>
<published>2008-10-13T09:40:53Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=dbda4c0b97b18fd59b3964548361b4f92357f730'/>
<id>urn:sha1:dbda4c0b97b18fd59b3964548361b4f92357f730</id>
<content type='text'>
Various people outside the tty layer still stick their noses in behind the
scenes. We need to make sure they also obey the locking and referencing rules.

Signed-off-by: Alan Cox &lt;alan@redhat.com&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] audit: Moved variable declaration to beginning of function</title>
<updated>2008-09-02T03:06:45Z</updated>
<author>
<name>Cordelia</name>
<email>cordsam@linux.vnet.ibm.com</email>
</author>
<published>2008-08-18T16:45:51Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=c4bacefb7aaf49da11a695f29d85d40909f17693'/>
<id>urn:sha1:c4bacefb7aaf49da11a695f29d85d40909f17693</id>
<content type='text'>
got rid of compilation warning:
ISO C90 forbids mixed declarations and code

Signed-off-by: Cordelia Sam &lt;cordesam@gmail.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>Re: [PATCH] Fix the kernel panic of audit_filter_task when key field is set</title>
<updated>2008-08-04T10:13:50Z</updated>
<author>
<name>zhangxiliang</name>
<email>zhangxiliang@cn.fujitsu.com</email>
</author>
<published>2008-08-02T02:56:37Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=1a61c88defcd611bd148d6c960b498e1b8bbbe00'/>
<id>urn:sha1:1a61c88defcd611bd148d6c960b498e1b8bbbe00</id>
<content type='text'>
Sorry, I miss a blank between if and "(".
And I add "unlikely" to check "ctx" in audit_match_perm() and audit_match_filetype().
This is a new patch for it.

Signed-off-by: Zhang Xiliang &lt;zhangxiliang@cn.fujitsu.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] Fix the kernel panic of audit_filter_task when key field is set</title>
<updated>2008-08-01T16:15:03Z</updated>
<author>
<name>zhangxiliang</name>
<email>zhangxiliang@cn.fujitsu.com</email>
</author>
<published>2008-08-01T11:15:47Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=980dfb0db340b95094732d78b55311f2c539c1af'/>
<id>urn:sha1:980dfb0db340b95094732d78b55311f2c539c1af</id>
<content type='text'>
When calling audit_filter_task(), it calls audit_filter_rules() with audit_context is NULL.
If the key field is set, the result in audit_filter_rules() will be set to 1 and
ctx-&gt;filterkey will be set to key.
But the ctx is NULL in this condition, so kernel will panic.

Signed-off-by: Zhang Xiliang &lt;zhangxiliang@cn.fujitsu.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] Audit: Collect signal info when SIGUSR2 is sent to auditd</title>
<updated>2008-08-01T16:05:32Z</updated>
<author>
<name>Eric Paris</name>
<email>eparis@redhat.com</email>
</author>
<published>2008-07-07T14:49:45Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=ee1d315663ee0b494898f813a266d6244b263b4f'/>
<id>urn:sha1:ee1d315663ee0b494898f813a266d6244b263b4f</id>
<content type='text'>
Makes the kernel audit subsystem collect information about the sending
process when that process sends SIGUSR2 to the userspace audit daemon.
SIGUSR2 is a new interesting signal to auditd telling auditd that it
should try to start logging to disk again and the error condition which
caused it to stop logging to disk (usually out of space) has been
rectified.

Signed-off-by: Eric Paris &lt;eparis@redhat.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>x86_64 syscall audit fast-path</title>
<updated>2008-07-24T00:47:32Z</updated>
<author>
<name>Roland McGrath</name>
<email>roland@redhat.com</email>
</author>
<published>2008-06-23T22:37:04Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=86a1c34a929f30fde8ad01ea8245df61ddcf58b7'/>
<id>urn:sha1:86a1c34a929f30fde8ad01ea8245df61ddcf58b7</id>
<content type='text'>
This adds a fast path for 64-bit syscall entry and exit when
TIF_SYSCALL_AUDIT is set, but no other kind of syscall tracing.
This path does not need to save and restore all registers as
the general case of tracing does.  Avoiding the iret return path
when syscall audit is enabled helps performance a lot.

Signed-off-by: Roland McGrath &lt;roland@redhat.com&gt;
</content>
</entry>
<entry>
<title>[PATCH] new predicate - AUDIT_FILETYPE</title>
<updated>2008-04-28T10:28:37Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2008-04-28T08:15:49Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=8b67dca9420474623709e00d72a066068a502b20'/>
<id>urn:sha1:8b67dca9420474623709e00d72a066068a502b20</id>
<content type='text'>
Argument is S_IF... | &lt;index&gt;, where index is normally 0 or 1.
Triggers if chosen element of ctx-&gt;names[] is present and the
mode of object in question matches the upper bits of argument.
I.e. for things like "is the argument of that chmod a directory",
etc.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
</feed>
