Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | [PATCH] audit signal recipients | Amy Griffis | 2007-05-11 | 1 | -0/+9 |
| | | | | | | | | | | | | | When auditing syscalls that send signals, log the pid and security context for each target process. Optimize the data collection by adding a counter for signal-related rules, and avoiding allocating an aux struct unless we have more than one target process. For process groups, collect pid/context data in blocks of 16. Move the audit_signal_info() hook up in check_kill_permission() so we audit attempts where permission is denied. Signed-off-by: Amy Griffis <amy.griffis@hp.com> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | ||||
* | [PATCH] add SIGNAL syscall class (v3) | Amy Griffis | 2007-05-11 | 1 | -0/+8 |
| | | | | | | | Add a syscall class for sending signals. Signed-off-by: Amy Griffis <amy.griffis@hp.com> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> | ||||
* | [PATCH] sparc64 audit syscall classes hookup | Al Viro | 2006-09-12 | 1 | -0/+66 |
... that should do it for all targets; the only remaining issues are mips (currently treated as non-biarch) and handling of other OS emulations (OSF/SunOS/Solaris/???). The latter would need to be assigned new AUDIT_ARCH_... ABI numbers anyway... Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> |