<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/lib/audit.c, branch v2.6.25.6</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/lib/audit.c?h=v2.6.25.6</id>
<link rel='self' href='https://git.amat.us/linux/atom/lib/audit.c?h=v2.6.25.6'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2007-05-11T09:38:25Z</updated>
<entry>
<title>[PATCH] audit signal recipients</title>
<updated>2007-05-11T09:38:25Z</updated>
<author>
<name>Amy Griffis</name>
<email>amy.griffis@hp.com</email>
</author>
<published>2007-03-29T22:01:04Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e54dc2431d740a79a6bd013babade99d71b1714f'/>
<id>urn:sha1:e54dc2431d740a79a6bd013babade99d71b1714f</id>
<content type='text'>
When auditing syscalls that send signals, log the pid and security
context for each target process. Optimize the data collection by
adding a counter for signal-related rules, and avoiding allocating an
aux struct unless we have more than one target process. For process
groups, collect pid/context data in blocks of 16. Move the
audit_signal_info() hook up in check_kill_permission() so we audit
attempts where permission is denied.

Signed-off-by: Amy Griffis &lt;amy.griffis@hp.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] add SIGNAL syscall class (v3)</title>
<updated>2007-05-11T09:38:25Z</updated>
<author>
<name>Amy Griffis</name>
<email>amy.griffis@hp.com</email>
</author>
<published>2007-03-29T22:00:37Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=7f13da40e36c84d0d046b7adbd060af7d3717250'/>
<id>urn:sha1:7f13da40e36c84d0d046b7adbd060af7d3717250</id>
<content type='text'>
Add a syscall class for sending signals.

Signed-off-by: Amy Griffis &lt;amy.griffis@hp.com&gt;
Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
<entry>
<title>[PATCH] fix missing ifdefs in syscall classes hookup for generic targets</title>
<updated>2006-09-23T00:48:56Z</updated>
<author>
<name>Al Viro</name>
<email>viro@ftp.linux.org.uk</email>
</author>
<published>2006-09-22T23:10:18Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=a83fbf635992442edf6aa3252e4008d4a08edf12'/>
<id>urn:sha1:a83fbf635992442edf6aa3252e4008d4a08edf12</id>
<content type='text'>
several targets have no ....at() family and m32r calls its only chown variant
chown32(), with __NR_chown being undefined.  creat(2) is also absent in some
targets.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] syscall class hookup for all normal targets</title>
<updated>2006-09-12T07:04:40Z</updated>
<author>
<name>Al Viro</name>
<email>viro@zeniv.linux.org.uk</email>
</author>
<published>2006-09-12T07:04:40Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e65e1fc2d24b09c496af76e9c5253ac30b300a89'/>
<id>urn:sha1:e65e1fc2d24b09c496af76e9c5253ac30b300a89</id>
<content type='text'>
Take default arch/*/kernel/audit.c to lib/, have those with special
needs (== biarch) define AUDIT_ARCH in their Kconfig.

Signed-off-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
</content>
</entry>
</feed>
