summaryrefslogtreecommitdiffstats
path: root/lib/audit.c
diff options
context:
space:
mode:
authorAmy Griffis <amy.griffis@hp.com>2007-03-30 00:01:04 +0200
committerAl Viro <viro@zeniv.linux.org.uk>2007-05-11 11:38:25 +0200
commite54dc2431d740a79a6bd013babade99d71b1714f (patch)
tree16b0990d5c16946239a17b332f54b5918fb03305 /lib/audit.c
parent[PATCH] add SIGNAL syscall class (v3) (diff)
downloadlinux-e54dc2431d740a79a6bd013babade99d71b1714f.tar.xz
linux-e54dc2431d740a79a6bd013babade99d71b1714f.zip
[PATCH] audit signal recipients
When auditing syscalls that send signals, log the pid and security context for each target process. Optimize the data collection by adding a counter for signal-related rules, and avoiding allocating an aux struct unless we have more than one target process. For process groups, collect pid/context data in blocks of 16. Move the audit_signal_info() hook up in check_kill_permission() so we audit attempts where permission is denied. Signed-off-by: Amy Griffis <amy.griffis@hp.com> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'lib/audit.c')
-rw-r--r--lib/audit.c5
1 files changed, 5 insertions, 0 deletions
diff --git a/lib/audit.c b/lib/audit.c
index 50e915258515..8e7dc1c63aa9 100644
--- a/lib/audit.c
+++ b/lib/audit.c
@@ -28,6 +28,11 @@ static unsigned signal_class[] = {
~0U
};
+int audit_classify_arch(int arch)
+{
+ return 0;
+}
+
int audit_classify_syscall(int abi, unsigned syscall)
{
switch(syscall) {