diff options
author | Linda Knippers <linda.knippers@hp.com> | 2006-05-16 22:03:48 -0400 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2006-06-20 05:25:24 -0400 |
commit | ac03221a4fdda9bfdabf99bcd129847f20fc1d80 (patch) | |
tree | 9b65ede238b03007bfe5e25f46efca68ec0994e0 /include | |
parent | 5d136a010de3bc16fe595987feb9ef8868f064c2 (diff) |
[PATCH] update of IPC audit record cleanup
The following patch addresses most of the issues with the IPC_SET_PERM
records as described in:
https://www.redhat.com/archives/linux-audit/2006-May/msg00010.html
and addresses the comments I received on the record field names.
To summarize, I made the following changes:
1. Changed sys_msgctl() and semctl_down() so that an IPC_SET_PERM
record is emitted in the failure case as well as the success case.
This matches the behavior in sys_shmctl(). I could simplify the
code in sys_msgctl() and semctl_down() slightly but it would mean
that in some error cases we could get an IPC_SET_PERM record
without an IPC record and that seemed odd.
2. No change to the IPC record type, given no feedback on the backward
compatibility question.
3. Removed the qbytes field from the IPC record. It wasn't being
set and when audit_ipc_obj() is called from ipcperms(), the
information isn't available. If we want the information in the IPC
record, more extensive changes will be necessary. Since it only
applies to message queues and it isn't really permission related, it
doesn't seem worth it.
4. Removed the obj field from the IPC_SET_PERM record. This means that
the kern_ipc_perm argument is no longer needed.
5. Removed the spaces and renamed the IPC_SET_PERM field names. Replaced iuid and
igid fields with ouid and ogid in the IPC record.
I tested this with the lspp.22 kernel on an x86_64 box. I believe it
applies cleanly on the latest kernel.
-- ljk
Signed-off-by: Linda Knippers <linda.knippers@hp.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'include')
-rw-r--r-- | include/linux/audit.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/include/linux/audit.h b/include/linux/audit.h index 8f6424f2b604..da5f521be04b 100644 --- a/include/linux/audit.h +++ b/include/linux/audit.h | |||
@@ -325,7 +325,7 @@ extern void auditsc_get_stamp(struct audit_context *ctx, | |||
325 | extern int audit_set_loginuid(struct task_struct *task, uid_t loginuid); | 325 | extern int audit_set_loginuid(struct task_struct *task, uid_t loginuid); |
326 | extern uid_t audit_get_loginuid(struct audit_context *ctx); | 326 | extern uid_t audit_get_loginuid(struct audit_context *ctx); |
327 | extern int audit_ipc_obj(struct kern_ipc_perm *ipcp); | 327 | extern int audit_ipc_obj(struct kern_ipc_perm *ipcp); |
328 | extern int audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, mode_t mode, struct kern_ipc_perm *ipcp); | 328 | extern int audit_ipc_set_perm(unsigned long qbytes, uid_t uid, gid_t gid, mode_t mode); |
329 | extern int audit_bprm(struct linux_binprm *bprm); | 329 | extern int audit_bprm(struct linux_binprm *bprm); |
330 | extern int audit_socketcall(int nargs, unsigned long *args); | 330 | extern int audit_socketcall(int nargs, unsigned long *args); |
331 | extern int audit_sockaddr(int len, void *addr); | 331 | extern int audit_sockaddr(int len, void *addr); |
@@ -345,7 +345,7 @@ extern int audit_set_macxattr(const char *name); | |||
345 | #define auditsc_get_stamp(c,t,s) do { BUG(); } while (0) | 345 | #define auditsc_get_stamp(c,t,s) do { BUG(); } while (0) |
346 | #define audit_get_loginuid(c) ({ -1; }) | 346 | #define audit_get_loginuid(c) ({ -1; }) |
347 | #define audit_ipc_obj(i) ({ 0; }) | 347 | #define audit_ipc_obj(i) ({ 0; }) |
348 | #define audit_ipc_set_perm(q,u,g,m,i) ({ 0; }) | 348 | #define audit_ipc_set_perm(q,u,g,m) ({ 0; }) |
349 | #define audit_bprm(p) ({ 0; }) | 349 | #define audit_bprm(p) ({ 0; }) |
350 | #define audit_socketcall(n,a) ({ 0; }) | 350 | #define audit_socketcall(n,a) ({ 0; }) |
351 | #define audit_sockaddr(len, addr) ({ 0; }) | 351 | #define audit_sockaddr(len, addr) ({ 0; }) |