linux/security/selinux
Steve Grubb c2f0c7c356 The attached patch addresses the problem with getting the audit daemon
shutdown credential information. It creates a new message type 
AUDIT_TERM_INFO, which is used by the audit daemon to query who issued the 
shutdown. 

It requires the placement of a hook function that gathers the information. The 
hook is after the DAC & MAC checks and before the function returns. Racing 
threads could overwrite the uid & pid - but they would have to be root and 
have policy that allows signalling the audit daemon. That should be a 
manageable risk.

The userspace component will be released later in audit 0.7.2. When it 
receives the TERM signal, it queries the kernel for shutdown information. 
When it receives it, it writes the message and exits. The message looks 
like this:

type=DAEMON msg=auditd(1114551182.000) auditd normal halt, sending pid=2650 
uid=525, auditd pid=1685

Signed-off-by: Steve Grubb <sgrubb@redhat.com>
Signed-off-by: David Woodhouse <dwmw2@infradead.org>
2005-05-06 12:38:39 +01:00
..
include [PATCH] SELinux: add finer grained permissions to Netlink audit processing 2005-05-01 08:58:40 -07:00
ss Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
avc.c [PATCH] SELinux: fix deadlock on dcache lock 2005-04-18 10:47:35 -07:00
hooks.c [PATCH] SELinux: cleanup ipc_has_perm 2005-05-01 08:58:39 -07:00
Kconfig Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
Makefile Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
netif.c Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
netlink.c Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
nlmsgtab.c The attached patch addresses the problem with getting the audit daemon 2005-05-06 12:38:39 +01:00
selinuxfs.c Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00