[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1359344718-3953-1-git-send-email-rbriggs@redhat.com>
Date: Sun, 27 Jan 2013 22:45:12 -0500
From: Richard Guy Briggs <rbriggs@...hat.com>
To: linux-kernel@...r.kernel.org
Cc: Richard Guy Briggs <rgb@...hat.com>
Subject: [PATCH 0/6] audit: add restricted capability read-only netlink multicast socket
From: Richard Guy Briggs <rgb@...hat.com>
Hi,
This is a patch set Eric Paris and I have been working on to add a restricted
capability read-only netlink multicast socket to kaudit to enable
userspace clients such as systemd to consume audit logs, in addition to the
bidirectional auditd userspace client.
Currently, auditd has the CAP_AUDIT_CONTROL and CAP_AUDIT_WRITE capabilities
(bot uses CAP_NET_ADMIN). The CAP_AUDIT_READ capability will be added for use
by read-only AUDIT_NLGRP_READLOG multicast group clients to the kaudit
subsystem.
https://bugzilla.redhat.com/show_bug.cgi?id=887992
Feedback please!
Richard Guy Briggs (6):
audit: refactor hold queue flush
audit: flatten kauditd_thread wait queue code
audit: move kaudit thread start from auditd registration to kaudit
init
netlink: add send and receive capability requirement and capability
flags
audit: add the first netlink multicast socket group
audit: send multicast messages only if there are listeners
include/linux/netlink.h | 4 +
include/uapi/linux/audit.h | 8 ++
include/uapi/linux/capability.h | 5 +-
kernel/audit.c | 142 +++++++++++++++++++++++++-----------
net/netlink/af_netlink.c | 35 +++++++--
security/selinux/include/classmap.h | 2 +-
6 files changed, 144 insertions(+), 52 deletions(-)
--
1.8.0.2
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists