forked from torvalds/linux
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Audit: internally use the new LSM audit hooks
Convert Audit to use the new LSM Audit hooks instead of the exported SELinux interface. Basically, use: security_audit_rule_init secuirty_audit_rule_free security_audit_rule_known security_audit_rule_match instad of (respectively) : selinux_audit_rule_init selinux_audit_rule_free audit_rule_has_selinux selinux_audit_rule_match Signed-off-by: Casey Schaufler <[email protected]> Signed-off-by: Ahmed S. Darwish <[email protected]> Acked-by: James Morris <[email protected]>
- Loading branch information
Showing
3 changed files
with
22 additions
and
55 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -21,7 +21,7 @@ | |
* | ||
* Written by Rickard E. (Rik) Faith <[email protected]> | ||
* | ||
* Goals: 1) Integrate fully with SELinux. | ||
* Goals: 1) Integrate fully with Security Modules. | ||
* 2) Minimal run-time overhead: | ||
* a) Minimal when syscall auditing is disabled (audit_enable=0). | ||
* b) Small when syscall auditing is enabled and no audit record | ||
|
@@ -55,7 +55,6 @@ | |
#include <net/netlink.h> | ||
#include <linux/skbuff.h> | ||
#include <linux/netlink.h> | ||
#include <linux/selinux.h> | ||
#include <linux/inotify.h> | ||
#include <linux/freezer.h> | ||
#include <linux/tty.h> | ||
|
@@ -882,10 +881,6 @@ static int __init audit_init(void) | |
audit_enabled = audit_default; | ||
audit_ever_enabled |= !!audit_default; | ||
|
||
/* Register the callback with selinux. This callback will be invoked | ||
* when a new policy is loaded. */ | ||
selinux_audit_set_callback(&selinux_audit_rule_update); | ||
|
||
audit_log(NULL, GFP_KERNEL, AUDIT_KERNEL, "initialized"); | ||
|
||
#ifdef CONFIG_AUDITSYSCALL | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters