Al Viro 291041e935 fix bogus reporting of signals by audit
Async signals should not be reported as sent by current in audit log.  As
it is, we call audit_signal_info() too early in check_kill_permission().
Note that check_kill_permission() has that test already - it needs to know
if it should apply current-based permission checks.  So the solution is to
move the call of audit_signal_info() between those.

Bogosity in question is easily reproduced - add a rule watching for e.g.
kill(2) from specific process (so that audit_signal_info() would not
short-circuit to nothing), say load_policy, watch the bogus OBJ_PID entry
in audit logs claiming that write(2) on selinuxfs file issued by
load_policy(8) had somehow managed to send a signal to syslogd...

Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Acked-by: Steve Grubb <sgrubb@redhat.com>
Acked-by: Eric Paris <eparis@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-10-07 16:28:43 -07:00
..
2007-08-31 01:42:23 -07:00
2007-07-16 09:05:47 -07:00
2007-08-22 19:52:44 -07:00
2007-07-18 08:47:40 -07:00
2007-09-20 13:19:59 -07:00
2007-09-20 13:19:59 -07:00
2007-10-01 07:52:23 -07:00
2007-10-01 07:52:23 -07:00
2006-12-07 08:39:36 -08:00
2007-07-16 09:05:50 -07:00
2007-08-11 15:47:42 -07:00
2007-07-20 12:01:34 -07:00
2006-12-04 02:00:22 -05:00
2007-07-31 15:39:40 -07:00
2007-07-16 09:05:47 -07:00
2007-07-19 10:04:49 -07:00
2007-08-22 19:52:46 -07:00
2007-08-11 15:47:42 -07:00
2007-07-16 09:05:49 -07:00
2007-07-16 09:05:49 -07:00
2007-07-16 09:05:49 -07:00
2007-10-02 14:13:08 +02:00
2007-09-19 23:34:46 +02:00
2007-07-16 09:05:50 -07:00
2007-10-01 07:52:23 -07:00
2007-09-19 11:24:18 -07:00
2007-05-09 08:57:56 +02:00
2007-08-27 10:27:48 -07:00