original_kernel/arch/s390/kernel
Amy Griffis e54dc2431d [PATCH] audit signal recipients
When auditing syscalls that send signals, log the pid and security
context for each target process. Optimize the data collection by
adding a counter for signal-related rules, and avoiding allocating an
aux struct unless we have more than one target process. For process
groups, collect pid/context data in blocks of 16. Move the
audit_signal_info() hook up in check_kill_permission() so we audit
attempts where permission is denied.

Signed-off-by: Amy Griffis <amy.griffis@hp.com>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
2007-05-11 05:38:25 -04:00
..
Makefile
asm-offsets.c
audit.c
base.S
binfmt_elf32.c
bitmap.S
compat_audit.c
compat_exec_domain.c
compat_linux.c
compat_linux.h
compat_ptrace.h
compat_signal.c
compat_wrapper.S
cpcmd.c
crash.c
debug.c
dis.c
early.c
ebcdic.c
entry.S
entry64.S
head.S
head31.S
head64.S
init_task.c
ipl.c
irq.c
kprobes.c
machine_kexec.c
module.c
process.c
ptrace.c
reipl.S
reipl64.S
relocate_kernel.S
relocate_kernel64.S
s390_ext.c
s390_ksyms.c
semaphore.c
setup.c
signal.c
smp.c
stacktrace.c
sys_s390.c
syscalls.S
time.c
traps.c
vmlinux.lds.S
vtime.c