1. 20 Mar, 2006 9 commits
  2. 18 Jan, 2006 1 commit
    • Alan Cox's avatar
      [PATCH] EDAC: atomic scrub operations · 715b49ef
      Alan Cox authored
      
      EDAC requires a way to scrub memory if an ECC error is found and the chipset
      does not do the work automatically.  That means rewriting memory locations
      atomically with respect to all CPUs _and_ bus masters.  That means we can't
      use atomic_add(foo, 0) as it gets optimised for non-SMP
      
      This adds a function to include/asm-foo/atomic.h for the platforms currently
      supported which implements a scrub of a mapped block.
      
      It also adjusts a few other files include order where atomic.h is included
      before types.h as this now causes an error as atomic_scrub uses u32.
      Signed-off-by: default avatarAlan Cox <alan@redhat.com>
      Signed-off-by: default avatarAndrew Morton <akpm@osdl.org>
      Signed-off-by: default avatarLinus Torvalds <torvalds@osdl.org>
      715b49ef
  3. 08 Jan, 2006 1 commit
  4. 12 Dec, 2005 1 commit
  5. 28 Oct, 2005 1 commit
  6. 08 Oct, 2005 1 commit
  7. 29 Aug, 2005 2 commits
  8. 17 Aug, 2005 1 commit
  9. 18 Jul, 2005 1 commit
  10. 15 Jul, 2005 1 commit
  11. 13 Jul, 2005 1 commit
  12. 02 Jul, 2005 1 commit
    • David Woodhouse's avatar
      AUDIT: Stop waiting for backlog after audit_panic() happens · ac4cec44
      David Woodhouse authored
      
      We force a rate-limit on auditable events by making them wait for space 
      on the backlog queue. However, if auditd really is AWOL then this could 
      potentially bring the entire system to a halt, depending on the audit 
      rules in effect.
      
      Firstly, make sure the wait time is honoured correctly -- it's the 
      maximum time the process should wait, rather than the time to wait 
      _each_ time round the loop. We were getting re-woken _each_ time a 
      packet was dequeued, and the timeout was being restarted each time.
      
      Secondly, reset the wait time after audit_panic() is called. In general 
      this will be reset to zero, to allow progress to be made. If the system
      is configured to _actually_ panic on audit_panic() then that will 
      already have happened; otherwise we know that audit records are being 
      lost anyway. 
      
      These two tunables can't be exposed via AUDIT_GET and AUDIT_SET because 
      those aren't particularly well-designed. It probably should have been 
      done by sysctls or sysfs anyway -- one for a later patch.
      Signed-off-by: default avatarDavid Woodhouse <dwmw2@infradead.org>
      ac4cec44
  13. 24 Jun, 2005 2 commits
  14. 22 Jun, 2005 3 commits
  15. 21 Jun, 2005 1 commit
  16. 20 Jun, 2005 1 commit
  17. 19 Jun, 2005 1 commit
  18. 23 May, 2005 1 commit
  19. 21 May, 2005 1 commit
  20. 20 May, 2005 2 commits
  21. 19 May, 2005 3 commits
    • David Woodhouse's avatar
      AUDIT: Honour audit_backlog_limit again. · fb19b4c6
      David Woodhouse authored
      
      The limit on the number of outstanding audit messages was inadvertently
      removed with the switch to queuing skbs directly for sending by a kernel
      thread. Put it back again.
      Signed-off-by: default avatarDavid Woodhouse <dwmw2@infradead.org>
      fb19b4c6
    • David Woodhouse's avatar
      AUDIT: Send netlink messages from a separate kernel thread · b7d11258
      David Woodhouse authored
      
      netlink_unicast() will attempt to reallocate and will free messages if
      the socket's rcvbuf limit is reached unless we give it an infinite 
      timeout. So do that, from a kernel thread which is dedicated to spewing
      stuff up the netlink socket.
      Signed-off-by: default avatarDavid Woodhouse <dwmw2@infradead.org>
      b7d11258
    • Steve Grubb's avatar
      AUDIT: Clean up logging of untrusted strings · 168b7173
      Steve Grubb authored
      
      * If vsnprintf returns -1, it will mess up the sk buffer space accounting. 
      This is fixed by not calling skb_put with bogus len values.
      
      * audit_log_hex was a loop that called audit_log_vformat with %02X for each 
      character. This is very inefficient since conversion from unsigned character 
      to Ascii representation is essentially masking, shifting, and byte lookups. 
      Also, the length of the converted string is well known - it's twice the 
      original. Fixed by rewriting the function.
      
      * audit_log_untrustedstring had no comments. This makes it hard for 
      someone to understand what the string format will be.
      
      * audit_log_d_path was never fixed to use untrustedstring. This could mess
      up user space parsers. This was fixed to make a temp buffer, call d_path, 
      and log temp buffer using untrustedstring. 
      
      From: Steve Grubb <sgrubb@redhat.com>
      Signed-off-by: default avatarDavid Woodhouse <dwmw2@infradead.org>
      168b7173
  22. 18 May, 2005 1 commit
  23. 13 May, 2005 3 commits