* Serge E. Hallyn (serue(a)us.ibm.com) wrote:
The problem with this is that audit admin != sysadmin, so we
instantly preventing linux from achieving, say, MRMLOSPP. But
if we just replace "if (!capable()) err = -EPERM" with a new
lsm hook, then we can still consolidate some of the code in
audit_netlink_ok(nlh).
thoughts?
CAP_SYS_AUDIT?
thanks,
-chris
--
Linux Security Modules
http://lsm.immunix.org http://lsm.bkbits.net