From mboxrd@z Thu Jan 1 00:00:00 1970 From: Richard Guy Briggs Subject: Re: [PATCH 0/6][v2] audit: implement multicast socket for journald Date: Tue, 22 Apr 2014 21:49:29 -0400 Message-ID: <20140423014929.GL20182@madcap2.tricolour.ca> References: <20140422.161904.1187535812839850973.davem@davemloft.net> <20140422.214300.171999077259349189.davem@davemloft.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Content-Disposition: inline In-Reply-To: <20140422.214300.171999077259349189.davem@davemloft.net> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: linux-audit-bounces@redhat.com Errors-To: linux-audit-bounces@redhat.com To: David Miller , linux-audit@redhat.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org Cc: linux-security-module@vger.kernel.org, selinux@tycho.nsa.gov, hadi@mojatatu.com List-Id: linux-audit@redhat.com On 14/04/22, David Miller wrote: > From: Richard Guy Briggs > Date: Tue, 22 Apr 2014 21:31:52 -0400 > > > This is a patch set Eric Paris and I have been working on to add a restricted > > capability read-only netlink multicast socket to kernel audit to enable > > userspace clients such as systemd/journald to receive audit logs, in addition > > to the bidirectional auditd userspace client. > > Series applied, thanks Richard. Thanks for your patience, David. Can I assume you adopted the 3 audit patches too, becuase of the dependence? - RGB -- Richard Guy Briggs Senior Software Engineer, Kernel Security, AMER ENG Base Operating Systems, Red Hat Remote, Ottawa, Canada Voice: +1.647.777.2635, Internal: (81) 32635, Alt: +1.613.693.0684x3545