svn commit: r358471 - head/sys/security/audit
Christian S.J. Peron
csjp at FreeBSD.org
Sat Feb 29 19:17:25 UTC 2020
Author: csjp
Date: Sat Feb 29 19:17:24 2020
New Revision: 358471
URL: https://svnweb.freebsd.org/changeset/base/358471
Log:
Currently kernel audit events for jail_set(2), jail_get(2), jail_attach(2),
jail_remove(2) and finally setloginclass(2) are not being converted and
committed into userspace. Add the cases for these syscalls and make sure
they are being converted properly.
Reviewed by: bz, kevans
MFC after: 1 week
Differential Revision: https://reviews.freebsd.org/D23882
Modified:
head/sys/security/audit/audit_bsm.c
Modified: head/sys/security/audit/audit_bsm.c
==============================================================================
--- head/sys/security/audit/audit_bsm.c Sat Feb 29 18:41:48 2020 (r358470)
+++ head/sys/security/audit/audit_bsm.c Sat Feb 29 19:17:24 2020 (r358471)
@@ -809,6 +809,19 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_rec
case AUE_FUTIMESAT:
case AUE_GETATTRLIST:
case AUE_JAIL:
+ break;
+
+ /*
+ * NB: We may want to verify that the appropriate
+ * audit args are being processed here, but I think
+ * a bit analysis is required.
+ */
+ case AUE_JAIL_GET:
+ case AUE_JAIL_SET:
+ case AUE_JAIL_ATTACH:
+ case AUE_JAIL_REMOVE:
+ break;
+
case AUE_LUTIMES:
case AUE_NFS_GETFH:
case AUE_LGETFH:
@@ -1472,6 +1485,9 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_rec
tok = au_to_text(ar->ar_arg_login);
kau_write(rec, tok);
}
+ break;
+
+ case AUE_SETLOGINCLASS:
break;
case AUE_SETPRIORITY:
More information about the svn-src-head
mailing list