PERFORCE change 45389 for review
Robert Watson
rwatson at FreeBSD.org
Thu Jan 15 15:47:29 GMT 2004
http://perforce.freebsd.org/chv.cgi?CH=45389
Change 45389 by rwatson at rwatson_tislabs on 2004/01/15 07:47:02
Switch audit system calls to MNOSTD as we want to be able to
compile the kernel without Audit support without stubs. Also,
we may want to make Audit a module.
Affected files ...
.. //depot/projects/trustedbsd/audit2/sys/kern/init_sysent.c#6 edit
.. //depot/projects/trustedbsd/audit2/sys/kern/syscalls.c#6 edit
.. //depot/projects/trustedbsd/audit2/sys/kern/syscalls.master#6 edit
.. //depot/projects/trustedbsd/audit2/sys/sys/syscall.h#6 edit
.. //depot/projects/trustedbsd/audit2/sys/sys/syscall.mk#6 edit
.. //depot/projects/trustedbsd/audit2/sys/sys/sysproto.h#6 edit
Differences ...
==== //depot/projects/trustedbsd/audit2/sys/kern/init_sysent.c#6 (text+ko) ====
@@ -469,14 +469,14 @@
{ AS(extattr_list_file_args), (sy_call_t *)extattr_list_file }, /* 438 = extattr_list_file */
{ AS(extattr_list_link_args), (sy_call_t *)extattr_list_link }, /* 439 = extattr_list_link */
{ SYF_MPSAFE | AS(kse_switchin_args), (sy_call_t *)kse_switchin }, /* 440 = kse_switchin */
- { SYF_MPSAFE | AS(audit_args), (sy_call_t *)audit }, /* 441 = audit */
- { SYF_MPSAFE | AS(auditon_args), (sy_call_t *)auditon }, /* 442 = auditon */
- { SYF_MPSAFE | AS(auditsvc_args), (sy_call_t *)auditsvc }, /* 443 = auditsvc */
- { SYF_MPSAFE | AS(getauid_args), (sy_call_t *)getauid }, /* 444 = getauid */
- { SYF_MPSAFE | AS(setauid_args), (sy_call_t *)setauid }, /* 445 = setauid */
- { SYF_MPSAFE | AS(getaudit_args), (sy_call_t *)getaudit }, /* 446 = getaudit */
- { SYF_MPSAFE | AS(setaudit_args), (sy_call_t *)setaudit }, /* 447 = setaudit */
- { SYF_MPSAFE | AS(getaudit_addr_args), (sy_call_t *)getaudit_addr }, /* 448 = getaudit_addr */
- { SYF_MPSAFE | AS(setaudit_addr_args), (sy_call_t *)setaudit_addr }, /* 449 = setaudit_addr */
- { SYF_MPSAFE | AS(auditctl_args), (sy_call_t *)auditctl }, /* 450 = auditctl */
+ { SYF_MPSAFE | AS(audit_args), (sy_call_t *)lkmressys }, /* 441 = audit */
+ { SYF_MPSAFE | AS(auditon_args), (sy_call_t *)lkmressys }, /* 442 = auditon */
+ { SYF_MPSAFE | AS(auditsvc_args), (sy_call_t *)lkmressys }, /* 443 = auditsvc */
+ { SYF_MPSAFE | AS(getauid_args), (sy_call_t *)lkmressys }, /* 444 = getauid */
+ { SYF_MPSAFE | AS(setauid_args), (sy_call_t *)lkmressys }, /* 445 = setauid */
+ { SYF_MPSAFE | AS(getaudit_args), (sy_call_t *)lkmressys }, /* 446 = getaudit */
+ { SYF_MPSAFE | AS(setaudit_args), (sy_call_t *)lkmressys }, /* 447 = setaudit */
+ { SYF_MPSAFE | AS(getaudit_addr_args), (sy_call_t *)lkmressys }, /* 448 = getaudit_addr */
+ { SYF_MPSAFE | AS(setaudit_addr_args), (sy_call_t *)lkmressys }, /* 449 = setaudit_addr */
+ { SYF_MPSAFE | AS(auditctl_args), (sy_call_t *)lkmressys }, /* 450 = auditctl */
};
==== //depot/projects/trustedbsd/audit2/sys/kern/syscalls.c#6 (text+ko) ====
==== //depot/projects/trustedbsd/audit2/sys/kern/syscalls.master#6 (text+ko) ====
@@ -627,17 +627,17 @@
int attrnamespace, void *data, size_t nbytes); }
440 MSTD { int kse_switchin(const struct __mcontext *mcp, \
long val, long *loc); }
-441 MSTD { int audit(const void *record, u_int length); }
-442 MSTD { int auditon(int cmd, void *data, u_int length); }
-443 MSTD { int auditsvc(int fd, int limit); }
-444 MSTD { int getauid(uid_t *auid); }
-445 MSTD { int setauid(uid_t *auid); }
-446 MSTD { int getaudit(struct auditinfo *auditinfo); }
-447 MSTD { int setaudit(struct auditinfo *auditinfo); }
-448 MSTD { int getaudit_addr(struct auditinfo_addr \
+441 MNOSTD { int audit(const void *record, u_int length); }
+442 MNOSTD { int auditon(int cmd, void *data, u_int length); }
+443 MNOSTD { int auditsvc(int fd, int limit); }
+444 MNOSTD { int getauid(uid_t *auid); }
+445 MNOSTD { int setauid(uid_t *auid); }
+446 MNOSTD { int getaudit(struct auditinfo *auditinfo); }
+447 MNOSTD { int setaudit(struct auditinfo *auditinfo); }
+448 MNOSTD { int getaudit_addr(struct auditinfo_addr \
*auditinfo_addr, u_int length); }
-449 MSTD { int setaudit_addr(struct auditinfo_addr \
+449 MNOSTD { int setaudit_addr(struct auditinfo_addr \
*auditinfo_addr, u_int length); }
-450 MSTD { int auditctl(char *path); }
+450 MNOSTD { int auditctl(char *path); }
; Please copy any additions and changes to the following compatability tables:
; sys/compat/freebsd32/syscalls.master
==== //depot/projects/trustedbsd/audit2/sys/sys/syscall.h#6 (text+ko) ====
==== //depot/projects/trustedbsd/audit2/sys/sys/syscall.mk#6 (text+ko) ====
==== //depot/projects/trustedbsd/audit2/sys/sys/sysproto.h#6 (text+ko) ====
To Unsubscribe: send mail to majordomo at trustedbsd.org
with "unsubscribe trustedbsd-cvs" in the body of the message
More information about the trustedbsd-cvs
mailing list