From owner-p4-projects@FreeBSD.ORG Sun Feb 5 17:01:20 2006 Return-Path: X-Original-To: p4-projects@freebsd.org Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 672F616A423; Sun, 5 Feb 2006 17:01:20 +0000 (GMT) X-Original-To: perforce@freebsd.org Delivered-To: perforce@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2574416A420 for ; Sun, 5 Feb 2006 17:01:20 +0000 (GMT) (envelope-from wsalamon@computer.org) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id E712743D49 for ; Sun, 5 Feb 2006 17:01:19 +0000 (GMT) (envelope-from wsalamon@computer.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.1/8.13.1) with ESMTP id k15H1Jdd055894 for ; Sun, 5 Feb 2006 17:01:19 GMT (envelope-from wsalamon@computer.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.13.1/8.13.1/Submit) id k15H1JWp055891 for perforce@freebsd.org; Sun, 5 Feb 2006 17:01:19 GMT (envelope-from wsalamon@computer.org) Date: Sun, 5 Feb 2006 17:01:19 GMT Message-Id: <200602051701.k15H1JWp055891@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to wsalamon@computer.org using -f From: Wayne Salamon To: Perforce Change Reviews Cc: Subject: PERFORCE change 91166 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 05 Feb 2006 17:01:21 -0000 http://perforce.freebsd.org/chv.cgi?CH=91166 Change 91166 by wsalamon@gretsch on 2006/02/05 17:00:44 Test code library now loads the kernel event->class mapping. Affected files ... .. //depot/projects/trustedbsd/audit3/notes/TODO_audit.txt#4 edit Differences ... ==== //depot/projects/trustedbsd/audit3/notes/TODO_audit.txt#4 (text+ko) ==== @@ -59,9 +59,6 @@ - Write some utility apps to query the state of auditing, manipulate the audit event table in the kernel, and other useful things. -- Add a function to the audit test library to load the kernel event->class -mapping so auditd need not be run before testing. - - Expand the subject token to include jail information. Add this informtion for processes that are running in a jail.