From owner-p4-projects@FreeBSD.ORG Sat Feb 4 16:09:57 2006 Return-Path: X-Original-To: p4-projects@freebsd.org Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 4D14316A423; Sat, 4 Feb 2006 16:09:57 +0000 (GMT) X-Original-To: perforce@freebsd.org Delivered-To: perforce@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id ED97816A420 for ; Sat, 4 Feb 2006 16:09:56 +0000 (GMT) (envelope-from wsalamon@computer.org) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id B26CE44644 for ; Sat, 4 Feb 2006 16:09:56 +0000 (GMT) (envelope-from wsalamon@computer.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.1/8.13.1) with ESMTP id k14G9uNI021143 for ; Sat, 4 Feb 2006 16:09:56 GMT (envelope-from wsalamon@computer.org) Received: (from perforce@localhost) by repoman.freebsd.org (8.13.1/8.13.1/Submit) id k14G9ucx021140 for perforce@freebsd.org; Sat, 4 Feb 2006 16:09:56 GMT (envelope-from wsalamon@computer.org) Date: Sat, 4 Feb 2006 16:09:56 GMT Message-Id: <200602041609.k14G9ucx021140@repoman.freebsd.org> X-Authentication-Warning: repoman.freebsd.org: perforce set sender to wsalamon@computer.org using -f From: Wayne Salamon To: Perforce Change Reviews Cc: Subject: PERFORCE change 91074 for review X-BeenThere: p4-projects@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: p4 projects tree changes List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 04 Feb 2006 16:09:58 -0000 http://perforce.freebsd.org/chv.cgi?CH=91074 Change 91074 by wsalamon@gretsch on 2006/02/04 16:09:08 Updated list of audited system calls, with some additional notes. Affected files ... .. //depot/projects/trustedbsd/audit3/notes/syscall_audit.tsv#4 edit Differences ... ==== //depot/projects/trustedbsd/audit3/notes/syscall_audit.tsv#4 (text+ko) ==== @@ -7,9 +7,12 @@ # Field 5 -> Comments # # For many of the fd-based ops, will need to create an attr token when vnode -# is available. If an audited arg is followed by ?, need to decide whether to -# audit. For some calls, the returned fd(s) probably should be audited because -# pathname auditing for fd-based calls isn't reliable, so auditing the +# is available. We will also audit the file decriptor to allow for +# easier tracing through the log file, even though the attr token contains the +# file ID. +# If an audited arg is followed by ?, need to decide whether to audit +# For some calls, the returned fd(s) probably should be audited because +# pathname auditing for fd-based calls isn't done, therefore auditing the # returned fd at time of creation (open, etc.) should be done so later calls # can be traced back to a path in the audit trail. # @@ -28,14 +31,14 @@ SYS_unlink 10 Y Y path, attr SYS_chdir 12 Y Y -SYS_fchdir 13 Y N path; should fd be audited? -SYS_mknod 14 Y N mode, dev, path +SYS_fchdir 13 Y Y attr, fd +SYS_mknod 14 Y Y mode, dev, path SYS_chmod 15 Y Y mode, path SYS_chown 16 Y Y uid, gid, path SYS_break 17 N N SYS_getpid 20 N N -SYS_mount 21 Y N type, dir, flagsr; data? +SYS_mount 21 Y N type, dir, flags SYS_unmount 22 Y N dir, flags SYS_setuid 23 Y N uid SYS_getuid 24 N N @@ -49,7 +52,7 @@ SYS_getsockname 32 ? N if audited: s, name; namelen? SYS_access 33 Y N path, mode SYS_chflags 34 Y Y path, flags, attr -SYS_fchflags 35 Y Y fd, fflags +SYS_fchflags 35 Y Y fd, attr, fflags SYS_sync 36 Y N SYS_kill 37 Y N pid, sig @@ -75,7 +78,7 @@ SYS_readlink 58 Y N path, buf, bufsiz SYS_execve 59 Y N path, argv, envp? SYS_umask 60 Y N numask -SYS_chroot 61 Y N dirname +SYS_chroot 61 Y Y dirname SYS_old.fstat 62 ? N SYS_old.getkerninfo 63 N N @@ -109,7 +112,7 @@ SYS_dup2 90 N N SYS_fcntl 92 Y N SYS_select 93 N N -SYS_fsync 95 Y N +SYS_fsync 95 Y Y fd, attr SYS_setpriority 96 Y N SYS_socket 97 Y N SYS_connect 98 Y N @@ -126,14 +129,14 @@ SYS_readv 120 N N SYS_writev 121 N N SYS_settimeofday 122 Y N -SYS_fchown 123 Y Y -SYS_fchmod 124 Y Y +SYS_fchown 123 Y Y fd, attr, new uid, new gid +SYS_fchmod 124 Y Y fd, attr, new mode SYS_setreuid 126 Y N SYS_setregid 127 Y N SYS_rename 128 Y N -SYS_flock 131 Y N +SYS_flock 131 Y N fd, operation, addr SYS_mkfifo 132 Y N SYS_sendto 133 Y N SYS_shutdown 134 Y N @@ -206,8 +209,8 @@ SYS_issetugid 253 N N SYS_lchown 254 Y Y SYS_getdents 272 Y N -SYS_lchmod 274 Y Y -SYS_netbsd_lchown 275 Y N +SYS_lchmod 274 Y Y path, attr, new mode +SYS_netbsd_lchown 275 Y N path, attr, new mode SYS_lutimes 276 Y N SYS_netbsd_msync 277 N N file writes are not audited SYS_nstat 278 Y Y @@ -284,7 +287,7 @@ SYS___setugid 374 ? N SYS_nfsclnt 375 ? N SYS_eaccess 376 ? N -SYS_nmount 378 Y N +SYS_nmount 378 Y Y iovec strings audited SYS_kse_exit 379 ? N SYS_kse_wakeup 380 ? N SYS_kse_create 381 ? N