Date: Sat, 29 Feb 2020 19:17:25 +0000 (UTC) From: "Christian S.J. Peron" <csjp@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r358471 - head/sys/security/audit Message-ID: <202002291917.01TJHPoO068197@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: csjp Date: Sat Feb 29 19:17:24 2020 New Revision: 358471 URL: https://svnweb.freebsd.org/changeset/base/358471 Log: Currently kernel audit events for jail_set(2), jail_get(2), jail_attach(2), jail_remove(2) and finally setloginclass(2) are not being converted and committed into userspace. Add the cases for these syscalls and make sure they are being converted properly. Reviewed by: bz, kevans MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D23882 Modified: head/sys/security/audit/audit_bsm.c Modified: head/sys/security/audit/audit_bsm.c ============================================================================== --- head/sys/security/audit/audit_bsm.c Sat Feb 29 18:41:48 2020 (r358470) +++ head/sys/security/audit/audit_bsm.c Sat Feb 29 19:17:24 2020 (r358471) @@ -809,6 +809,19 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_rec case AUE_FUTIMESAT: case AUE_GETATTRLIST: case AUE_JAIL: + break; + + /* + * NB: We may want to verify that the appropriate + * audit args are being processed here, but I think + * a bit analysis is required. + */ + case AUE_JAIL_GET: + case AUE_JAIL_SET: + case AUE_JAIL_ATTACH: + case AUE_JAIL_REMOVE: + break; + case AUE_LUTIMES: case AUE_NFS_GETFH: case AUE_LGETFH: @@ -1472,6 +1485,9 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_rec tok = au_to_text(ar->ar_arg_login); kau_write(rec, tok); } + break; + + case AUE_SETLOGINCLASS: break; case AUE_SETPRIORITY:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202002291917.01TJHPoO068197>
