From owner-svn-src-head@freebsd.org Thu Oct 4 07:56:38 2018 Return-Path: Delivered-To: svn-src-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CB1EE10C3481; Thu, 4 Oct 2018 07:56:38 +0000 (UTC) (envelope-from rwatson@FreeBSD.org) Received: from cyrus.watson.org (cyrus.watson.org [204.107.128.30]) by mx1.freebsd.org (Postfix) with ESMTP id 69AD988E6C; Thu, 4 Oct 2018 07:56:38 +0000 (UTC) (envelope-from rwatson@FreeBSD.org) Received: from [10.0.1.4] (host81-132-222-21.range81-132.btcentralplus.com [81.132.222.21]) by cyrus.watson.org (Postfix) with ESMTPSA id 6AE60C1420; Thu, 4 Oct 2018 07:56:37 +0000 (UTC) Mime-Version: 1.0 (1.0) Subject: Re: svn commit: r339085 - head/sys/security/audit From: "Robert N. M. Watson" X-Mailer: iPad Mail (15G77) In-Reply-To: Date: Thu, 4 Oct 2018 08:56:32 +0100 Cc: Robert Watson , src-committers , svn-src-all , svn-src-head Message-Id: References: <201810021558.w92FwHBp025418@repo.freebsd.org> To: Alan Somers Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.27 X-BeenThere: svn-src-head@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: SVN commit messages for the src tree for head/-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 04 Oct 2018 07:56:39 -0000 On 2 Oct 2018, at 18:15, Alan Somers wrote: >> 3. Remove a check of trail enablement/suspension from audit_new() -- >> at the point where this function has been entered, we believe that >> system-call auditing is already in force, or we wouldn't get here, >> so simply proceed to more expensive policy checks. >=20 > Did you check the logic around audit_proc_coredump too? I think this chan= ge will cause AUE_CORE events to be emitted even when auditing is disabled. This should be caught by audit_commit(), although it probably would be sligh= tly preferable for audit_proc_coredump() to have an explicit policy check ea= rlier, avoiding a memory allocation (but not a big deal). Robert=