PERFORCE change 160213 for review

Christian S.J. Peron csjp at FreeBSD.org
Sat Apr 4 13:44:19 PDT 2009


http://perforce.freebsd.org/chv.cgi?CH=160213

Change 160213 by csjp at hvm02 on 2009/04/04 20:43:34

	- Fix code example in man page
	- make it clear we are after the audit id

Affected files ...

.. //depot/projects/trustedbsd/openbsm/NEWS#38 edit
.. //depot/projects/trustedbsd/openbsm/libbsm/audit_submit.3#16 edit

Differences ...

==== //depot/projects/trustedbsd/openbsm/NEWS#38 (text+ko) ====

@@ -13,6 +13,8 @@
   definitions of constants in audit_fcntl.h.
 - A bug, introduced in OpenBSM 1.1 alpha 4, in which AUT_RETURN32 tokens
   generated by audit_submit(3) were improperly encoded has been fixed.
+- Fix example in audit_submit(3) man page.  Also, make it clear that we want
+  the audit ID as the argument.
 
 OpenBSM 1.1 beta 1
 
@@ -445,4 +447,4 @@
   to support reloading of kernel event table.
 - Allow comments in /etc/security configuration files.
 
-$P4: //depot/projects/trustedbsd/openbsm/NEWS#37 $
+$P4: //depot/projects/trustedbsd/openbsm/NEWS#38 $

==== //depot/projects/trustedbsd/openbsm/libbsm/audit_submit.3#16 (text+ko) ====

@@ -27,7 +27,7 @@
 .\" IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 .\" POSSIBILITY OF SUCH DAMAGE.
 .\"
-.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/audit_submit.3#15 $
+.\" $P4: //depot/projects/trustedbsd/openbsm/libbsm/audit_submit.3#16 $
 .\"
 .Dd January 18, 2008
 .Dt audit_submit 3
@@ -101,9 +101,12 @@
 int
 audit_bad_su(char *from_login, char *to_login)
 {
+	struct auditinfo_addr aia;
 	int error;
 
-	error = audit_submit(AUE_su, getuid(), 1, EPERM,
+	if (getaudit_addr(&aia, sizeof(aia) < 0)
+		err(1, "getaudit_addr");
+	error = audit_submit(AUE_su, aia.ai_auid, EPERM, 1,
 	    "bad su from %s to %s", from_login, to_login);
 	return (error);
 }


More information about the p4-projects mailing list