svn commit: r358471 - head/sys/security/audit

Christian S.J. Peron csjp at FreeBSD.org
Sat Feb 29 19:17:26 UTC 2020


Author: csjp
Date: Sat Feb 29 19:17:24 2020
New Revision: 358471
URL: https://svnweb.freebsd.org/changeset/base/358471

Log:
  Currently kernel audit events for jail_set(2), jail_get(2), jail_attach(2),
  jail_remove(2) and finally setloginclass(2) are not being converted and
  committed into userspace. Add the cases for these syscalls and make sure
  they are being converted properly.
  
  Reviewed by:	bz, kevans
  MFC after:	1 week
  Differential Revision:	https://reviews.freebsd.org/D23882

Modified:
  head/sys/security/audit/audit_bsm.c

Modified: head/sys/security/audit/audit_bsm.c
==============================================================================
--- head/sys/security/audit/audit_bsm.c	Sat Feb 29 18:41:48 2020	(r358470)
+++ head/sys/security/audit/audit_bsm.c	Sat Feb 29 19:17:24 2020	(r358471)
@@ -809,6 +809,19 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_rec
 	case AUE_FUTIMESAT:
 	case AUE_GETATTRLIST:
 	case AUE_JAIL:
+		break;
+
+	/*
+	 * NB: We may want to verify that the appropriate
+	 * audit args are being processed here, but I think
+	 * a bit analysis is required.
+	 */
+	case AUE_JAIL_GET:
+	case AUE_JAIL_SET:
+	case AUE_JAIL_ATTACH:
+	case AUE_JAIL_REMOVE:
+		break;
+
 	case AUE_LUTIMES:
 	case AUE_NFS_GETFH:
 	case AUE_LGETFH:
@@ -1472,6 +1485,9 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_rec
 			tok = au_to_text(ar->ar_arg_login);
 			kau_write(rec, tok);
 		}
+		break;
+
+	case AUE_SETLOGINCLASS:
 		break;
 
 	case AUE_SETPRIORITY:


More information about the svn-src-all mailing list