aboutsummaryrefslogtreecommitdiff
path: root/bin
diff options
context:
space:
mode:
authorChristian S.J. Peron <csjp@FreeBSD.org>2007-06-27 17:01:15 +0000
committerChristian S.J. Peron <csjp@FreeBSD.org>2007-06-27 17:01:15 +0000
commitcac465aa7f2ffef15bd286f0fe0908e4d740361b (patch)
treeff21f1ad4087308d421c4f0f749dd35dbdc69f8f /bin
parentf074250999d972861903427f18eb6dbc6d7e813a (diff)
downloadsrc-cac465aa7f2ffef15bd286f0fe0908e4d740361b.tar.gz
src-cac465aa7f2ffef15bd286f0fe0908e4d740361b.zip
- Add audit_arg_audinfo_addr() for auditing the arguments for setaudit_addr(2)
- In audit_bsm.c, make sure all the arguments: ARG_AUID, ARG_ASID, ARG_AMASK, and ARG_TERMID{_ADDR} are valid before auditing their arguments. (This is done for both setaudit and setaudit_addr. - Audit the arguments passed to setaudit_addr(2) - AF_INET6 does not equate to AU_IPv6. Change this in au_to_in_addr_ex() so the audit token is created with the correct type. This fixes the processing of the in_addr_ex token in users pace. - Change the size of the token (as generated by the kernel) from 5*4 bytes to 4*4 bytes (the correct size of an ip6 address) - Correct regression from ucred work which resulted in getaudit() not returning E2BIG if the subject had an ip6 termid - Correct slight regression in getaudit(2) which resulted in the size of a pointer being passed instead of the size of the structure. (This resulted in invalid auditinfo data being returned via getaudit(2)) Reviewed by: rwatson Approved by: re@ (kensmith) Obtained from: TrustedBSD Project MFC after: 1 month
Notes
Notes: svn path=/head/; revision=171066
Diffstat (limited to 'bin')
0 files changed, 0 insertions, 0 deletions