aboutsummaryrefslogtreecommitdiff
path: root/sys/security
diff options
context:
space:
mode:
authorChristian S.J. Peron <csjp@FreeBSD.org>2020-02-29 19:17:24 +0000
committerChristian S.J. Peron <csjp@FreeBSD.org>2020-02-29 19:17:24 +0000
commit1018b2ff0088d7968ec2567405728fab4a3065da (patch)
tree1f4af970d64202fb0829bd2c43023e567cb6e5be /sys/security
parent5aa5420ff2e8cfdcfb16316a8978db185f8891a2 (diff)
downloadsrc-1018b2ff0088d7968ec2567405728fab4a3065da.tar.gz
src-1018b2ff0088d7968ec2567405728fab4a3065da.zip
Currently kernel audit events for jail_set(2), jail_get(2), jail_attach(2),
jail_remove(2) and finally setloginclass(2) are not being converted and committed into userspace. Add the cases for these syscalls and make sure they are being converted properly. Reviewed by: bz, kevans MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D23882
Notes
Notes: svn path=/head/; revision=358471
Diffstat (limited to 'sys/security')
-rw-r--r--sys/security/audit/audit_bsm.c16
1 files changed, 16 insertions, 0 deletions
diff --git a/sys/security/audit/audit_bsm.c b/sys/security/audit/audit_bsm.c
index 3ff90b68a708..c5a112fcffc8 100644
--- a/sys/security/audit/audit_bsm.c
+++ b/sys/security/audit/audit_bsm.c
@@ -809,6 +809,19 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_record **pau)
case AUE_FUTIMESAT:
case AUE_GETATTRLIST:
case AUE_JAIL:
+ break;
+
+ /*
+ * NB: We may want to verify that the appropriate
+ * audit args are being processed here, but I think
+ * a bit analysis is required.
+ */
+ case AUE_JAIL_GET:
+ case AUE_JAIL_SET:
+ case AUE_JAIL_ATTACH:
+ case AUE_JAIL_REMOVE:
+ break;
+
case AUE_LUTIMES:
case AUE_NFS_GETFH:
case AUE_LGETFH:
@@ -1474,6 +1487,9 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_record **pau)
}
break;
+ case AUE_SETLOGINCLASS:
+ break;
+
case AUE_SETPRIORITY:
if (ARG_IS_VALID(kar, ARG_CMD)) {
tok = au_to_arg32(1, "which", ar->ar_arg_cmd);