diff options
author | Alan Somers <asomers@FreeBSD.org> | 2018-07-22 14:11:52 +0000 |
---|---|---|
committer | Alan Somers <asomers@FreeBSD.org> | 2018-07-22 14:11:52 +0000 |
commit | 12395dc9f6bfd1e40ac41ef8fb6af966ad647a2e (patch) | |
tree | fc651543424d55df649bb505101aabb0e4637e88 /sys/security/audit | |
parent | 002d00355c5121c4af4adb34c57a5e50c15f7737 (diff) | |
download | src-12395dc9f6bfd1e40ac41ef8fb6af966ad647a2e.tar.gz src-12395dc9f6bfd1e40ac41ef8fb6af966ad647a2e.zip |
Fix audit of chflagsat, lgetfh, and setfib
These syscalls were always supposed to have been auditted, but due to
oversights never were.
PR: 228374
Reported by: aniketp
Reviewed by: aniketp
MFC after: 2 weeks
Differential Revision: https://reviews.freebsd.org/D16388
Notes
Notes:
svn path=/head/; revision=336604
Diffstat (limited to 'sys/security/audit')
-rw-r--r-- | sys/security/audit/audit_bsm.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/sys/security/audit/audit_bsm.c b/sys/security/audit/audit_bsm.c index 8f3d4a96bcc5..fa5589bd2f56 100644 --- a/sys/security/audit/audit_bsm.c +++ b/sys/security/audit/audit_bsm.c @@ -770,6 +770,7 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_record **pau) case AUE_PROFILE: case AUE_RTPRIO: case AUE_SEMSYS: + case AUE_SETFIB: case AUE_SHMSYS: case AUE_SETPGRP: case AUE_SETRLIMIT: @@ -810,6 +811,7 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_record **pau) case AUE_JAIL: case AUE_LUTIMES: case AUE_NFS_GETFH: + case AUE_LGETFH: case AUE_LSTAT: case AUE_LPATHCONF: case AUE_PATHCONF: @@ -851,6 +853,7 @@ kaudit_to_bsm(struct kaudit_record *kar, struct au_record **pau) case AUE_CHFLAGS: case AUE_LCHFLAGS: + case AUE_CHFLAGSAT: if (ARG_IS_VALID(kar, ARG_FFLAGS)) { tok = au_to_arg32(2, "flags", ar->ar_arg_fflags); kau_write(rec, tok); |