This revision introduces test cases for System V standardized system calls concerned
with creating and manipulating semaphore sets. These system calls are categorized
within inter-process-communication audit class (as expected).
System calls in question are:
- semget(2)
- semop(2)
- semctl(2)
Note:
semctl(2) takes as argument a cmd which is a separate audit event in itself.
List of semctl(2) audit events:
- AUE_SEMCTL [Illegal Command]
- AUE_SEMCTL_GETALL
- AUE_SEMCTL_GETNCNT
- AUE_SEMCTL_GETZCNT
- AUE_SEMCTL_GETPID
- AUE_SEMCTL_GETVAL
- AUE_SEMCTL_SETALL
- AUE_SEMCTL_SETVAL
- AUE_SEMCTL_STAT
- AUE_SEMCTL_RMID
- AUE_SEMCTL_SET
For full details, please see: sys/security/audit/audit_bsm_klib.c#L271
Each of them have been treated as separate audit events. (And hence, separate tests)