Page MenuHomeFreeBSD

D16388.id45671.diff
No OneTemporary

D16388.id45671.diff

Index: sys/security/audit/audit_bsm.c
===================================================================
--- sys/security/audit/audit_bsm.c
+++ sys/security/audit/audit_bsm.c
@@ -770,6 +770,7 @@
case AUE_PROFILE:
case AUE_RTPRIO:
case AUE_SEMSYS:
+ case AUE_SETFIB:
case AUE_SHMSYS:
case AUE_SETPGRP:
case AUE_SETRLIMIT:
@@ -810,6 +811,7 @@
case AUE_JAIL:
case AUE_LUTIMES:
case AUE_NFS_GETFH:
+ case AUE_LGETFH:
case AUE_LSTAT:
case AUE_LPATHCONF:
case AUE_PATHCONF:
@@ -851,6 +853,7 @@
case AUE_CHFLAGS:
case AUE_LCHFLAGS:
+ case AUE_CHFLAGSAT:
if (ARG_IS_VALID(kar, ARG_FFLAGS)) {
tok = au_to_arg32(2, "flags", ar->ar_arg_fflags);
kau_write(rec, tok);
Index: tests/sys/audit/file-attribute-access.c
===================================================================
--- tests/sys/audit/file-attribute-access.c
+++ tests/sys/audit/file-attribute-access.c
@@ -383,9 +383,6 @@
ATF_TC_BODY(lgetfh_success, tc)
{
- /* BSM conversion requested for unknown event 43061 */
- atf_tc_expect_fail("PR 228374: lgetfh(2) does not get audited in success mode");
-
/* Symbolic link needs to exist to get a file-handle */
ATF_REQUIRE_EQ(0, symlink("symlink", path));
const char *regex = "lgetfh.*return,success";
@@ -409,9 +406,6 @@
ATF_TC_BODY(lgetfh_failure, tc)
{
- /* BSM conversion requested for unknown event 43061 */
- atf_tc_expect_fail("PR 228374: lgetfh(2) does not get audited in failure mode");
-
const char *regex = "lgetfh.*return,failure";
FILE *pipefd = setup(fds, "fa");
/* Failure reason: symbolic link does not exist */
Index: tests/sys/audit/file-attribute-modify.c
===================================================================
--- tests/sys/audit/file-attribute-modify.c
+++ tests/sys/audit/file-attribute-modify.c
@@ -701,9 +701,6 @@
ATF_TC_BODY(chflagsat_success, tc)
{
- /* BSM conversion requested for unknown event 43209 */
- atf_tc_expect_fail("PR 228374: chflagsat(2) does not get audited in success mode");
-
/* File needs to exist to call chflagsat(2) */
ATF_REQUIRE((filedesc = open(path, O_CREAT, mode)) != -1);
FILE *pipefd = setup(fds, auclass);
@@ -727,9 +724,6 @@
ATF_TC_BODY(chflagsat_failure, tc)
{
- /* BSM conversion requested for unknown event 43209 */
- atf_tc_expect_fail("PR 228374: chflagsat(2) does not get audited in failure mode");
-
FILE *pipefd = setup(fds, auclass);
/* Failure reason: file does not exist */
ATF_REQUIRE_EQ(-1, chflagsat(AT_FDCWD, errpath, SF_IMMUTABLE, 0));
Index: tests/sys/audit/network.c
===================================================================
--- tests/sys/audit/network.c
+++ tests/sys/audit/network.c
@@ -1097,9 +1097,6 @@
ATF_TC_BODY(setfib_success, tc)
{
- /* BSM conversion requested for unknown event 43228 */
- atf_tc_expect_fail("PR 228374: setfib(2) does not get audited in success mode");
-
pid = getpid();
snprintf(extregex, sizeof(extregex), "setfib.*%d.*return,success", pid);
@@ -1123,9 +1120,6 @@
ATF_TC_BODY(setfib_failure, tc)
{
- /* BSM conversion requested for unknown event 43228 */
- atf_tc_expect_fail("PR 228374: setfib(2) does not get audited in failure mode");
-
pid = getpid();
snprintf(extregex, sizeof(extregex), "setfib.*%d.*return,failure", pid);

File Metadata

Mime Type
text/plain
Expires
Mon, Apr 6, 8:44 AM (55 m, 36 s)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
30952481
Default Alt Text
D16388.id45671.diff (3 KB)

Event Timeline