diff options
author | rwatson <rwatson@FreeBSD.org> | 2006-09-25 11:40:29 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2006-09-25 11:40:29 +0000 |
commit | 6b46b736cc84f6697b21608e304026e847ac155d (patch) | |
tree | 923fed11093f1a6d233a2a592922f126f5d88228 /contrib/openbsm/etc | |
parent | 3fc61fcaeb6c4f73a668795461e276064f449f38 (diff) | |
download | FreeBSD-src-6b46b736cc84f6697b21608e304026e847ac155d.zip FreeBSD-src-6b46b736cc84f6697b21608e304026e847ac155d.tar.gz |
Vendor import TrustedBSD OpenBSM 1.0 alpha 12, with the following change
history notes since the last import:
OpenBSM 1.0 alpha 12
- Correct bug in auditreduce which prevented the -c option from working
correctly when the user specifies to process successful or failed events.
The problem stemmed from not having access to the return token at the time
the initial preselection occurred, but now a second preselection process
occurs while processing the return token.
- getacfilesz(3) API added to read new audit_control(5) filesz setting,
which auditd(8) now sets the kernel audit trail rotation size to.
- auditreduce(1) now uses stdin if no file names are specified on the command
line; this was the documented behavior previously, but it was not
implemented. Be more specific in auditreduce(1)'s examples section about
what might be done with the output of auditreduce.
- Add audit_warn(5) closefile event so that administrators can hook
termination of an audit trail file. For example, this might be used to
compress the trail file after it is closed.
- auditreduce(1) now uses regular expressions for pathname matching. Users can
now supply one or more (comma delimited) regular expressions for searching
the pathnames. If one of the regular expressions is prefixed with a tilde
(~), and a path matches, it will be excluded from the search results.
MFC after: 3 days
Obtained from: TrustedBSD Project
Diffstat (limited to 'contrib/openbsm/etc')
-rw-r--r-- | contrib/openbsm/etc/audit_control | 3 | ||||
-rw-r--r-- | contrib/openbsm/etc/audit_event | 6 |
2 files changed, 7 insertions, 2 deletions
diff --git a/contrib/openbsm/etc/audit_control b/contrib/openbsm/etc/audit_control index 2db3e1f..a350e50 100644 --- a/contrib/openbsm/etc/audit_control +++ b/contrib/openbsm/etc/audit_control @@ -1,8 +1,9 @@ # -# $P4: //depot/projects/trustedbsd/openbsm/etc/audit_control#4 $ +# $P4: //depot/projects/trustedbsd/openbsm/etc/audit_control#5 $ # dir:/var/audit flags:lo minfree:20 naflags:lo policy:cnt +filesz:0 diff --git a/contrib/openbsm/etc/audit_event b/contrib/openbsm/etc/audit_event index 346dff7..fcc89fc 100644 --- a/contrib/openbsm/etc/audit_event +++ b/contrib/openbsm/etc/audit_event @@ -1,5 +1,5 @@ # -# $P4: //depot/projects/trustedbsd/openbsm/etc/audit_event#15 $ +# $P4: //depot/projects/trustedbsd/openbsm/etc/audit_event#16 $ # 0:AUE_NULL:indir system call:no 1:AUE_EXIT:exit(2):pc @@ -418,6 +418,10 @@ 43114:AUE_KENV:kenv(8):ad 43115:AUE_JAIL_ATTACH:jail_attach(2):ad 43116:AUE_SYSCTL_WRITE:sysctl(3):ad +43117:AUE_IOPERM:linux ioperm:ad +43118:AUE_READDIR:readdir(3):no +43119:AUE_IOPL:linux iopl:ad +43120:AUE_VM86:linux vm86:pc # # User space system events. # |