#
abd39811 |
| 01-Oct-2024 |
Olivier Certner <olce@FreeBSD.org> |
cred: kern_setgroups(): Internally use int as number of groups' type
sys_setgroups() (and sys_getgroups()) was changed in commit "kern: fail getgroup and setgroup with negative int" (4bc2174a1b48) t
cred: kern_setgroups(): Internally use int as number of groups' type
sys_setgroups() (and sys_getgroups()) was changed in commit "kern: fail getgroup and setgroup with negative int" (4bc2174a1b48) to take the number of groups as an 'int' (for sys_getgroups(), POSIX mandates this change; for sys_setgroups(), which it does not standardize, it's arguably for consistency).
All our internal APIs related to groups on 'struct ucred', as well as related members on the latter, treat that number as an 'int' as well (and not a 'u_int').
Consequently, to avoid surprises, change kern_setgroups() to behave the same, and fix audit_arg_groupset() accordingly. With that change, everything is handled with signed integers internally.
Update sanity checks accordingly.
Reviewed by: mhorne Approved by: markj (mentor) MFC after: 3 days Differential Revision: https://reviews.freebsd.org/D46912
show more ...
|
Revision tags: release/13.4.0, release/14.1.0, release/13.3.0, release/14.0.0 |
|
#
95ee2897 |
| 16-Aug-2023 |
Warner Losh <imp@FreeBSD.org> |
sys: Remove $FreeBSD$: two-line .h pattern
Remove /^\s*\*\n \*\s+\$FreeBSD\$$\n/
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0, release/13.0.0 |
|
#
08a5615c |
| 17-Dec-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
audit: rework AUDIT_SYSCLOSE
This in particular avoids spurious lookups on close.
|
Revision tags: release/12.2.0 |
|
#
8e5679aa |
| 04-Jul-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
audit: provide AUDITING_TD for !AUDIT case
|
Revision tags: release/11.4.0 |
|
#
24a22d1d |
| 22-Feb-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge r358179 through r358238.
PR: 244251
|
#
7de6c5eb |
| 21-Feb-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
audit: provide audit_canon_path variant which accepts vnodes
|
#
74dc6beb |
| 14-Feb-2020 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r357855 through r357920.
|
#
2f729243 |
| 14-Feb-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
Merge audit and systrace checks
This further shortens the syscall routine by not having to re-check after the system call.
|
#
0e84a878 |
| 14-Feb-2020 |
Mateusz Guzik <mjg@FreeBSD.org> |
Annotate branches in the syscall path
This in particular significantly shortens amd64_syscall, which otherwise keeps jumping forward over 2KB of code in total.
Note some of these branches should be
Annotate branches in the syscall path
This in particular significantly shortens amd64_syscall, which otherwise keeps jumping forward over 2KB of code in total.
Note some of these branches should be either eliminated altogether or coalesced.
show more ...
|
Revision tags: release/12.1.0, release/11.3.0 |
|
#
e8451da5 |
| 11-Dec-2018 |
Mateusz Guzik <mjg@FreeBSD.org> |
audi: replace open-coded TDP_AUDITREC checks with the macro
Sponsored by: The FreeBSD Foundation
|
#
67350cb5 |
| 09-Dec-2018 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r340918 through r341763.
|
Revision tags: release/12.0.0 |
|
#
c0282e1e |
| 29-Nov-2018 |
Mateusz Guzik <mjg@FreeBSD.org> |
audit: predict AUDITING_TD as false
By default it is compiled in and disabled.
Sponsored by: The FreeBSD Foundation
|
#
159dcc30 |
| 29-Nov-2018 |
Mateusz Guzik <mjg@FreeBSD.org> |
audit: change audit_syscalls_enabled type to bool
So that it fits better in __read_frequently.
Sponsored by: The FreeBSD Foundation
|
#
2a22df74 |
| 04-Nov-2018 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r339813 through r340125.
|
#
12e69f96 |
| 02-Nov-2018 |
Brooks Davis <brooks@FreeBSD.org> |
Add const to input-only char * arguments.
These arguments are mostly paths handled by NAMEI*() macros which already take const char * arguments.
This change improves the match between syscalls.mast
Add const to input-only char * arguments.
These arguments are mostly paths handled by NAMEI*() macros which already take const char * arguments.
This change improves the match between syscalls.master and the public declerations of system calls.
Reviewed by: kib (prior version) Obtained from: CheriBSD Sponsored by: DARPA, AFRL Differential Revision: https://reviews.freebsd.org/D17812
show more ...
|
#
c6879c6c |
| 23-Oct-2018 |
Dimitry Andric <dim@FreeBSD.org> |
Merge ^/head r339015 through r339669.
|
#
01d4e214 |
| 05-Oct-2018 |
Glen Barber <gjb@FreeBSD.org> |
MFH r338661 through r339200.
Sponsored by: The FreeBSD Foundation
|
#
2ddefb6d |
| 02-Oct-2018 |
Robert Watson <rwatson@FreeBSD.org> |
Rework the logic around quick checks for auditing that take place at system-call entry and whenever audit arguments or return values are captured:
1. Expose a single global, audit_syscalls_enabled,
Rework the logic around quick checks for auditing that take place at system-call entry and whenever audit arguments or return values are captured:
1. Expose a single global, audit_syscalls_enabled, which controls whether the audit framework is entered, rather than exposing components of the policy -- e.g., if the trail is enabled, suspended, etc.
2. Introduce a new function audit_syscalls_enabled_update(), which is called to update audit_syscalls_enabled whenever an aspect of the policy changes, so that the value can be updated.
3. Remove a check of trail enablement/suspension from audit_new() -- at the point where this function has been entered, we believe that system-call auditing is already in force, or we wouldn't get here, so simply proceed to more expensive policy checks.
4. Use an audit-provided global, audit_dtrace_enabled, rather than a dtaudit-provided global, to provide policy indicating whether dtaudit would like system calls to be audited.
5. Do some minor cosmetic renaming to clarify what various variables are for.
These changes collectively arrange it so that traditional audit (trail, pipes) or the DTrace audit provider can enable system-call probes without the other configured. Otherwise, dtaudit cannot capture system-call data without auditd(8) started.
Reviewed by: gnn Sponsored by: DARPA, AFRL Approved by: re (gjb) Differential Revision: https://reviews.freebsd.org/D17348
show more ...
|
Revision tags: release/11.2.0 |
|
#
82725ba9 |
| 23-Nov-2017 |
Hans Petter Selasky <hselasky@FreeBSD.org> |
Merge ^/head r325999 through r326131.
|
#
51369649 |
| 20-Nov-2017 |
Pedro F. Giffuni <pfg@FreeBSD.org> |
sys: further adoption of SPDX licensing ID tags.
Mainly focus on files that use BSD 3-Clause license.
The Software Package Data Exchange (SPDX) group provides a specification to make it easier for
sys: further adoption of SPDX licensing ID tags.
Mainly focus on files that use BSD 3-Clause license.
The Software Package Data Exchange (SPDX) group provides a specification to make it easier for automated tools to detect and summarize well known opensource licenses. We are gradually adopting the specification, noting that the tags are considered only advisory and do not, in any way, superceed or replace the license texts.
Special thanks to Wind River for providing access to "The Duke of Highlander" tool: an older (2014) run over FreeBSD tree was useful as a starting point.
show more ...
|
Revision tags: release/10.4.0, release/11.1.0 |
|
#
475e1fc0 |
| 31-Mar-2017 |
Robert Watson <rwatson@FreeBSD.org> |
Correct macro names and signatures for !AUDIT versions of canonical path auditing.
Obtained from: TrustedBSD Project MFC after: 3 weeks Sponsored by: DARPA, AFRL
|
#
15bcf785 |
| 31-Mar-2017 |
Robert Watson <rwatson@FreeBSD.org> |
Audit arguments to POSIX message queues, semaphores, and shared memory.
This requires minor changes to the audit framework to allow capturing paths that are not filesystem paths (i.e., will not be c
Audit arguments to POSIX message queues, semaphores, and shared memory.
This requires minor changes to the audit framework to allow capturing paths that are not filesystem paths (i.e., will not be canonicalised relative to the process current working directory and/or filesystem root).
Obtained from: TrustedBSD Project MFC after: 3 weeks Sponsored by: DARPA, AFRL
show more ...
|
#
1c2da029 |
| 31-Mar-2017 |
Robert Watson <rwatson@FreeBSD.org> |
Audit arguments to System V IPC system calls implementing sempahores, message queues, and shared memory.
Obtained from: TrustedBSD Project MFC after: 3 weeks Sponsored by: DARPA, AFRL
|
#
b7830259 |
| 30-Mar-2017 |
Robert Watson <rwatson@FreeBSD.org> |
When handling msgsys(2), semsys(2), and shmsys(2) multiplex system calls, map the 'which' argument into a suitable audit event identifier for the specific operation requested.
Obtained from: Trusted
When handling msgsys(2), semsys(2), and shmsys(2) multiplex system calls, map the 'which' argument into a suitable audit event identifier for the specific operation requested.
Obtained from: TrustedBSD Project MFC after: 3 weeks Sponsored by: DARPA, AFRL
show more ...
|
Revision tags: release/11.0.1, release/11.0.0 |
|
#
ed04e0c3 |
| 25-Aug-2016 |
Enji Cooper <ngie@FreeBSD.org> |
MFhead @ r304815
|