diff options
author | amw <none@none> | 2007-10-25 16:34:29 -0700 |
---|---|---|
committer | amw <none@none> | 2007-10-25 16:34:29 -0700 |
commit | da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0 (patch) | |
tree | 65be91fb78a6a66183197595333f2e8aafb4640a /usr/src/uts/common/c2/audit.c | |
parent | e845e33dd0d1aea22db7edaa8c7d43955d24609b (diff) | |
download | illumos-joyent-da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0.tar.gz |
PSARC/2007/218 caller_context_t in all VOPs
PSARC/2007/227 VFS Feature Registration and ACL on Create
PSARC/2007/244 ZFS Case-insensitive support
PSARC/2007/315 Extensible Attribute Interfaces
PSARC/2007/394 ls(1) new command line options '-/' and '-%': CIFS system attributes support
PSARC/2007/403 Modified Access Checks for CIFS
PSARC/2007/410 Add system attribute support to chmod(1)
PSARC/2007/432 CIFS system attributes support for cp(1), pack(1), unpack(1), compress(1) and uncompress(1)
PSARC/2007/444 Rescind SETTABLE Attribute
PSARC/2007/459 CIFS system attributes support for cpio(1), pax(1), tar(1)
PSARC/2007/546 Update utilities to match CIFS system attributes changes.
PSARC/2007/560 ZFS sharesmb property
4890717 want append-only files
6417428 Case-insensitive file system name lookup to support CIFS
6417435 DOS attributes and additional timestamps to support for CIFS
6417442 File system quarantined and modified attributes to support an integrated Anti-Virus service
6417453 FS boolean property for rejecting/allowing invalid UTF-8 sequences in file names
6473733 RFE: Need support for open-deny modes
6473755 RFE: Need ability to reconcile oplock and delegation conflicts
6494624 sharemgr needs to support CIFS shares better
6546705 All vnode operations need to pass caller_context_t
6546706 Need VOP_SETATTR/VOP_GETATTR to support new, optional attributes
6546893 Solaris system attribute support
6550962 ZFS ACL inheritance needs to be enhanced to support Automatic Inheritance
6553589 RFE: VFS Feature Registration facility
6553770 RFE: ZFS support for ACL-on-CREATE (PSARC 2007/227)
6565581 ls(1) should support file system attributes proposed in PSARC/2007/315
6566784 NTFS streams are not copied along with the files.
6576205 cp(1), pack(1) and compress(1) should support file system attributes proposed in PSARC/2007/315
6578875 RFE: kernel interfaces for nbmand need improvement
6578883 RFE: VOP_SHRLOCK needs additional access types
6578885 chmod(1) should support file system attributes proposed in PSARC/2007/315
6578886 RFE: disallow nbmand state to change on remount
6583349 ACL parser needs to support audit/alarm ACE types
6590347 tar(1) should support filesystem attributes proposed in PSARC/2007/315
6597357 *tar* xv@ doesn't show the hidden directory even though it is restored
6597360 *tar* should re-init xattr info if openat() fails during extraction of and extended attribute
6597368 *tar* cannot restore hard linked extended attributes
6597374 *tar* doesn't display "x " when hard linked attributes are restored
6597375 *tar* extended attribute header off by one
6614861 *cpio* incorrectly archives extended system attributes with -@
6614896 *pax* incorrectly archives extended system attributes with -@
6615225 *tar* incorrectly archives extended system attributes with -@
6617183 CIFS Service - PSARC 2006/715
Diffstat (limited to 'usr/src/uts/common/c2/audit.c')
-rw-r--r-- | usr/src/uts/common/c2/audit.c | 29 |
1 files changed, 21 insertions, 8 deletions
diff --git a/usr/src/uts/common/c2/audit.c b/usr/src/uts/common/c2/audit.c index 944c1e8a28..a01733a956 100644 --- a/usr/src/uts/common/c2/audit.c +++ b/usr/src/uts/common/c2/audit.c @@ -468,7 +468,7 @@ audit_addcomponent(struct pathname *pnp) * flag = 1, path is absolute. Free any saved path and set flag to PAD_ABSPATH. * * If the (new) path is absolute, then we have to throw away whatever we have - * already accumulated since it is being superceeded by new path which is + * already accumulated since it is being superseded by new path which is * anchored at the root. * Note that if the path is relative, this function does nothing * TODO: @@ -641,7 +641,7 @@ file_is_public(struct vattr *attr) /* * ROUTINE: AUDIT_ATTRIBUTES - * PURPOSE: Audit the attributes so we can tell why the error occured + * PURPOSE: Audit the attributes so we can tell why the error occurred * CALLBY: AUDIT_SAVEPATH * AUDIT_VNCREATE_FINISH * AUS_FCHOWN...audit_event.c...audit_path.c @@ -659,7 +659,7 @@ audit_attributes(struct vnode *vp) if (vp) { attr.va_mask = AT_ALL; - if (VOP_GETATTR(vp, &attr, 0, CRED()) != 0) + if (VOP_GETATTR(vp, &attr, 0, CRED(), NULL) != 0) return; if (file_is_public(&attr) && (tad->tad_ctrl & PAD_PUBLIC_EV)) { @@ -1047,7 +1047,7 @@ audit_closef(struct file *fp) */ if ((vp = fp->f_vnode) != NULL) { attr.va_mask = AT_ALL; - getattr_ret = VOP_GETATTR(vp, &attr, 0, CRED()); + getattr_ret = VOP_GETATTR(vp, &attr, 0, CRED(), NULL); } /* @@ -1294,7 +1294,14 @@ audit_setfsat_path(int argnum) t_audit_data_t *tad; struct f_audit_data *fad; p_audit_data_t *pad; /* current process */ - + struct a { + long id; + long arg1; + long arg2; + long arg3; + long arg4; + long arg5; + } *uap; struct b { long arg1; long arg2; @@ -1306,6 +1313,7 @@ audit_setfsat_path(int argnum) if (clwp == NULL) return; uap1 = (struct b *)&clwp->lwp_ap[1]; + uap = (struct a *)clwp->lwp_ap; tad = U2A(u); @@ -1334,6 +1342,10 @@ audit_setfsat_path(int argnum) return; } + if (uap->id == 9 && tad->tad_atpath != NULL) { /* openattrdir */ + tad->tad_ctrl |= PAD_ATPATH; + return; + } if (tad->tad_atpath != NULL) { au_pathrele(tad->tad_atpath); tad->tad_atpath = NULL; @@ -1373,7 +1385,8 @@ audit_symlink_create(vnode_t *dvp, char *sname, char *target, int error) if (error) return; - error = VOP_LOOKUP(dvp, sname, &vp, NULL, 0, NULL, CRED()); + error = VOP_LOOKUP(dvp, sname, &vp, NULL, 0, NULL, CRED(), + NULL, NULL, NULL); if (error == 0) { audit_attributes(vp); VN_RELE(vp); @@ -1648,7 +1661,7 @@ audit_chdirec(vnode_t *vp, vnode_t **vpp) * the same object, it will not panic our system * QUESTION: * where to decrement the f_count????????????????? - * seems like I need to set a flag if f_count incrmented through audit_getf + * seems like I need to set a flag if f_count incremented through audit_getf */ /*ARGSUSED*/ @@ -1898,7 +1911,7 @@ audit_fdsend(fd, fp, error) } /* - * Record privileges sucessfully used and we attempted to use but + * Record privileges successfully used and we attempted to use but * didn't have. */ void |