summaryrefslogtreecommitdiff
path: root/usr/src/uts/common/os/policy.c
diff options
context:
space:
mode:
authorMarek Pospisil <Marek.Pospisil@Sun.COM>2010-03-05 13:16:08 -0800
committerMarek Pospisil <Marek.Pospisil@Sun.COM>2010-03-05 13:16:08 -0800
commit005d3feb53a9a10272d4a24b03991575d6a9bcb3 (patch)
tree3c239c5ec7be3de4c1719c4539033149da56a799 /usr/src/uts/common/os/policy.c
parent83d7a2524bdbf7b1da1c47b52bc20eee0f12c60e (diff)
downloadillumos-joyent-005d3feb53a9a10272d4a24b03991575d6a9bcb3.tar.gz
PSARC/2009/354 Always on / no reboot Solaris Audit
6192139 Solaris auditing should be able to start collecting audit records without a reboot
Diffstat (limited to 'usr/src/uts/common/os/policy.c')
-rw-r--r--usr/src/uts/common/os/policy.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/usr/src/uts/common/os/policy.c b/usr/src/uts/common/os/policy.c
index aaddff4756..d6444e7fc3 100644
--- a/usr/src/uts/common/os/policy.c
+++ b/usr/src/uts/common/os/policy.c
@@ -356,7 +356,7 @@ static void
priv_policy_err(const cred_t *cr, int priv, boolean_t allzone, const char *msg)
{
- if (audit_active)
+ if (AU_AUDITING())
audit_priv(priv, allzone ? ZONEPRIVS(cr) : NULL, 0);
DTRACE_PROBE2(priv__err, int, priv, boolean_t, allzone);
@@ -387,7 +387,7 @@ priv_policy_ap(const cred_t *cr, int priv, boolean_t allzone, int err,
!PRIV_ISASSERT(priv_basic, priv)) &&
!servicing_interrupt()) {
PTOU(curproc)->u_acflag |= ASU; /* Needed for SVVS */
- if (audit_active)
+ if (AU_AUDITING())
audit_priv(priv,
allzone ? ZONEPRIVS(cr) : NULL, 1);
}
@@ -431,7 +431,7 @@ priv_policy_choice(const cred_t *cr, int priv, boolean_t allzone)
(!allzone || HAS_ALLZONEPRIVS(cr));
/* Audit success only */
- if (res && audit_active &&
+ if (res && AU_AUDITING() &&
(allzone || priv == PRIV_ALL || !PRIV_ISASSERT(priv_basic, priv)) &&
!servicing_interrupt()) {
audit_priv(priv, allzone ? ZONEPRIVS(cr) : NULL, 1);
@@ -488,7 +488,7 @@ secpolicy_require_set(const cred_t *cr, const priv_set_t *req, const char *msg)
priv_inverse(&pset); /* all non present privileges */
priv_intersect(req, &pset); /* the actual missing privs */
- if (audit_active)
+ if (AU_AUDITING())
audit_priv(PRIV_NONE, &pset, 0);
/*
* Privilege debugging; special case "one privilege in set".