Print this page
NEX-13644 File access audit logging
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Roman Strashkin <roman.strashkin@nexenta.com>
Reviewed by: Saso Kiselkov <saso.kiselkov@nexenta.com>
Reviewed by: Rick McNeal <rick.mcneal@nexenta.com>
Reviewed by: Yuri Pankov <yuri.pankov@nexenta.com>

Split Close
Expand all
Collapse all
          --- old/usr/src/cmd/praudit/toktable.c
          +++ new/usr/src/cmd/praudit/toktable.c
↓ open down ↓ 13 lines elided ↑ open up ↑
  14   14   * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  15   15   * If applicable, add the following below this CDDL HEADER, with the
  16   16   * fields enclosed by brackets "[]" replaced with your own identifying
  17   17   * information: Portions Copyright [yyyy] [name of copyright owner]
  18   18   *
  19   19   * CDDL HEADER END
  20   20   */
  21   21  /*
  22   22   * Copyright 2010 Sun Microsystems, Inc.  All rights reserved.
  23   23   * Use is subject to license terms.
       24 + *
       25 + * Copyright 2018 Nexenta Systems, Inc.  All rights reserved.
  24   26   */
  25   27  
  26   28  /*
  27   29   * Solaris Audit Token Table.
  28   30   */
  29   31  
  30   32  #include <locale.h>
  31   33  
  32   34  #include <stdio.h>
  33   35  #include <stdlib.h>
↓ open down ↓ 156 lines elided ↑ open up ↑
 190  192              header64_ex_token, T_EXTENDED);
 191  193          table_init(AUT_SUBJECT32_EX, "subject", subject32_ex_token, T_ENCLOSED);
 192  194          table_init(AUT_PROCESS32_EX, "process", process32_ex_token, T_ENCLOSED);
 193  195          table_init(AUT_SUBJECT64_EX, "subject", subject64_ex_token, T_ENCLOSED);
 194  196          table_init(AUT_PROCESS64_EX, "process", process64_ex_token, T_ENCLOSED);
 195  197          table_initx(AUT_IN_ADDR_EX, "ip address", "ip_address",
 196  198              ip_addr_ex_token, T_ELEMENT);
 197  199          table_init(AUT_SOCKET_EX, "socket", socket_ex_token, T_ENCLOSED);
 198  200          table_init(AUT_TID, "tid", tid_token, T_EXTENDED);
 199  201  
      202 +        table_init(AUT_ACCESS_MASK, "access mask", access_mask_token,
      203 +            T_ELEMENT);
      204 +        table_init(AUT_WSID, "Windows SID", wsid_token, T_ELEMENT);
      205 +
 200  206  #ifdef _PRAUDIT
 201  207          /*
 202  208           * Done with tokens above here. Now do remaining tags.
 203  209           */
 204  210          table_init(TAG_AUID, "audit-uid", pa_pw_uid, T_ATTRIBUTE);
 205  211          table_init(TAG_UID, "uid", pa_pw_uid, T_ATTRIBUTE);
 206  212          table_init(TAG_GID, "gid", pa_gr_uid, T_ATTRIBUTE);
 207  213          table_init(TAG_RUID, "ruid", pa_pw_uid, T_ATTRIBUTE);
 208  214          table_init(TAG_RGID, "rgid", pa_gr_uid, T_ATTRIBUTE);
 209  215  
↓ open down ↓ 89 lines elided ↑ open up ↑
 299  305  
 300  306          table_init(TAG_IPCTYPE, "ipc-type", NOFUNC, T_ATTRIBUTE);
 301  307          table_init(TAG_IPCID, "ipc-id", pa_adr_int32, T_ATTRIBUTE);
 302  308  
 303  309          table_init(TAG_ARBPRINT, "print", NOFUNC, T_ATTRIBUTE);
 304  310          table_init(TAG_ARBTYPE, "type", NOFUNC, T_ATTRIBUTE);
 305  311          table_init(TAG_ARBCOUNT, "count", NOFUNC, T_ATTRIBUTE);
 306  312  
 307  313          table_init(TAG_HOSTID, "host", NOFUNC, T_ATTRIBUTE);
 308  314          table_init(TAG_USERNAME, "username", pa_adr_string, T_ATTRIBUTE);
      315 +        table_init(TAG_WSID, "wsid", NOFUNC, T_ATTRIBUTE);
      316 +
 309  317  #endif  /* _PRAUDIT */
 310  318  }
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX