Remove two boot printfs generated by Audit to announce it's presence,

and replace with software-testable sysctl node (security.audit) that
can be used to detect kernel audit support.

Obtained from:	TrustedBSD Project
Approved by:	re (kensmith)
This commit is contained in:
Robert Watson 2007-07-01 20:51:30 +00:00
parent c015bff644
commit 536b405093
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=171144
2 changed files with 4 additions and 2 deletions

View File

@ -49,6 +49,7 @@
#include <sys/socketvar.h>
#include <sys/protosw.h>
#include <sys/domain.h>
#include <sys/sysctl.h>
#include <sys/sysproto.h>
#include <sys/sysent.h>
#include <sys/systm.h>
@ -76,6 +77,9 @@ MALLOC_DEFINE(M_AUDITDATA, "audit_data", "Audit data storage");
MALLOC_DEFINE(M_AUDITPATH, "audit_path", "Audit path storage");
MALLOC_DEFINE(M_AUDITTEXT, "audit_text", "Audit text storage");
SYSCTL_NODE(_security, OID_AUTO, audit, CTLFLAG_RW, 0,
"TrustedBSD audit controls");
/*
* Audit control settings that are set/read by system calls and are hence
* non-static.
@ -215,7 +219,6 @@ static void
audit_init(void)
{
printf("Security auditing service present\n");
audit_enabled = 0;
audit_suspended = 0;
audit_panic_on_write_fail = 0;

View File

@ -65,7 +65,6 @@ void
kau_init(void)
{
printf("BSM auditing present\n");
au_evclassmap_init();
}