freebsd-dev/sys/security/audit
Kyle Evans cc62118e65 audit_canon_path_vp: don't panic if cdir == NULL
cdir may have simply failed to resolve (e.g. fget_cap failure in namei
leading to NULL dp passed to AUDIT_ARG_UPATH*_VP); restore the pre-rS358191
behavior of setting cpath[0] = '\0' and bailing out instead of panicking.

This was found by inadvertently running the libc/c063 tests with auditing
enabled, resulting in a panic.

Reviewed by:	mjg (committed version actually his)
Differential Revision:	https://reviews.freebsd.org/D24445
2020-04-17 02:09:31 +00:00
..
audit_arg.c audit: provide audit_canon_path variant which accepts vnodes 2020-02-21 01:40:49 +00:00
audit_bsm_db.c
audit_bsm_klib.c audit_canon_path_vp: don't panic if cdir == NULL 2020-04-17 02:09:31 +00:00
audit_bsm.c Make sure we convert internal audit records for thr_new 2020-03-30 18:15:36 +00:00
audit_dtrace.c
audit_ioctl.h
audit_pipe.c
audit_private.h audit: provide audit_canon_path variant which accepts vnodes 2020-02-21 01:40:49 +00:00
audit_syscalls.c vfs: drop the mostly unused flags argument from VOP_UNLOCK 2020-01-03 22:29:58 +00:00
audit_trigger.c
audit_worker.c vfs: drop the mostly unused flags argument from VOP_UNLOCK 2020-01-03 22:29:58 +00:00
audit.c Mark more nodes as CTLFLAG_MPSAFE or CTLFLAG_NEEDGIANT (17 of many) 2020-02-26 14:26:36 +00:00
audit.h audit: provide audit_canon_path variant which accepts vnodes 2020-02-21 01:40:49 +00:00
bsm_domain.c
bsm_errno.c
bsm_fcntl.c
bsm_socket_type.c
bsm_token.c