For now, reflect practical reality that Audit system calls aren't
allowed in Jail: return a privilege error.
This commit is contained in:
parent
969e5bdcd0
commit
c3c1b5e62a
@ -542,6 +542,7 @@ prison_priv_check(struct ucred *cred, int priv)
|
||||
*/
|
||||
case PRIV_KTRACE:
|
||||
|
||||
#if 0
|
||||
/*
|
||||
* Allow jailed processes to configure audit identity and
|
||||
* submit audit records (login, etc). In the future we may
|
||||
@ -551,6 +552,7 @@ prison_priv_check(struct ucred *cred, int priv)
|
||||
case PRIV_AUDIT_GETAUDIT:
|
||||
case PRIV_AUDIT_SETAUDIT:
|
||||
case PRIV_AUDIT_SUBMIT:
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Allow jailed processes to manipulate process UNIX
|
||||
|
Loading…
Reference in New Issue
Block a user