freebsd-skq/sys/security/audit
Wayne Salamon ae1078d657 Audit the argv and env vectors passed in on exec:
Add the argument auditing functions for argv and env.
  Add kernel-specific versions of the tokenizer functions for the
  arg and env represented as a char array.
  Implement the AUDIT_ARGV and AUDIT_ARGE audit policy commands to
  enable/disable argv/env auditing.
  Call the argument auditing from the exec system calls.

Obtained from: TrustedBSD Project
Approved by: rwatson (mentor)
2006-09-01 11:45:40 +00:00
..
audit_arg.c Audit the argv and env vectors passed in on exec: 2006-09-01 11:45:40 +00:00
audit_bsm_klib.c Introduce support for per-audit pipe preselection independent from the 2006-06-05 14:48:17 +00:00
audit_bsm_token.c Audit the argv and env vectors passed in on exec: 2006-09-01 11:45:40 +00:00
audit_bsm.c Audit the argv and env vectors passed in on exec: 2006-09-01 11:45:40 +00:00
audit_ioctl.h Allow the user process to query the kernel's notion of a maximum 2006-08-26 17:59:31 +00:00
audit_pipe.c Allow the user process to query the kernel's notion of a maximum 2006-08-26 17:59:31 +00:00
audit_private.h Audit the argv and env vectors passed in on exec: 2006-09-01 11:45:40 +00:00
audit_syscalls.c Audit the argv and env vectors passed in on exec: 2006-09-01 11:45:40 +00:00
audit_trigger.c Prefer C to C++ comments per style(9). 2006-06-08 21:55:39 +00:00
audit_worker.c Extract pointer value for mnt_stat from vp after the NULL check, not 2006-06-06 08:43:27 +00:00
audit.c Audit the argv and env vectors passed in on exec: 2006-09-01 11:45:40 +00:00
audit.h Audit the argv and env vectors passed in on exec: 2006-09-01 11:45:40 +00:00