Since it is impossible right now to have audit subsystem working in jails, I checked the source code. sys_audit in audit_syscalls.c in kernel explicitly checks jailed() and returns ENOSYS. Also, prison_priv_check has "case PRIV_AUDIT_GETAUDIT" commented out.
The question is: why is it so and what can possibly go wrong if these checks are removed?
The problem is very simple: I am running multiple jails with sshd(8) servers in there and need to be able to collect audit records from them.
The question is: why is it so and what can possibly go wrong if these checks are removed?
The problem is very simple: I am running multiple jails with sshd(8) servers in there and need to be able to collect audit records from them.