summaryrefslogtreecommitdiffstats
path: root/net/xfrm
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2014-01-23 21:08:10 -0500
committerLinus Torvalds <torvalds@linux-foundation.org>2014-01-23 21:08:10 -0500
commit6dd9158ae8577372aa433e6b0eae3c3d4caa5439 (patch)
treeaa097a9f9ea6206d668ac924460ad1a5d64e751c /net/xfrm
parent90804ed61f24712975fa12f8a1fc12cd46ef7d59 (diff)
parentf3411cb2b2e396a41ed3a439863f028db7140a34 (diff)
Merge git://git.infradead.org/users/eparis/audit
Pull audit update from Eric Paris: "Again we stayed pretty well contained inside the audit system. Venturing out was fixing a couple of function prototypes which were inconsistent (didn't hurt anything, but we used the same value as an int, uint, u32, and I think even a long in a couple of places). We also made a couple of minor changes to when a couple of LSMs called the audit system. We hoped to add aarch64 audit support this go round, but it wasn't ready. I'm disappearing on vacation on Thursday. I should have internet access, but it'll be spotty. If anything goes wrong please be sure to cc rgb@redhat.com. He'll make fixing things his top priority" * git://git.infradead.org/users/eparis/audit: (50 commits) audit: whitespace fix in kernel-parameters.txt audit: fix location of __net_initdata for audit_net_ops audit: remove pr_info for every network namespace audit: Modify a set of system calls in audit class definitions audit: Convert int limit uses to u32 audit: Use more current logging style audit: Use hex_byte_pack_upper audit: correct a type mismatch in audit_syscall_exit() audit: reorder AUDIT_TTY_SET arguments audit: rework AUDIT_TTY_SET to only grab spin_lock once audit: remove needless switch in AUDIT_SET audit: use define's for audit version audit: documentation of audit= kernel parameter audit: wait_for_auditd rework for readability audit: update MAINTAINERS audit: log task info on feature change audit: fix incorrect set of audit_sock audit: print error message when fail to create audit socket audit: fix dangling keywords in audit_log_set_loginuid() output audit: log on errors from filter user rules ...
Diffstat (limited to 'net/xfrm')
-rw-r--r--net/xfrm/xfrm_policy.c8
-rw-r--r--net/xfrm/xfrm_state.c6
-rw-r--r--net/xfrm/xfrm_user.c12
3 files changed, 13 insertions, 13 deletions
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c
index 9a91f7431c41..0d49945d0b9e 100644
--- a/net/xfrm/xfrm_policy.c
+++ b/net/xfrm/xfrm_policy.c
@@ -2906,12 +2906,12 @@ static void xfrm_policy_fini(struct net *net)
2906 flush_work(&net->xfrm.policy_hash_work); 2906 flush_work(&net->xfrm.policy_hash_work);
2907#ifdef CONFIG_XFRM_SUB_POLICY 2907#ifdef CONFIG_XFRM_SUB_POLICY
2908 audit_info.loginuid = INVALID_UID; 2908 audit_info.loginuid = INVALID_UID;
2909 audit_info.sessionid = -1; 2909 audit_info.sessionid = (unsigned int)-1;
2910 audit_info.secid = 0; 2910 audit_info.secid = 0;
2911 xfrm_policy_flush(net, XFRM_POLICY_TYPE_SUB, &audit_info); 2911 xfrm_policy_flush(net, XFRM_POLICY_TYPE_SUB, &audit_info);
2912#endif 2912#endif
2913 audit_info.loginuid = INVALID_UID; 2913 audit_info.loginuid = INVALID_UID;
2914 audit_info.sessionid = -1; 2914 audit_info.sessionid = (unsigned int)-1;
2915 audit_info.secid = 0; 2915 audit_info.secid = 0;
2916 xfrm_policy_flush(net, XFRM_POLICY_TYPE_MAIN, &audit_info); 2916 xfrm_policy_flush(net, XFRM_POLICY_TYPE_MAIN, &audit_info);
2917 2917
@@ -3017,7 +3017,7 @@ static void xfrm_audit_common_policyinfo(struct xfrm_policy *xp,
3017} 3017}
3018 3018
3019void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, 3019void xfrm_audit_policy_add(struct xfrm_policy *xp, int result,
3020 kuid_t auid, u32 sessionid, u32 secid) 3020 kuid_t auid, unsigned int sessionid, u32 secid)
3021{ 3021{
3022 struct audit_buffer *audit_buf; 3022 struct audit_buffer *audit_buf;
3023 3023
@@ -3032,7 +3032,7 @@ void xfrm_audit_policy_add(struct xfrm_policy *xp, int result,
3032EXPORT_SYMBOL_GPL(xfrm_audit_policy_add); 3032EXPORT_SYMBOL_GPL(xfrm_audit_policy_add);
3033 3033
3034void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, 3034void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result,
3035 kuid_t auid, u32 sessionid, u32 secid) 3035 kuid_t auid, unsigned int sessionid, u32 secid)
3036{ 3036{
3037 struct audit_buffer *audit_buf; 3037 struct audit_buffer *audit_buf;
3038 3038
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
index 68c2f357a183..8ed9d0dd4566 100644
--- a/net/xfrm/xfrm_state.c
+++ b/net/xfrm/xfrm_state.c
@@ -2043,7 +2043,7 @@ void xfrm_state_fini(struct net *net)
2043 2043
2044 flush_work(&net->xfrm.state_hash_work); 2044 flush_work(&net->xfrm.state_hash_work);
2045 audit_info.loginuid = INVALID_UID; 2045 audit_info.loginuid = INVALID_UID;
2046 audit_info.sessionid = -1; 2046 audit_info.sessionid = (unsigned int)-1;
2047 audit_info.secid = 0; 2047 audit_info.secid = 0;
2048 xfrm_state_flush(net, IPSEC_PROTO_ANY, &audit_info); 2048 xfrm_state_flush(net, IPSEC_PROTO_ANY, &audit_info);
2049 flush_work(&net->xfrm.state_gc_work); 2049 flush_work(&net->xfrm.state_gc_work);
@@ -2109,7 +2109,7 @@ static void xfrm_audit_helper_pktinfo(struct sk_buff *skb, u16 family,
2109} 2109}
2110 2110
2111void xfrm_audit_state_add(struct xfrm_state *x, int result, 2111void xfrm_audit_state_add(struct xfrm_state *x, int result,
2112 kuid_t auid, u32 sessionid, u32 secid) 2112 kuid_t auid, unsigned int sessionid, u32 secid)
2113{ 2113{
2114 struct audit_buffer *audit_buf; 2114 struct audit_buffer *audit_buf;
2115 2115
@@ -2124,7 +2124,7 @@ void xfrm_audit_state_add(struct xfrm_state *x, int result,
2124EXPORT_SYMBOL_GPL(xfrm_audit_state_add); 2124EXPORT_SYMBOL_GPL(xfrm_audit_state_add);
2125 2125
2126void xfrm_audit_state_delete(struct xfrm_state *x, int result, 2126void xfrm_audit_state_delete(struct xfrm_state *x, int result,
2127 kuid_t auid, u32 sessionid, u32 secid) 2127 kuid_t auid, unsigned int sessionid, u32 secid)
2128{ 2128{
2129 struct audit_buffer *audit_buf; 2129 struct audit_buffer *audit_buf;
2130 2130
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
index f964d4c00ffb..ec97e13743e6 100644
--- a/net/xfrm/xfrm_user.c
+++ b/net/xfrm/xfrm_user.c
@@ -600,7 +600,7 @@ static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
600 int err; 600 int err;
601 struct km_event c; 601 struct km_event c;
602 kuid_t loginuid = audit_get_loginuid(current); 602 kuid_t loginuid = audit_get_loginuid(current);
603 u32 sessionid = audit_get_sessionid(current); 603 unsigned int sessionid = audit_get_sessionid(current);
604 u32 sid; 604 u32 sid;
605 605
606 err = verify_newsa_info(p, attrs); 606 err = verify_newsa_info(p, attrs);
@@ -679,7 +679,7 @@ static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
679 struct km_event c; 679 struct km_event c;
680 struct xfrm_usersa_id *p = nlmsg_data(nlh); 680 struct xfrm_usersa_id *p = nlmsg_data(nlh);
681 kuid_t loginuid = audit_get_loginuid(current); 681 kuid_t loginuid = audit_get_loginuid(current);
682 u32 sessionid = audit_get_sessionid(current); 682 unsigned int sessionid = audit_get_sessionid(current);
683 u32 sid; 683 u32 sid;
684 684
685 x = xfrm_user_state_lookup(net, p, attrs, &err); 685 x = xfrm_user_state_lookup(net, p, attrs, &err);
@@ -1405,7 +1405,7 @@ static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1405 int err; 1405 int err;
1406 int excl; 1406 int excl;
1407 kuid_t loginuid = audit_get_loginuid(current); 1407 kuid_t loginuid = audit_get_loginuid(current);
1408 u32 sessionid = audit_get_sessionid(current); 1408 unsigned int sessionid = audit_get_sessionid(current);
1409 u32 sid; 1409 u32 sid;
1410 1410
1411 err = verify_newpolicy_info(p); 1411 err = verify_newpolicy_info(p);
@@ -1663,7 +1663,7 @@ static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1663 } 1663 }
1664 } else { 1664 } else {
1665 kuid_t loginuid = audit_get_loginuid(current); 1665 kuid_t loginuid = audit_get_loginuid(current);
1666 u32 sessionid = audit_get_sessionid(current); 1666 unsigned int sessionid = audit_get_sessionid(current);
1667 u32 sid; 1667 u32 sid;
1668 1668
1669 security_task_getsecid(current, &sid); 1669 security_task_getsecid(current, &sid);
@@ -1959,7 +1959,7 @@ static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
1959 err = 0; 1959 err = 0;
1960 if (up->hard) { 1960 if (up->hard) {
1961 kuid_t loginuid = audit_get_loginuid(current); 1961 kuid_t loginuid = audit_get_loginuid(current);
1962 u32 sessionid = audit_get_sessionid(current); 1962 unsigned int sessionid = audit_get_sessionid(current);
1963 u32 sid; 1963 u32 sid;
1964 1964
1965 security_task_getsecid(current, &sid); 1965 security_task_getsecid(current, &sid);
@@ -2002,7 +2002,7 @@ static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
2002 2002
2003 if (ue->hard) { 2003 if (ue->hard) {
2004 kuid_t loginuid = audit_get_loginuid(current); 2004 kuid_t loginuid = audit_get_loginuid(current);
2005 u32 sessionid = audit_get_sessionid(current); 2005 unsigned int sessionid = audit_get_sessionid(current);
2006 u32 sid; 2006 u32 sid;
2007 2007
2008 security_task_getsecid(current, &sid); 2008 security_task_getsecid(current, &sid);