diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2014-01-23 21:08:10 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2014-01-23 21:08:10 -0500 |
commit | 6dd9158ae8577372aa433e6b0eae3c3d4caa5439 (patch) | |
tree | aa097a9f9ea6206d668ac924460ad1a5d64e751c /net/xfrm | |
parent | 90804ed61f24712975fa12f8a1fc12cd46ef7d59 (diff) | |
parent | f3411cb2b2e396a41ed3a439863f028db7140a34 (diff) |
Merge git://git.infradead.org/users/eparis/audit
Pull audit update from Eric Paris:
"Again we stayed pretty well contained inside the audit system.
Venturing out was fixing a couple of function prototypes which were
inconsistent (didn't hurt anything, but we used the same value as an
int, uint, u32, and I think even a long in a couple of places).
We also made a couple of minor changes to when a couple of LSMs called
the audit system. We hoped to add aarch64 audit support this go
round, but it wasn't ready.
I'm disappearing on vacation on Thursday. I should have internet
access, but it'll be spotty. If anything goes wrong please be sure to
cc rgb@redhat.com. He'll make fixing things his top priority"
* git://git.infradead.org/users/eparis/audit: (50 commits)
audit: whitespace fix in kernel-parameters.txt
audit: fix location of __net_initdata for audit_net_ops
audit: remove pr_info for every network namespace
audit: Modify a set of system calls in audit class definitions
audit: Convert int limit uses to u32
audit: Use more current logging style
audit: Use hex_byte_pack_upper
audit: correct a type mismatch in audit_syscall_exit()
audit: reorder AUDIT_TTY_SET arguments
audit: rework AUDIT_TTY_SET to only grab spin_lock once
audit: remove needless switch in AUDIT_SET
audit: use define's for audit version
audit: documentation of audit= kernel parameter
audit: wait_for_auditd rework for readability
audit: update MAINTAINERS
audit: log task info on feature change
audit: fix incorrect set of audit_sock
audit: print error message when fail to create audit socket
audit: fix dangling keywords in audit_log_set_loginuid() output
audit: log on errors from filter user rules
...
Diffstat (limited to 'net/xfrm')
-rw-r--r-- | net/xfrm/xfrm_policy.c | 8 | ||||
-rw-r--r-- | net/xfrm/xfrm_state.c | 6 | ||||
-rw-r--r-- | net/xfrm/xfrm_user.c | 12 |
3 files changed, 13 insertions, 13 deletions
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c index 9a91f7431c41..0d49945d0b9e 100644 --- a/net/xfrm/xfrm_policy.c +++ b/net/xfrm/xfrm_policy.c | |||
@@ -2906,12 +2906,12 @@ static void xfrm_policy_fini(struct net *net) | |||
2906 | flush_work(&net->xfrm.policy_hash_work); | 2906 | flush_work(&net->xfrm.policy_hash_work); |
2907 | #ifdef CONFIG_XFRM_SUB_POLICY | 2907 | #ifdef CONFIG_XFRM_SUB_POLICY |
2908 | audit_info.loginuid = INVALID_UID; | 2908 | audit_info.loginuid = INVALID_UID; |
2909 | audit_info.sessionid = -1; | 2909 | audit_info.sessionid = (unsigned int)-1; |
2910 | audit_info.secid = 0; | 2910 | audit_info.secid = 0; |
2911 | xfrm_policy_flush(net, XFRM_POLICY_TYPE_SUB, &audit_info); | 2911 | xfrm_policy_flush(net, XFRM_POLICY_TYPE_SUB, &audit_info); |
2912 | #endif | 2912 | #endif |
2913 | audit_info.loginuid = INVALID_UID; | 2913 | audit_info.loginuid = INVALID_UID; |
2914 | audit_info.sessionid = -1; | 2914 | audit_info.sessionid = (unsigned int)-1; |
2915 | audit_info.secid = 0; | 2915 | audit_info.secid = 0; |
2916 | xfrm_policy_flush(net, XFRM_POLICY_TYPE_MAIN, &audit_info); | 2916 | xfrm_policy_flush(net, XFRM_POLICY_TYPE_MAIN, &audit_info); |
2917 | 2917 | ||
@@ -3017,7 +3017,7 @@ static void xfrm_audit_common_policyinfo(struct xfrm_policy *xp, | |||
3017 | } | 3017 | } |
3018 | 3018 | ||
3019 | void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, | 3019 | void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, |
3020 | kuid_t auid, u32 sessionid, u32 secid) | 3020 | kuid_t auid, unsigned int sessionid, u32 secid) |
3021 | { | 3021 | { |
3022 | struct audit_buffer *audit_buf; | 3022 | struct audit_buffer *audit_buf; |
3023 | 3023 | ||
@@ -3032,7 +3032,7 @@ void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, | |||
3032 | EXPORT_SYMBOL_GPL(xfrm_audit_policy_add); | 3032 | EXPORT_SYMBOL_GPL(xfrm_audit_policy_add); |
3033 | 3033 | ||
3034 | void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, | 3034 | void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, |
3035 | kuid_t auid, u32 sessionid, u32 secid) | 3035 | kuid_t auid, unsigned int sessionid, u32 secid) |
3036 | { | 3036 | { |
3037 | struct audit_buffer *audit_buf; | 3037 | struct audit_buffer *audit_buf; |
3038 | 3038 | ||
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c index 68c2f357a183..8ed9d0dd4566 100644 --- a/net/xfrm/xfrm_state.c +++ b/net/xfrm/xfrm_state.c | |||
@@ -2043,7 +2043,7 @@ void xfrm_state_fini(struct net *net) | |||
2043 | 2043 | ||
2044 | flush_work(&net->xfrm.state_hash_work); | 2044 | flush_work(&net->xfrm.state_hash_work); |
2045 | audit_info.loginuid = INVALID_UID; | 2045 | audit_info.loginuid = INVALID_UID; |
2046 | audit_info.sessionid = -1; | 2046 | audit_info.sessionid = (unsigned int)-1; |
2047 | audit_info.secid = 0; | 2047 | audit_info.secid = 0; |
2048 | xfrm_state_flush(net, IPSEC_PROTO_ANY, &audit_info); | 2048 | xfrm_state_flush(net, IPSEC_PROTO_ANY, &audit_info); |
2049 | flush_work(&net->xfrm.state_gc_work); | 2049 | flush_work(&net->xfrm.state_gc_work); |
@@ -2109,7 +2109,7 @@ static void xfrm_audit_helper_pktinfo(struct sk_buff *skb, u16 family, | |||
2109 | } | 2109 | } |
2110 | 2110 | ||
2111 | void xfrm_audit_state_add(struct xfrm_state *x, int result, | 2111 | void xfrm_audit_state_add(struct xfrm_state *x, int result, |
2112 | kuid_t auid, u32 sessionid, u32 secid) | 2112 | kuid_t auid, unsigned int sessionid, u32 secid) |
2113 | { | 2113 | { |
2114 | struct audit_buffer *audit_buf; | 2114 | struct audit_buffer *audit_buf; |
2115 | 2115 | ||
@@ -2124,7 +2124,7 @@ void xfrm_audit_state_add(struct xfrm_state *x, int result, | |||
2124 | EXPORT_SYMBOL_GPL(xfrm_audit_state_add); | 2124 | EXPORT_SYMBOL_GPL(xfrm_audit_state_add); |
2125 | 2125 | ||
2126 | void xfrm_audit_state_delete(struct xfrm_state *x, int result, | 2126 | void xfrm_audit_state_delete(struct xfrm_state *x, int result, |
2127 | kuid_t auid, u32 sessionid, u32 secid) | 2127 | kuid_t auid, unsigned int sessionid, u32 secid) |
2128 | { | 2128 | { |
2129 | struct audit_buffer *audit_buf; | 2129 | struct audit_buffer *audit_buf; |
2130 | 2130 | ||
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index f964d4c00ffb..ec97e13743e6 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c | |||
@@ -600,7 +600,7 @@ static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
600 | int err; | 600 | int err; |
601 | struct km_event c; | 601 | struct km_event c; |
602 | kuid_t loginuid = audit_get_loginuid(current); | 602 | kuid_t loginuid = audit_get_loginuid(current); |
603 | u32 sessionid = audit_get_sessionid(current); | 603 | unsigned int sessionid = audit_get_sessionid(current); |
604 | u32 sid; | 604 | u32 sid; |
605 | 605 | ||
606 | err = verify_newsa_info(p, attrs); | 606 | err = verify_newsa_info(p, attrs); |
@@ -679,7 +679,7 @@ static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
679 | struct km_event c; | 679 | struct km_event c; |
680 | struct xfrm_usersa_id *p = nlmsg_data(nlh); | 680 | struct xfrm_usersa_id *p = nlmsg_data(nlh); |
681 | kuid_t loginuid = audit_get_loginuid(current); | 681 | kuid_t loginuid = audit_get_loginuid(current); |
682 | u32 sessionid = audit_get_sessionid(current); | 682 | unsigned int sessionid = audit_get_sessionid(current); |
683 | u32 sid; | 683 | u32 sid; |
684 | 684 | ||
685 | x = xfrm_user_state_lookup(net, p, attrs, &err); | 685 | x = xfrm_user_state_lookup(net, p, attrs, &err); |
@@ -1405,7 +1405,7 @@ static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1405 | int err; | 1405 | int err; |
1406 | int excl; | 1406 | int excl; |
1407 | kuid_t loginuid = audit_get_loginuid(current); | 1407 | kuid_t loginuid = audit_get_loginuid(current); |
1408 | u32 sessionid = audit_get_sessionid(current); | 1408 | unsigned int sessionid = audit_get_sessionid(current); |
1409 | u32 sid; | 1409 | u32 sid; |
1410 | 1410 | ||
1411 | err = verify_newpolicy_info(p); | 1411 | err = verify_newpolicy_info(p); |
@@ -1663,7 +1663,7 @@ static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1663 | } | 1663 | } |
1664 | } else { | 1664 | } else { |
1665 | kuid_t loginuid = audit_get_loginuid(current); | 1665 | kuid_t loginuid = audit_get_loginuid(current); |
1666 | u32 sessionid = audit_get_sessionid(current); | 1666 | unsigned int sessionid = audit_get_sessionid(current); |
1667 | u32 sid; | 1667 | u32 sid; |
1668 | 1668 | ||
1669 | security_task_getsecid(current, &sid); | 1669 | security_task_getsecid(current, &sid); |
@@ -1959,7 +1959,7 @@ static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1959 | err = 0; | 1959 | err = 0; |
1960 | if (up->hard) { | 1960 | if (up->hard) { |
1961 | kuid_t loginuid = audit_get_loginuid(current); | 1961 | kuid_t loginuid = audit_get_loginuid(current); |
1962 | u32 sessionid = audit_get_sessionid(current); | 1962 | unsigned int sessionid = audit_get_sessionid(current); |
1963 | u32 sid; | 1963 | u32 sid; |
1964 | 1964 | ||
1965 | security_task_getsecid(current, &sid); | 1965 | security_task_getsecid(current, &sid); |
@@ -2002,7 +2002,7 @@ static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
2002 | 2002 | ||
2003 | if (ue->hard) { | 2003 | if (ue->hard) { |
2004 | kuid_t loginuid = audit_get_loginuid(current); | 2004 | kuid_t loginuid = audit_get_loginuid(current); |
2005 | u32 sessionid = audit_get_sessionid(current); | 2005 | unsigned int sessionid = audit_get_sessionid(current); |
2006 | u32 sid; | 2006 | u32 sid; |
2007 | 2007 | ||
2008 | security_task_getsecid(current, &sid); | 2008 | security_task_getsecid(current, &sid); |