diff options
Diffstat (limited to 'net')
| -rw-r--r-- | net/core/dev.c | 15 | ||||
| -rw-r--r-- | net/key/af_key.c | 14 | ||||
| -rw-r--r-- | net/netlink/af_netlink.c | 2 | ||||
| -rw-r--r-- | net/xfrm/xfrm_state.c | 2 |
4 files changed, 18 insertions, 15 deletions
diff --git a/net/core/dev.c b/net/core/dev.c index edaff2720e10..9549417250bb 100644 --- a/net/core/dev.c +++ b/net/core/dev.c | |||
| @@ -2752,12 +2752,15 @@ static void __dev_set_promiscuity(struct net_device *dev, int inc) | |||
| 2752 | printk(KERN_INFO "device %s %s promiscuous mode\n", | 2752 | printk(KERN_INFO "device %s %s promiscuous mode\n", |
| 2753 | dev->name, (dev->flags & IFF_PROMISC) ? "entered" : | 2753 | dev->name, (dev->flags & IFF_PROMISC) ? "entered" : |
| 2754 | "left"); | 2754 | "left"); |
| 2755 | audit_log(current->audit_context, GFP_ATOMIC, | 2755 | if (audit_enabled) |
| 2756 | AUDIT_ANOM_PROMISCUOUS, | 2756 | audit_log(current->audit_context, GFP_ATOMIC, |
| 2757 | "dev=%s prom=%d old_prom=%d auid=%u", | 2757 | AUDIT_ANOM_PROMISCUOUS, |
| 2758 | dev->name, (dev->flags & IFF_PROMISC), | 2758 | "dev=%s prom=%d old_prom=%d auid=%u uid=%u gid=%u ses=%u", |
| 2759 | (old_flags & IFF_PROMISC), | 2759 | dev->name, (dev->flags & IFF_PROMISC), |
| 2760 | audit_get_loginuid(current->audit_context)); | 2760 | (old_flags & IFF_PROMISC), |
| 2761 | audit_get_loginuid(current), | ||
| 2762 | current->uid, current->gid, | ||
| 2763 | audit_get_sessionid(current)); | ||
| 2761 | 2764 | ||
| 2762 | if (dev->change_rx_flags) | 2765 | if (dev->change_rx_flags) |
| 2763 | dev->change_rx_flags(dev, IFF_PROMISC); | 2766 | dev->change_rx_flags(dev, IFF_PROMISC); |
diff --git a/net/key/af_key.c b/net/key/af_key.c index 16b72b5570c3..45c3c27d279a 100644 --- a/net/key/af_key.c +++ b/net/key/af_key.c | |||
| @@ -1466,7 +1466,7 @@ static int pfkey_add(struct sock *sk, struct sk_buff *skb, struct sadb_msg *hdr, | |||
| 1466 | err = xfrm_state_update(x); | 1466 | err = xfrm_state_update(x); |
| 1467 | 1467 | ||
| 1468 | xfrm_audit_state_add(x, err ? 0 : 1, | 1468 | xfrm_audit_state_add(x, err ? 0 : 1, |
| 1469 | audit_get_loginuid(current->audit_context), 0); | 1469 | audit_get_loginuid(current), 0); |
| 1470 | 1470 | ||
| 1471 | if (err < 0) { | 1471 | if (err < 0) { |
| 1472 | x->km.state = XFRM_STATE_DEAD; | 1472 | x->km.state = XFRM_STATE_DEAD; |
| @@ -1520,7 +1520,7 @@ static int pfkey_delete(struct sock *sk, struct sk_buff *skb, struct sadb_msg *h | |||
| 1520 | km_state_notify(x, &c); | 1520 | km_state_notify(x, &c); |
| 1521 | out: | 1521 | out: |
| 1522 | xfrm_audit_state_delete(x, err ? 0 : 1, | 1522 | xfrm_audit_state_delete(x, err ? 0 : 1, |
| 1523 | audit_get_loginuid(current->audit_context), 0); | 1523 | audit_get_loginuid(current), 0); |
| 1524 | xfrm_state_put(x); | 1524 | xfrm_state_put(x); |
| 1525 | 1525 | ||
| 1526 | return err; | 1526 | return err; |
| @@ -1695,7 +1695,7 @@ static int pfkey_flush(struct sock *sk, struct sk_buff *skb, struct sadb_msg *hd | |||
| 1695 | if (proto == 0) | 1695 | if (proto == 0) |
| 1696 | return -EINVAL; | 1696 | return -EINVAL; |
| 1697 | 1697 | ||
| 1698 | audit_info.loginuid = audit_get_loginuid(current->audit_context); | 1698 | audit_info.loginuid = audit_get_loginuid(current); |
| 1699 | audit_info.secid = 0; | 1699 | audit_info.secid = 0; |
| 1700 | err = xfrm_state_flush(proto, &audit_info); | 1700 | err = xfrm_state_flush(proto, &audit_info); |
| 1701 | if (err) | 1701 | if (err) |
| @@ -2273,7 +2273,7 @@ static int pfkey_spdadd(struct sock *sk, struct sk_buff *skb, struct sadb_msg *h | |||
| 2273 | hdr->sadb_msg_type != SADB_X_SPDUPDATE); | 2273 | hdr->sadb_msg_type != SADB_X_SPDUPDATE); |
| 2274 | 2274 | ||
| 2275 | xfrm_audit_policy_add(xp, err ? 0 : 1, | 2275 | xfrm_audit_policy_add(xp, err ? 0 : 1, |
| 2276 | audit_get_loginuid(current->audit_context), 0); | 2276 | audit_get_loginuid(current), 0); |
| 2277 | 2277 | ||
| 2278 | if (err) | 2278 | if (err) |
| 2279 | goto out; | 2279 | goto out; |
| @@ -2356,7 +2356,7 @@ static int pfkey_spddelete(struct sock *sk, struct sk_buff *skb, struct sadb_msg | |||
| 2356 | return -ENOENT; | 2356 | return -ENOENT; |
| 2357 | 2357 | ||
| 2358 | xfrm_audit_policy_delete(xp, err ? 0 : 1, | 2358 | xfrm_audit_policy_delete(xp, err ? 0 : 1, |
| 2359 | audit_get_loginuid(current->audit_context), 0); | 2359 | audit_get_loginuid(current), 0); |
| 2360 | 2360 | ||
| 2361 | if (err) | 2361 | if (err) |
| 2362 | goto out; | 2362 | goto out; |
| @@ -2617,7 +2617,7 @@ static int pfkey_spdget(struct sock *sk, struct sk_buff *skb, struct sadb_msg *h | |||
| 2617 | 2617 | ||
| 2618 | if (delete) { | 2618 | if (delete) { |
| 2619 | xfrm_audit_policy_delete(xp, err ? 0 : 1, | 2619 | xfrm_audit_policy_delete(xp, err ? 0 : 1, |
| 2620 | audit_get_loginuid(current->audit_context), 0); | 2620 | audit_get_loginuid(current), 0); |
| 2621 | 2621 | ||
| 2622 | if (err) | 2622 | if (err) |
| 2623 | goto out; | 2623 | goto out; |
| @@ -2694,7 +2694,7 @@ static int pfkey_spdflush(struct sock *sk, struct sk_buff *skb, struct sadb_msg | |||
| 2694 | struct xfrm_audit audit_info; | 2694 | struct xfrm_audit audit_info; |
| 2695 | int err; | 2695 | int err; |
| 2696 | 2696 | ||
| 2697 | audit_info.loginuid = audit_get_loginuid(current->audit_context); | 2697 | audit_info.loginuid = audit_get_loginuid(current); |
| 2698 | audit_info.secid = 0; | 2698 | audit_info.secid = 0; |
| 2699 | err = xfrm_policy_flush(XFRM_POLICY_TYPE_MAIN, &audit_info); | 2699 | err = xfrm_policy_flush(XFRM_POLICY_TYPE_MAIN, &audit_info); |
| 2700 | if (err) | 2700 | if (err) |
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c index ff9fb6ba0c5c..1ab0da2632e1 100644 --- a/net/netlink/af_netlink.c +++ b/net/netlink/af_netlink.c | |||
| @@ -1238,7 +1238,7 @@ static int netlink_sendmsg(struct kiocb *kiocb, struct socket *sock, | |||
| 1238 | 1238 | ||
| 1239 | NETLINK_CB(skb).pid = nlk->pid; | 1239 | NETLINK_CB(skb).pid = nlk->pid; |
| 1240 | NETLINK_CB(skb).dst_group = dst_group; | 1240 | NETLINK_CB(skb).dst_group = dst_group; |
| 1241 | NETLINK_CB(skb).loginuid = audit_get_loginuid(current->audit_context); | 1241 | NETLINK_CB(skb).loginuid = audit_get_loginuid(current); |
| 1242 | selinux_get_task_sid(current, &(NETLINK_CB(skb).sid)); | 1242 | selinux_get_task_sid(current, &(NETLINK_CB(skb).sid)); |
| 1243 | memcpy(NETLINK_CREDS(skb), &siocb->scm->creds, sizeof(struct ucred)); | 1243 | memcpy(NETLINK_CREDS(skb), &siocb->scm->creds, sizeof(struct ucred)); |
| 1244 | 1244 | ||
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c index 3ff76e84d548..7ba65e82941c 100644 --- a/net/xfrm/xfrm_state.c +++ b/net/xfrm/xfrm_state.c | |||
| @@ -493,7 +493,7 @@ expired: | |||
| 493 | km_state_expired(x, 1, 0); | 493 | km_state_expired(x, 1, 0); |
| 494 | 494 | ||
| 495 | xfrm_audit_state_delete(x, err ? 0 : 1, | 495 | xfrm_audit_state_delete(x, err ? 0 : 1, |
| 496 | audit_get_loginuid(current->audit_context), 0); | 496 | audit_get_loginuid(current), 0); |
| 497 | 497 | ||
| 498 | out: | 498 | out: |
| 499 | spin_unlock(&x->lock); | 499 | spin_unlock(&x->lock); |
