diff options
-rw-r--r-- | include/linux/audit.h | 2 | ||||
-rw-r--r-- | kernel/audit.c | 4 | ||||
-rw-r--r-- | kernel/auditsc.c | 4 |
3 files changed, 5 insertions, 5 deletions
diff --git a/include/linux/audit.h b/include/linux/audit.h index 1a15ba38c660..51e5879af7fc 100644 --- a/include/linux/audit.h +++ b/include/linux/audit.h | |||
@@ -181,7 +181,7 @@ struct audit_message { | |||
181 | 181 | ||
182 | struct audit_status { | 182 | struct audit_status { |
183 | __u32 mask; /* Bit mask for valid entries */ | 183 | __u32 mask; /* Bit mask for valid entries */ |
184 | __u32 enabled; /* 1 = enabled, 0 = disbaled */ | 184 | __u32 enabled; /* 1 = enabled, 0 = disabled */ |
185 | __u32 failure; /* Failure-to-log action */ | 185 | __u32 failure; /* Failure-to-log action */ |
186 | __u32 pid; /* pid of auditd process */ | 186 | __u32 pid; /* pid of auditd process */ |
187 | __u32 rate_limit; /* messages rate limit (per second) */ | 187 | __u32 rate_limit; /* messages rate limit (per second) */ |
diff --git a/kernel/audit.c b/kernel/audit.c index 4e940c05ede8..74779d3769fa 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
@@ -116,7 +116,7 @@ static LIST_HEAD(audit_entlist); | |||
116 | static LIST_HEAD(audit_extlist); | 116 | static LIST_HEAD(audit_extlist); |
117 | 117 | ||
118 | /* The netlink socket is only to be read by 1 CPU, which lets us assume | 118 | /* The netlink socket is only to be read by 1 CPU, which lets us assume |
119 | * that list additions and deletions never happen simultaneiously in | 119 | * that list additions and deletions never happen simultaneously in |
120 | * auditsc.c */ | 120 | * auditsc.c */ |
121 | static DECLARE_MUTEX(audit_netlink_sem); | 121 | static DECLARE_MUTEX(audit_netlink_sem); |
122 | 122 | ||
@@ -775,7 +775,7 @@ void audit_log_d_path(struct audit_buffer *ab, const char *prefix, | |||
775 | } | 775 | } |
776 | } | 776 | } |
777 | 777 | ||
778 | /* Remove queued messages from the audit_txlist and send them to userspace. */ | 778 | /* Remove queued messages from the audit_txlist and send them to user space. */ |
779 | static void audit_tasklet_handler(unsigned long arg) | 779 | static void audit_tasklet_handler(unsigned long arg) |
780 | { | 780 | { |
781 | LIST_HEAD(list); | 781 | LIST_HEAD(list); |
diff --git a/kernel/auditsc.c b/kernel/auditsc.c index 1b7c91f9d5ff..773d28a3f701 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c | |||
@@ -444,7 +444,7 @@ static enum audit_state audit_filter_task(struct task_struct *tsk) | |||
444 | 444 | ||
445 | /* At syscall entry and exit time, this filter is called if the | 445 | /* At syscall entry and exit time, this filter is called if the |
446 | * audit_state is not low enough that auditing cannot take place, but is | 446 | * audit_state is not low enough that auditing cannot take place, but is |
447 | * also not high enough that we already know we have to write and audit | 447 | * also not high enough that we already know we have to write an audit |
448 | * record (i.e., the state is AUDIT_SETUP_CONTEXT or AUDIT_BUILD_CONTEXT). | 448 | * record (i.e., the state is AUDIT_SETUP_CONTEXT or AUDIT_BUILD_CONTEXT). |
449 | */ | 449 | */ |
450 | static enum audit_state audit_filter_syscall(struct task_struct *tsk, | 450 | static enum audit_state audit_filter_syscall(struct task_struct *tsk, |
@@ -750,7 +750,7 @@ void audit_free(struct task_struct *tsk) | |||
750 | /* Compute a serial number for the audit record. Audit records are | 750 | /* Compute a serial number for the audit record. Audit records are |
751 | * written to user-space as soon as they are generated, so a complete | 751 | * written to user-space as soon as they are generated, so a complete |
752 | * audit record may be written in several pieces. The timestamp of the | 752 | * audit record may be written in several pieces. The timestamp of the |
753 | * record and this serial number are used by the user-space daemon to | 753 | * record and this serial number are used by the user-space tools to |
754 | * determine which pieces belong to the same audit record. The | 754 | * determine which pieces belong to the same audit record. The |
755 | * (timestamp,serial) tuple is unique for each syscall and is live from | 755 | * (timestamp,serial) tuple is unique for each syscall and is live from |
756 | * syscall entry to syscall exit. | 756 | * syscall entry to syscall exit. |