diff options
Diffstat (limited to 'kernel/audit.c')
| -rw-r--r-- | kernel/audit.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/kernel/audit.c b/kernel/audit.c index 2924251a6547..6977ea57a7e2 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
| @@ -664,11 +664,11 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
| 664 | if (sid) { | 664 | if (sid) { |
| 665 | if (selinux_sid_to_string( | 665 | if (selinux_sid_to_string( |
| 666 | sid, &ctx, &len)) { | 666 | sid, &ctx, &len)) { |
| 667 | audit_log_format(ab, | 667 | audit_log_format(ab, |
| 668 | " ssid=%u", sid); | 668 | " ssid=%u", sid); |
| 669 | /* Maybe call audit_panic? */ | 669 | /* Maybe call audit_panic? */ |
| 670 | } else | 670 | } else |
| 671 | audit_log_format(ab, | 671 | audit_log_format(ab, |
| 672 | " subj=%s", ctx); | 672 | " subj=%s", ctx); |
| 673 | kfree(ctx); | 673 | kfree(ctx); |
| 674 | } | 674 | } |
| @@ -769,7 +769,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh) | |||
| 769 | sig_data->pid = audit_sig_pid; | 769 | sig_data->pid = audit_sig_pid; |
| 770 | memcpy(sig_data->ctx, ctx, len); | 770 | memcpy(sig_data->ctx, ctx, len); |
| 771 | kfree(ctx); | 771 | kfree(ctx); |
| 772 | audit_send_reply(NETLINK_CB(skb).pid, seq, AUDIT_SIGNAL_INFO, | 772 | audit_send_reply(NETLINK_CB(skb).pid, seq, AUDIT_SIGNAL_INFO, |
| 773 | 0, 0, sig_data, sizeof(*sig_data) + len); | 773 | 0, 0, sig_data, sizeof(*sig_data) + len); |
| 774 | kfree(sig_data); | 774 | kfree(sig_data); |
| 775 | break; | 775 | break; |
| @@ -1005,7 +1005,7 @@ unsigned int audit_serial(void) | |||
| 1005 | return ret; | 1005 | return ret; |
| 1006 | } | 1006 | } |
| 1007 | 1007 | ||
| 1008 | static inline void audit_get_stamp(struct audit_context *ctx, | 1008 | static inline void audit_get_stamp(struct audit_context *ctx, |
| 1009 | struct timespec *t, unsigned int *serial) | 1009 | struct timespec *t, unsigned int *serial) |
| 1010 | { | 1010 | { |
| 1011 | if (ctx) | 1011 | if (ctx) |
| @@ -1056,7 +1056,7 @@ struct audit_buffer *audit_log_start(struct audit_context *ctx, gfp_t gfp_mask, | |||
| 1056 | if (gfp_mask & __GFP_WAIT) | 1056 | if (gfp_mask & __GFP_WAIT) |
| 1057 | reserve = 0; | 1057 | reserve = 0; |
| 1058 | else | 1058 | else |
| 1059 | reserve = 5; /* Allow atomic callers to go up to five | 1059 | reserve = 5; /* Allow atomic callers to go up to five |
| 1060 | entries over the normal backlog limit */ | 1060 | entries over the normal backlog limit */ |
| 1061 | 1061 | ||
| 1062 | while (audit_backlog_limit | 1062 | while (audit_backlog_limit |
| @@ -1319,7 +1319,7 @@ void audit_log_d_path(struct audit_buffer *ab, const char *prefix, | |||
| 1319 | if (IS_ERR(p)) { /* Should never happen since we send PATH_MAX */ | 1319 | if (IS_ERR(p)) { /* Should never happen since we send PATH_MAX */ |
| 1320 | /* FIXME: can we save some information here? */ | 1320 | /* FIXME: can we save some information here? */ |
| 1321 | audit_log_format(ab, "<too long>"); | 1321 | audit_log_format(ab, "<too long>"); |
| 1322 | } else | 1322 | } else |
| 1323 | audit_log_untrustedstring(ab, p); | 1323 | audit_log_untrustedstring(ab, p); |
| 1324 | kfree(path); | 1324 | kfree(path); |
| 1325 | } | 1325 | } |
| @@ -1365,7 +1365,7 @@ void audit_log_end(struct audit_buffer *ab) | |||
| 1365 | * audit_log_vformat, and audit_log_end. It may be called | 1365 | * audit_log_vformat, and audit_log_end. It may be called |
| 1366 | * in any context. | 1366 | * in any context. |
| 1367 | */ | 1367 | */ |
| 1368 | void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, | 1368 | void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, |
| 1369 | const char *fmt, ...) | 1369 | const char *fmt, ...) |
| 1370 | { | 1370 | { |
| 1371 | struct audit_buffer *ab; | 1371 | struct audit_buffer *ab; |
