diff options
Diffstat (limited to 'kernel/auditfilter.c')
-rw-r--r-- | kernel/auditfilter.c | 23 |
1 files changed, 10 insertions, 13 deletions
diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c index 3598e13f2a65..4f68a326d92e 100644 --- a/kernel/auditfilter.c +++ b/kernel/auditfilter.c | |||
@@ -442,19 +442,7 @@ static struct audit_entry *audit_data_to_entry(struct audit_rule_data *data, | |||
442 | if ((f->type == AUDIT_LOGINUID) && (f->val == AUDIT_UID_UNSET)) { | 442 | if ((f->type == AUDIT_LOGINUID) && (f->val == AUDIT_UID_UNSET)) { |
443 | f->type = AUDIT_LOGINUID_SET; | 443 | f->type = AUDIT_LOGINUID_SET; |
444 | f->val = 0; | 444 | f->val = 0; |
445 | } | 445 | entry->rule.pflags |= AUDIT_LOGINUID_LEGACY; |
446 | |||
447 | if ((f->type == AUDIT_PID) || (f->type == AUDIT_PPID)) { | ||
448 | struct pid *pid; | ||
449 | rcu_read_lock(); | ||
450 | pid = find_vpid(f->val); | ||
451 | if (!pid) { | ||
452 | rcu_read_unlock(); | ||
453 | err = -ESRCH; | ||
454 | goto exit_free; | ||
455 | } | ||
456 | f->val = pid_nr(pid); | ||
457 | rcu_read_unlock(); | ||
458 | } | 446 | } |
459 | 447 | ||
460 | err = audit_field_valid(entry, f); | 448 | err = audit_field_valid(entry, f); |
@@ -630,6 +618,13 @@ static struct audit_rule_data *audit_krule_to_data(struct audit_krule *krule) | |||
630 | data->buflen += data->values[i] = | 618 | data->buflen += data->values[i] = |
631 | audit_pack_string(&bufp, krule->filterkey); | 619 | audit_pack_string(&bufp, krule->filterkey); |
632 | break; | 620 | break; |
621 | case AUDIT_LOGINUID_SET: | ||
622 | if (krule->pflags & AUDIT_LOGINUID_LEGACY && !f->val) { | ||
623 | data->fields[i] = AUDIT_LOGINUID; | ||
624 | data->values[i] = AUDIT_UID_UNSET; | ||
625 | break; | ||
626 | } | ||
627 | /* fallthrough if set */ | ||
633 | default: | 628 | default: |
634 | data->values[i] = f->val; | 629 | data->values[i] = f->val; |
635 | } | 630 | } |
@@ -646,6 +641,7 @@ static int audit_compare_rule(struct audit_krule *a, struct audit_krule *b) | |||
646 | int i; | 641 | int i; |
647 | 642 | ||
648 | if (a->flags != b->flags || | 643 | if (a->flags != b->flags || |
644 | a->pflags != b->pflags || | ||
649 | a->listnr != b->listnr || | 645 | a->listnr != b->listnr || |
650 | a->action != b->action || | 646 | a->action != b->action || |
651 | a->field_count != b->field_count) | 647 | a->field_count != b->field_count) |
@@ -764,6 +760,7 @@ struct audit_entry *audit_dupe_rule(struct audit_krule *old) | |||
764 | new = &entry->rule; | 760 | new = &entry->rule; |
765 | new->vers_ops = old->vers_ops; | 761 | new->vers_ops = old->vers_ops; |
766 | new->flags = old->flags; | 762 | new->flags = old->flags; |
763 | new->pflags = old->pflags; | ||
767 | new->listnr = old->listnr; | 764 | new->listnr = old->listnr; |
768 | new->action = old->action; | 765 | new->action = old->action; |
769 | for (i = 0; i < AUDIT_BITMASK_SIZE; i++) | 766 | for (i = 0; i < AUDIT_BITMASK_SIZE; i++) |