diff options
Diffstat (limited to 'security')
-rw-r--r-- | security/lsm_audit.c | 12 | ||||
-rw-r--r-- | security/selinux/hooks.c | 6 | ||||
-rw-r--r-- | security/smack/smack_lsm.c | 4 |
3 files changed, 11 insertions, 11 deletions
diff --git a/security/lsm_audit.c b/security/lsm_audit.c index 51bd0fd9c9f0..acba3dfc8d29 100644 --- a/security/lsm_audit.c +++ b/security/lsm_audit.c | |||
@@ -273,11 +273,11 @@ static void dump_common_audit_data(struct audit_buffer *ab, | |||
273 | case AF_INET: { | 273 | case AF_INET: { |
274 | struct inet_sock *inet = inet_sk(sk); | 274 | struct inet_sock *inet = inet_sk(sk); |
275 | 275 | ||
276 | print_ipv4_addr(ab, inet->rcv_saddr, | 276 | print_ipv4_addr(ab, inet->inet_rcv_saddr, |
277 | inet->sport, | 277 | inet->inet_sport, |
278 | "laddr", "lport"); | 278 | "laddr", "lport"); |
279 | print_ipv4_addr(ab, inet->daddr, | 279 | print_ipv4_addr(ab, inet->inet_daddr, |
280 | inet->dport, | 280 | inet->inet_dport, |
281 | "faddr", "fport"); | 281 | "faddr", "fport"); |
282 | break; | 282 | break; |
283 | } | 283 | } |
@@ -286,10 +286,10 @@ static void dump_common_audit_data(struct audit_buffer *ab, | |||
286 | struct ipv6_pinfo *inet6 = inet6_sk(sk); | 286 | struct ipv6_pinfo *inet6 = inet6_sk(sk); |
287 | 287 | ||
288 | print_ipv6_addr(ab, &inet6->rcv_saddr, | 288 | print_ipv6_addr(ab, &inet6->rcv_saddr, |
289 | inet->sport, | 289 | inet->inet_sport, |
290 | "laddr", "lport"); | 290 | "laddr", "lport"); |
291 | print_ipv6_addr(ab, &inet6->daddr, | 291 | print_ipv6_addr(ab, &inet6->daddr, |
292 | inet->dport, | 292 | inet->inet_dport, |
293 | "faddr", "fport"); | 293 | "faddr", "fport"); |
294 | break; | 294 | break; |
295 | } | 295 | } |
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index c96d63ec4753..7a374c2eb043 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -4093,7 +4093,7 @@ static int selinux_sock_rcv_skb_compat(struct sock *sk, struct sk_buff *skb, | |||
4093 | char *addrp; | 4093 | char *addrp; |
4094 | 4094 | ||
4095 | COMMON_AUDIT_DATA_INIT(&ad, NET); | 4095 | COMMON_AUDIT_DATA_INIT(&ad, NET); |
4096 | ad.u.net.netif = skb->iif; | 4096 | ad.u.net.netif = skb->skb_iif; |
4097 | ad.u.net.family = family; | 4097 | ad.u.net.family = family; |
4098 | err = selinux_parse_skb(skb, &ad, &addrp, 1, NULL); | 4098 | err = selinux_parse_skb(skb, &ad, &addrp, 1, NULL); |
4099 | if (err) | 4099 | if (err) |
@@ -4155,7 +4155,7 @@ static int selinux_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
4155 | return 0; | 4155 | return 0; |
4156 | 4156 | ||
4157 | COMMON_AUDIT_DATA_INIT(&ad, NET); | 4157 | COMMON_AUDIT_DATA_INIT(&ad, NET); |
4158 | ad.u.net.netif = skb->iif; | 4158 | ad.u.net.netif = skb->skb_iif; |
4159 | ad.u.net.family = family; | 4159 | ad.u.net.family = family; |
4160 | err = selinux_parse_skb(skb, &ad, &addrp, 1, NULL); | 4160 | err = selinux_parse_skb(skb, &ad, &addrp, 1, NULL); |
4161 | if (err) | 4161 | if (err) |
@@ -4167,7 +4167,7 @@ static int selinux_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
4167 | err = selinux_skb_peerlbl_sid(skb, family, &peer_sid); | 4167 | err = selinux_skb_peerlbl_sid(skb, family, &peer_sid); |
4168 | if (err) | 4168 | if (err) |
4169 | return err; | 4169 | return err; |
4170 | err = selinux_inet_sys_rcv_skb(skb->iif, addrp, family, | 4170 | err = selinux_inet_sys_rcv_skb(skb->skb_iif, addrp, family, |
4171 | peer_sid, &ad); | 4171 | peer_sid, &ad); |
4172 | if (err) { | 4172 | if (err) { |
4173 | selinux_netlbl_err(skb, err, 0); | 4173 | selinux_netlbl_err(skb, err, 0); |
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index c33b6bb9b6dd..529c9ca65878 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
@@ -2602,7 +2602,7 @@ static int smack_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb) | |||
2602 | #ifdef CONFIG_AUDIT | 2602 | #ifdef CONFIG_AUDIT |
2603 | smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_NET); | 2603 | smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_NET); |
2604 | ad.a.u.net.family = sk->sk_family; | 2604 | ad.a.u.net.family = sk->sk_family; |
2605 | ad.a.u.net.netif = skb->iif; | 2605 | ad.a.u.net.netif = skb->skb_iif; |
2606 | ipv4_skb_to_auditdata(skb, &ad.a, NULL); | 2606 | ipv4_skb_to_auditdata(skb, &ad.a, NULL); |
2607 | #endif | 2607 | #endif |
2608 | /* | 2608 | /* |
@@ -2757,7 +2757,7 @@ static int smack_inet_conn_request(struct sock *sk, struct sk_buff *skb, | |||
2757 | #ifdef CONFIG_AUDIT | 2757 | #ifdef CONFIG_AUDIT |
2758 | smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_NET); | 2758 | smk_ad_init(&ad, __func__, LSM_AUDIT_DATA_NET); |
2759 | ad.a.u.net.family = family; | 2759 | ad.a.u.net.family = family; |
2760 | ad.a.u.net.netif = skb->iif; | 2760 | ad.a.u.net.netif = skb->skb_iif; |
2761 | ipv4_skb_to_auditdata(skb, &ad.a, NULL); | 2761 | ipv4_skb_to_auditdata(skb, &ad.a, NULL); |
2762 | #endif | 2762 | #endif |
2763 | /* | 2763 | /* |