aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
Diffstat (limited to 'security')
-rw-r--r--security/selinux/avc.c4
-rw-r--r--security/selinux/hooks.c4
2 files changed, 4 insertions, 4 deletions
diff --git a/security/selinux/avc.c b/security/selinux/avc.c
index cb30c7e350b3..d43bd6baeeaa 100644
--- a/security/selinux/avc.c
+++ b/security/selinux/avc.c
@@ -495,7 +495,7 @@ static inline void avc_print_ipv6_addr(struct audit_buffer *ab,
495 char *name1, char *name2) 495 char *name1, char *name2)
496{ 496{
497 if (!ipv6_addr_any(addr)) 497 if (!ipv6_addr_any(addr))
498 audit_log_format(ab, " %s=" NIP6_FMT, name1, NIP6(*addr)); 498 audit_log_format(ab, " %s=%pI6", name1, addr);
499 if (port) 499 if (port)
500 audit_log_format(ab, " %s=%d", name2, ntohs(port)); 500 audit_log_format(ab, " %s=%d", name2, ntohs(port));
501} 501}
@@ -504,7 +504,7 @@ static inline void avc_print_ipv4_addr(struct audit_buffer *ab, __be32 addr,
504 __be16 port, char *name1, char *name2) 504 __be16 port, char *name1, char *name2)
505{ 505{
506 if (addr) 506 if (addr)
507 audit_log_format(ab, " %s=" NIPQUAD_FMT, name1, NIPQUAD(addr)); 507 audit_log_format(ab, " %s=%pI4", name1, &addr);
508 if (port) 508 if (port)
509 audit_log_format(ab, " %s=%d", name2, ntohs(port)); 509 audit_log_format(ab, " %s=%d", name2, ntohs(port));
510} 510}
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index f85597a4d733..f3c4bc12fea3 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -4628,7 +4628,7 @@ static unsigned int selinux_ip_postroute(struct sk_buff *skb, int ifindex,
4628 * as fast and as clean as possible. */ 4628 * as fast and as clean as possible. */
4629 if (selinux_compat_net || !selinux_policycap_netpeer) 4629 if (selinux_compat_net || !selinux_policycap_netpeer)
4630 return selinux_ip_postroute_compat(skb, ifindex, family); 4630 return selinux_ip_postroute_compat(skb, ifindex, family);
4631 4631#ifdef CONFIG_XFRM
4632 /* If skb->dst->xfrm is non-NULL then the packet is undergoing an IPsec 4632 /* If skb->dst->xfrm is non-NULL then the packet is undergoing an IPsec
4633 * packet transformation so allow the packet to pass without any checks 4633 * packet transformation so allow the packet to pass without any checks
4634 * since we'll have another chance to perform access control checks 4634 * since we'll have another chance to perform access control checks
@@ -4637,7 +4637,7 @@ static unsigned int selinux_ip_postroute(struct sk_buff *skb, int ifindex,
4637 * is NULL, in this case go ahead and apply access control. */ 4637 * is NULL, in this case go ahead and apply access control. */
4638 if (skb->dst != NULL && skb->dst->xfrm != NULL) 4638 if (skb->dst != NULL && skb->dst->xfrm != NULL)
4639 return NF_ACCEPT; 4639 return NF_ACCEPT;
4640 4640#endif
4641 secmark_active = selinux_secmark_enabled(); 4641 secmark_active = selinux_secmark_enabled();
4642 peerlbl_active = netlbl_enabled() || selinux_xfrm_enabled(); 4642 peerlbl_active = netlbl_enabled() || selinux_xfrm_enabled();
4643 if (!secmark_active && !peerlbl_active) 4643 if (!secmark_active && !peerlbl_active)