|
@@ -1466,7 +1466,7 @@ static int pfkey_add(struct sock *sk, struct sk_buff *skb, struct sadb_msg *hdr,
|
|
err = xfrm_state_update(x);
|
|
err = xfrm_state_update(x);
|
|
|
|
|
|
xfrm_audit_state_add(x, err ? 0 : 1,
|
|
xfrm_audit_state_add(x, err ? 0 : 1,
|
|
- audit_get_loginuid(current->audit_context), 0);
|
|
|
|
|
|
+ audit_get_loginuid(current), 0);
|
|
|
|
|
|
if (err < 0) {
|
|
if (err < 0) {
|
|
x->km.state = XFRM_STATE_DEAD;
|
|
x->km.state = XFRM_STATE_DEAD;
|
|
@@ -1520,7 +1520,7 @@ static int pfkey_delete(struct sock *sk, struct sk_buff *skb, struct sadb_msg *h
|
|
km_state_notify(x, &c);
|
|
km_state_notify(x, &c);
|
|
out:
|
|
out:
|
|
xfrm_audit_state_delete(x, err ? 0 : 1,
|
|
xfrm_audit_state_delete(x, err ? 0 : 1,
|
|
- audit_get_loginuid(current->audit_context), 0);
|
|
|
|
|
|
+ audit_get_loginuid(current), 0);
|
|
xfrm_state_put(x);
|
|
xfrm_state_put(x);
|
|
|
|
|
|
return err;
|
|
return err;
|
|
@@ -1695,7 +1695,7 @@ static int pfkey_flush(struct sock *sk, struct sk_buff *skb, struct sadb_msg *hd
|
|
if (proto == 0)
|
|
if (proto == 0)
|
|
return -EINVAL;
|
|
return -EINVAL;
|
|
|
|
|
|
- audit_info.loginuid = audit_get_loginuid(current->audit_context);
|
|
|
|
|
|
+ audit_info.loginuid = audit_get_loginuid(current);
|
|
audit_info.secid = 0;
|
|
audit_info.secid = 0;
|
|
err = xfrm_state_flush(proto, &audit_info);
|
|
err = xfrm_state_flush(proto, &audit_info);
|
|
if (err)
|
|
if (err)
|
|
@@ -2273,7 +2273,7 @@ static int pfkey_spdadd(struct sock *sk, struct sk_buff *skb, struct sadb_msg *h
|
|
hdr->sadb_msg_type != SADB_X_SPDUPDATE);
|
|
hdr->sadb_msg_type != SADB_X_SPDUPDATE);
|
|
|
|
|
|
xfrm_audit_policy_add(xp, err ? 0 : 1,
|
|
xfrm_audit_policy_add(xp, err ? 0 : 1,
|
|
- audit_get_loginuid(current->audit_context), 0);
|
|
|
|
|
|
+ audit_get_loginuid(current), 0);
|
|
|
|
|
|
if (err)
|
|
if (err)
|
|
goto out;
|
|
goto out;
|
|
@@ -2356,7 +2356,7 @@ static int pfkey_spddelete(struct sock *sk, struct sk_buff *skb, struct sadb_msg
|
|
return -ENOENT;
|
|
return -ENOENT;
|
|
|
|
|
|
xfrm_audit_policy_delete(xp, err ? 0 : 1,
|
|
xfrm_audit_policy_delete(xp, err ? 0 : 1,
|
|
- audit_get_loginuid(current->audit_context), 0);
|
|
|
|
|
|
+ audit_get_loginuid(current), 0);
|
|
|
|
|
|
if (err)
|
|
if (err)
|
|
goto out;
|
|
goto out;
|
|
@@ -2617,7 +2617,7 @@ static int pfkey_spdget(struct sock *sk, struct sk_buff *skb, struct sadb_msg *h
|
|
|
|
|
|
if (delete) {
|
|
if (delete) {
|
|
xfrm_audit_policy_delete(xp, err ? 0 : 1,
|
|
xfrm_audit_policy_delete(xp, err ? 0 : 1,
|
|
- audit_get_loginuid(current->audit_context), 0);
|
|
|
|
|
|
+ audit_get_loginuid(current), 0);
|
|
|
|
|
|
if (err)
|
|
if (err)
|
|
goto out;
|
|
goto out;
|
|
@@ -2694,7 +2694,7 @@ static int pfkey_spdflush(struct sock *sk, struct sk_buff *skb, struct sadb_msg
|
|
struct xfrm_audit audit_info;
|
|
struct xfrm_audit audit_info;
|
|
int err;
|
|
int err;
|
|
|
|
|
|
- audit_info.loginuid = audit_get_loginuid(current->audit_context);
|
|
|
|
|
|
+ audit_info.loginuid = audit_get_loginuid(current);
|
|
audit_info.secid = 0;
|
|
audit_info.secid = 0;
|
|
err = xfrm_policy_flush(XFRM_POLICY_TYPE_MAIN, &audit_info);
|
|
err = xfrm_policy_flush(XFRM_POLICY_TYPE_MAIN, &audit_info);
|
|
if (err)
|
|
if (err)
|