|
@@ -738,7 +738,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
|
|
|
if (!audit_enabled && msg_type != AUDIT_USER_AVC)
|
|
|
return 0;
|
|
|
|
|
|
- err = audit_filter_user(&NETLINK_CB(skb), msg_type);
|
|
|
+ err = audit_filter_user(&NETLINK_CB(skb));
|
|
|
if (err == 1) {
|
|
|
err = 0;
|
|
|
if (msg_type == AUDIT_USER_TTY) {
|
|
@@ -779,7 +779,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
|
|
|
}
|
|
|
/* fallthrough */
|
|
|
case AUDIT_LIST:
|
|
|
- err = audit_receive_filter(nlh->nlmsg_type, NETLINK_CB(skb).pid,
|
|
|
+ err = audit_receive_filter(msg_type, NETLINK_CB(skb).pid,
|
|
|
uid, seq, data, nlmsg_len(nlh),
|
|
|
loginuid, sessionid, sid);
|
|
|
break;
|
|
@@ -798,7 +798,7 @@ static int audit_receive_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
|
|
|
}
|
|
|
/* fallthrough */
|
|
|
case AUDIT_LIST_RULES:
|
|
|
- err = audit_receive_filter(nlh->nlmsg_type, NETLINK_CB(skb).pid,
|
|
|
+ err = audit_receive_filter(msg_type, NETLINK_CB(skb).pid,
|
|
|
uid, seq, data, nlmsg_len(nlh),
|
|
|
loginuid, sessionid, sid);
|
|
|
break;
|