summaryrefslogtreecommitdiff
path: root/usr/src
diff options
context:
space:
mode:
authorMarek Pospisil <Marek.Pospisil@Sun.COM>2009-08-20 07:41:22 -0700
committerMarek Pospisil <Marek.Pospisil@Sun.COM>2009-08-20 07:41:22 -0700
commit51d48ded6b07abf6d82b6e48dc8770cfaff462e3 (patch)
tree11a685b3cc2127c4891ec59650328224c1adcd47 /usr/src
parentf81dfbde2254c26bfd91dda1ce160868d5639804 (diff)
downloadillumos-gate-51d48ded6b07abf6d82b6e48dc8770cfaff462e3.tar.gz
6823462 AUE_CRYPTOADM, AUE_CONFIGKSSL, AUE_PF_POLICY* don't properly include au_emod information
Diffstat (limited to 'usr/src')
-rw-r--r--usr/src/uts/common/c2/audit.c44
1 files changed, 22 insertions, 22 deletions
diff --git a/usr/src/uts/common/c2/audit.c b/usr/src/uts/common/c2/audit.c
index fa010e1d24..d6ffb66927 100644
--- a/usr/src/uts/common/c2/audit.c
+++ b/usr/src/uts/common/c2/audit.c
@@ -283,10 +283,10 @@ audit_savepath(
* closes.
*/
if ((tad->tad_flag == 0 && !(tad->tad_ctrl & PAD_SAVPATH)) ||
- ((tad->tad_ctrl & PAD_PATHFND) &&
- !(kctx->auk_policy & AUDIT_PATH)) ||
- (tad->tad_ctrl & PAD_NOPATH)) {
- return (0);
+ ((tad->tad_ctrl & PAD_PATHFND) &&
+ !(kctx->auk_policy & AUDIT_PATH)) ||
+ (tad->tad_ctrl & PAD_NOPATH)) {
+ return (0);
}
tad->tad_ctrl |= PAD_NOPATH; /* prevent possible reentry */
@@ -437,10 +437,10 @@ audit_addcomponent(struct pathname *pnp)
* closes.
*/
if ((tad->tad_flag == 0 && !(tad->tad_ctrl & PAD_SAVPATH)) ||
- ((tad->tad_ctrl & PAD_PATHFND) &&
- !(kctx->auk_policy & AUDIT_PATH)) ||
- (tad->tad_ctrl & PAD_NOPATH)) {
- return;
+ ((tad->tad_ctrl & PAD_PATHFND) &&
+ !(kctx->auk_policy & AUDIT_PATH)) ||
+ (tad->tad_ctrl & PAD_NOPATH)) {
+ return;
}
return;
@@ -499,10 +499,10 @@ audit_anchorpath(struct pathname *pnp, int flag)
* closes.
*/
if ((tad->tad_flag == 0 && !(tad->tad_ctrl & PAD_SAVPATH)) ||
- ((tad->tad_ctrl & PAD_PATHFND) &&
- !(kctx->auk_policy & AUDIT_PATH)) ||
- (tad->tad_ctrl & PAD_NOPATH)) {
- return;
+ ((tad->tad_ctrl & PAD_PATHFND) &&
+ !(kctx->auk_policy & AUDIT_PATH)) ||
+ (tad->tad_ctrl & PAD_NOPATH)) {
+ return;
}
if (flag) {
@@ -570,11 +570,11 @@ audit_symlink(struct pathname *pnp, struct pathname *sympath)
* closes.
*/
if ((tad->tad_flag == 0 &&
- !(tad->tad_ctrl & PAD_SAVPATH)) ||
- ((tad->tad_ctrl & PAD_PATHFND) &&
- !(kctx->auk_policy & AUDIT_PATH)) ||
- (tad->tad_ctrl & PAD_NOPATH)) {
- return;
+ !(tad->tad_ctrl & PAD_SAVPATH)) ||
+ ((tad->tad_ctrl & PAD_PATHFND) &&
+ !(kctx->auk_policy & AUDIT_PATH)) ||
+ (tad->tad_ctrl & PAD_NOPATH)) {
+ return;
}
/*
@@ -1391,7 +1391,7 @@ audit_symlink_create(vnode_t *dvp, char *sname, char *target, int error)
return;
error = VOP_LOOKUP(dvp, sname, &vp, NULL, 0, NULL, CRED(),
- NULL, NULL, NULL);
+ NULL, NULL, NULL);
if (error == 0) {
audit_attributes(vp);
VN_RELE(vp);
@@ -1448,7 +1448,7 @@ audit_vncreate_finish(struct vnode *vp, int error)
}
if (!error && ((tad->tad_event == AUE_MKNOD) ||
- (tad->tad_event == AUE_MKDIR))) {
+ (tad->tad_event == AUE_MKDIR))) {
audit_attributes(vp);
}
@@ -2224,7 +2224,7 @@ audit_cryptoadm(int cmd, char *module_name, crypto_mech_name_t *mech_names,
AS_INC(as_generated, 1, kctx);
AS_INC(as_kernel, 1, kctx);
- au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CRYPTOADM, 0);
+ au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CRYPTOADM, tad->tad_evmod);
}
/*
@@ -2294,7 +2294,7 @@ audit_kssl(int cmd, void *params, int error)
AS_INC(as_generated, 1, kctx);
AS_INC(as_kernel, 1, kctx);
- au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CONFIGKSSL, 0);
+ au_close(kctx, (caddr_t *)&ad, AU_OK, AUE_CONFIGKSSL, tad->tad_evmod);
}
/*
@@ -2426,7 +2426,7 @@ audit_pf_policy(int cmd, cred_t *cred, netstack_t *ns, char *tun,
AS_INC(as_kernel, 1, kctx);
}
- au_close(kctx, (caddr_t *)&ad, flag, tad->tad_event, 0);
+ au_close(kctx, (caddr_t *)&ad, flag, tad->tad_event, tad->tad_evmod);
/*
* clear the ctrl flag so that we don't have spurious collection of