diff options
author | Eric Paris <eparis@redhat.com> | 2007-03-08 01:02:16 +0100 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2007-03-08 01:08:11 +0100 |
commit | 16bec31db751030171b31d7767fa3a5bdbe980ea (patch) | |
tree | 60b69d571ba42ef0bf9f54833bd10228220c87bd /net/key | |
parent | [IPSEC]: Add xfrm policy change auditing to pfkey_spdget (diff) | |
download | linux-16bec31db751030171b31d7767fa3a5bdbe980ea.tar.xz linux-16bec31db751030171b31d7767fa3a5bdbe980ea.zip |
[IPSEC]: xfrm audit hook misplaced in pfkey_delete and xfrm_del_sa
Inside pfkey_delete and xfrm_del_sa the audit hooks were not called if
there was any permission/security failures in attempting to do the del
operation (such as permission denied from security_xfrm_state_delete).
This patch moves the audit hook to the exit path such that all failures
(and successes) will actually get audited.
Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Venkat Yekkirala <vyekkirala@trustedcs.com>
Acked-by: James Morris <jmorris@namei.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/key')
-rw-r--r-- | net/key/af_key.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/net/key/af_key.c b/net/key/af_key.c index 1a2bd5f88b7d..a4e7e2db0ff3 100644 --- a/net/key/af_key.c +++ b/net/key/af_key.c @@ -1467,9 +1467,6 @@ static int pfkey_delete(struct sock *sk, struct sk_buff *skb, struct sadb_msg *h err = xfrm_state_delete(x); - xfrm_audit_log(audit_get_loginuid(current->audit_context), 0, - AUDIT_MAC_IPSEC_DELSA, err ? 0 : 1, NULL, x); - if (err < 0) goto out; @@ -1478,6 +1475,8 @@ static int pfkey_delete(struct sock *sk, struct sk_buff *skb, struct sadb_msg *h c.event = XFRM_MSG_DELSA; km_state_notify(x, &c); out: + xfrm_audit_log(audit_get_loginuid(current->audit_context), 0, + AUDIT_MAC_IPSEC_DELSA, err ? 0 : 1, NULL, x); xfrm_state_put(x); return err; |