]> err.no Git - linux-2.6/blobdiff - security/selinux/selinuxfs.c
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6.26
[linux-2.6] / security / selinux / selinuxfs.c
index a85740530afc676fdb777c88a8cb4136d90370cd..26fabad097693ce5ea6e7ab8351e19840ad675bf 100644 (file)
@@ -42,7 +42,8 @@
 
 /* Policy capability filenames */
 static char *policycap_names[] = {
-       "network_peer_controls"
+       "network_peer_controls",
+       "open_perms"
 };
 
 unsigned int selinux_checkreqprot = CONFIG_SECURITY_SELINUX_CHECKREQPROT_VALUE;
@@ -172,9 +173,10 @@ static ssize_t sel_write_enforce(struct file * file, const char __user * buf,
                if (length)
                        goto out;
                audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
-                       "enforcing=%d old_enforcing=%d auid=%u", new_value, 
-                       selinux_enforcing,
-                       audit_get_loginuid(current->audit_context));
+                       "enforcing=%d old_enforcing=%d auid=%u ses=%u",
+                       new_value, selinux_enforcing,
+                       audit_get_loginuid(current),
+                       audit_get_sessionid(current));
                selinux_enforcing = new_value;
                if (selinux_enforcing)
                        avc_ss_reset(0);
@@ -243,8 +245,9 @@ static ssize_t sel_write_disable(struct file * file, const char __user * buf,
                if (length < 0)
                        goto out;
                audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_STATUS,
-                       "selinux=0 auid=%u",
-                       audit_get_loginuid(current->audit_context));
+                       "selinux=0 auid=%u ses=%u",
+                       audit_get_loginuid(current),
+                       audit_get_sessionid(current));
        }
 
        length = count;
@@ -356,8 +359,9 @@ out1:
                (security_get_allow_unknown() ? "allow" : "deny")));
 
        audit_log(current->audit_context, GFP_KERNEL, AUDIT_MAC_POLICY_LOAD,
-               "policy loaded auid=%u",
-               audit_get_loginuid(current->audit_context));
+               "policy loaded auid=%u ses=%u",
+               audit_get_loginuid(current),
+               audit_get_sessionid(current));
 out:
        mutex_unlock(&sel_mutex);
        vfree(data);
@@ -388,7 +392,7 @@ static ssize_t sel_write_context(struct file * file, char *buf, size_t size)
 
        if (len > SIMPLE_TRANSACTION_LIMIT) {
                printk(KERN_ERR "%s:  context size (%u) exceeds payload "
-                      "max\n", __FUNCTION__, len);
+                      "max\n", __func__, len);
                length = -ERANGE;
                goto out;
        }
@@ -641,7 +645,7 @@ static ssize_t sel_write_create(struct file * file, char *buf, size_t size)
 
        if (len > SIMPLE_TRANSACTION_LIMIT) {
                printk(KERN_ERR "%s:  context size (%u) exceeds payload "
-                      "max\n", __FUNCTION__, len);
+                      "max\n", __func__, len);
                length = -ERANGE;
                goto out3;
        }
@@ -818,7 +822,7 @@ static ssize_t sel_write_member(struct file * file, char *buf, size_t size)
 
        if (len > SIMPLE_TRANSACTION_LIMIT) {
                printk(KERN_ERR "%s:  context size (%u) exceeds payload "
-                      "max\n", __FUNCTION__, len);
+                      "max\n", __func__, len);
                length = -ERANGE;
                goto out3;
        }
@@ -1757,7 +1761,7 @@ static int sel_fill_super(struct super_block * sb, void * data, int silent)
 out:
        return ret;
 err:
-       printk(KERN_ERR "%s:  failed while creating inodes\n", __FUNCTION__);
+       printk(KERN_ERR "%s:  failed while creating inodes\n", __func__);
        goto out;
 }