|
@@ -457,7 +457,7 @@ static int audit_filter_rules(struct task_struct *tsk,
|
|
|
|
|
|
switch (f->type) {
|
|
|
case AUDIT_PID:
|
|
|
- pid = task_pid_nr(tsk);
|
|
|
+ pid = task_tgid_nr(tsk);
|
|
|
result = audit_comparator(pid, f->op, f->val);
|
|
|
break;
|
|
|
case AUDIT_PPID:
|
|
@@ -1993,7 +1993,7 @@ static void audit_log_set_loginuid(kuid_t koldloginuid, kuid_t kloginuid,
|
|
|
loginuid = from_kuid(&init_user_ns, kloginuid),
|
|
|
tty = audit_get_tty(current);
|
|
|
|
|
|
- audit_log_format(ab, "pid=%d uid=%u", task_pid_nr(current), uid);
|
|
|
+ audit_log_format(ab, "pid=%d uid=%u", task_tgid_nr(current), uid);
|
|
|
audit_log_task_context(ab);
|
|
|
audit_log_format(ab, " old-auid=%u auid=%u tty=%s old-ses=%u ses=%u res=%d",
|
|
|
oldloginuid, loginuid, tty ? tty_name(tty) : "(none)",
|
|
@@ -2220,7 +2220,7 @@ void __audit_ptrace(struct task_struct *t)
|
|
|
{
|
|
|
struct audit_context *context = current->audit_context;
|
|
|
|
|
|
- context->target_pid = task_pid_nr(t);
|
|
|
+ context->target_pid = task_tgid_nr(t);
|
|
|
context->target_auid = audit_get_loginuid(t);
|
|
|
context->target_uid = task_uid(t);
|
|
|
context->target_sessionid = audit_get_sessionid(t);
|
|
@@ -2245,7 +2245,7 @@ int __audit_signal_info(int sig, struct task_struct *t)
|
|
|
|
|
|
if (audit_pid && t->tgid == audit_pid) {
|
|
|
if (sig == SIGTERM || sig == SIGHUP || sig == SIGUSR1 || sig == SIGUSR2) {
|
|
|
- audit_sig_pid = task_pid_nr(tsk);
|
|
|
+ audit_sig_pid = task_tgid_nr(tsk);
|
|
|
if (uid_valid(tsk->loginuid))
|
|
|
audit_sig_uid = tsk->loginuid;
|
|
|
else
|
|
@@ -2345,7 +2345,7 @@ int __audit_log_bprm_fcaps(struct linux_binprm *bprm,
|
|
|
void __audit_log_capset(const struct cred *new, const struct cred *old)
|
|
|
{
|
|
|
struct audit_context *context = current->audit_context;
|
|
|
- context->capset.pid = task_pid_nr(current);
|
|
|
+ context->capset.pid = task_tgid_nr(current);
|
|
|
context->capset.cap.effective = new->cap_effective;
|
|
|
context->capset.cap.inheritable = new->cap_effective;
|
|
|
context->capset.cap.permitted = new->cap_permitted;
|
|
@@ -2377,7 +2377,7 @@ static void audit_log_task(struct audit_buffer *ab)
|
|
|
from_kgid(&init_user_ns, gid),
|
|
|
sessionid);
|
|
|
audit_log_task_context(ab);
|
|
|
- audit_log_format(ab, " pid=%d comm=", task_pid_nr(current));
|
|
|
+ audit_log_format(ab, " pid=%d comm=", task_tgid_nr(current));
|
|
|
audit_log_untrustedstring(ab, get_task_comm(comm, current));
|
|
|
audit_log_d_path_exe(ab, current->mm);
|
|
|
}
|