|
@@ -238,20 +238,21 @@ out:
|
|
|
|
|
|
static void audit_watch_log_rule_change(struct audit_krule *r, struct audit_watch *w, char *op)
|
|
|
{
|
|
|
- if (audit_enabled) {
|
|
|
- struct audit_buffer *ab;
|
|
|
- ab = audit_log_start(NULL, GFP_NOFS, AUDIT_CONFIG_CHANGE);
|
|
|
- if (unlikely(!ab))
|
|
|
- return;
|
|
|
- audit_log_format(ab, "auid=%u ses=%u op=%s",
|
|
|
- from_kuid(&init_user_ns, audit_get_loginuid(current)),
|
|
|
- audit_get_sessionid(current), op);
|
|
|
- audit_log_format(ab, " path=");
|
|
|
- audit_log_untrustedstring(ab, w->path);
|
|
|
- audit_log_key(ab, r->filterkey);
|
|
|
- audit_log_format(ab, " list=%d res=1", r->listnr);
|
|
|
- audit_log_end(ab);
|
|
|
- }
|
|
|
+ struct audit_buffer *ab;
|
|
|
+
|
|
|
+ if (!audit_enabled)
|
|
|
+ return;
|
|
|
+ ab = audit_log_start(NULL, GFP_NOFS, AUDIT_CONFIG_CHANGE);
|
|
|
+ if (!ab)
|
|
|
+ return;
|
|
|
+ audit_log_format(ab, "auid=%u ses=%u op=%s",
|
|
|
+ from_kuid(&init_user_ns, audit_get_loginuid(current)),
|
|
|
+ audit_get_sessionid(current), op);
|
|
|
+ audit_log_format(ab, " path=");
|
|
|
+ audit_log_untrustedstring(ab, w->path);
|
|
|
+ audit_log_key(ab, r->filterkey);
|
|
|
+ audit_log_format(ab, " list=%d res=1", r->listnr);
|
|
|
+ audit_log_end(ab);
|
|
|
}
|
|
|
|
|
|
/* Update inode info in audit rules based on filesystem event. */
|