diff options
-rw-r--r-- | drivers/tty/tty_audit.c | 2 | ||||
-rw-r--r-- | include/linux/init_task.h | 2 | ||||
-rw-r--r-- | include/net/netlabel.h | 2 | ||||
-rw-r--r-- | include/net/xfrm.h | 20 | ||||
-rw-r--r-- | kernel/audit.c | 2 | ||||
-rw-r--r-- | kernel/auditfilter.c | 2 | ||||
-rw-r--r-- | kernel/auditsc.c | 2 | ||||
-rw-r--r-- | net/xfrm/xfrm_policy.c | 8 | ||||
-rw-r--r-- | net/xfrm/xfrm_state.c | 6 | ||||
-rw-r--r-- | net/xfrm/xfrm_user.c | 12 |
10 files changed, 29 insertions, 29 deletions
diff --git a/drivers/tty/tty_audit.c b/drivers/tty/tty_audit.c index a4fdce74f883..b0e540137e39 100644 --- a/drivers/tty/tty_audit.c +++ b/drivers/tty/tty_audit.c | |||
@@ -67,7 +67,7 @@ static void tty_audit_log(const char *description, int major, int minor, | |||
67 | struct task_struct *tsk = current; | 67 | struct task_struct *tsk = current; |
68 | uid_t uid = from_kuid(&init_user_ns, task_uid(tsk)); | 68 | uid_t uid = from_kuid(&init_user_ns, task_uid(tsk)); |
69 | uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(tsk)); | 69 | uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(tsk)); |
70 | u32 sessionid = audit_get_sessionid(tsk); | 70 | unsigned int sessionid = audit_get_sessionid(tsk); |
71 | 71 | ||
72 | ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_TTY); | 72 | ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_TTY); |
73 | if (ab) { | 73 | if (ab) { |
diff --git a/include/linux/init_task.h b/include/linux/init_task.h index 5cd0f0949927..a143df5ee548 100644 --- a/include/linux/init_task.h +++ b/include/linux/init_task.h | |||
@@ -95,7 +95,7 @@ extern struct group_info init_groups; | |||
95 | #ifdef CONFIG_AUDITSYSCALL | 95 | #ifdef CONFIG_AUDITSYSCALL |
96 | #define INIT_IDS \ | 96 | #define INIT_IDS \ |
97 | .loginuid = INVALID_UID, \ | 97 | .loginuid = INVALID_UID, \ |
98 | .sessionid = -1, | 98 | .sessionid = (unsigned int)-1, |
99 | #else | 99 | #else |
100 | #define INIT_IDS | 100 | #define INIT_IDS |
101 | #endif | 101 | #endif |
diff --git a/include/net/netlabel.h b/include/net/netlabel.h index 2c95d55f7914..97e6dcaf12bb 100644 --- a/include/net/netlabel.h +++ b/include/net/netlabel.h | |||
@@ -111,7 +111,7 @@ struct cipso_v4_doi; | |||
111 | struct netlbl_audit { | 111 | struct netlbl_audit { |
112 | u32 secid; | 112 | u32 secid; |
113 | kuid_t loginuid; | 113 | kuid_t loginuid; |
114 | u32 sessionid; | 114 | unsigned int sessionid; |
115 | }; | 115 | }; |
116 | 116 | ||
117 | /* | 117 | /* |
diff --git a/include/net/xfrm.h b/include/net/xfrm.h index e253bf0cc7ef..f8d32b908423 100644 --- a/include/net/xfrm.h +++ b/include/net/xfrm.h | |||
@@ -679,7 +679,7 @@ struct xfrm_spi_skb_cb { | |||
679 | struct xfrm_audit { | 679 | struct xfrm_audit { |
680 | u32 secid; | 680 | u32 secid; |
681 | kuid_t loginuid; | 681 | kuid_t loginuid; |
682 | u32 sessionid; | 682 | unsigned int sessionid; |
683 | }; | 683 | }; |
684 | 684 | ||
685 | #ifdef CONFIG_AUDITSYSCALL | 685 | #ifdef CONFIG_AUDITSYSCALL |
@@ -697,7 +697,7 @@ static inline struct audit_buffer *xfrm_audit_start(const char *op) | |||
697 | return audit_buf; | 697 | return audit_buf; |
698 | } | 698 | } |
699 | 699 | ||
700 | static inline void xfrm_audit_helper_usrinfo(kuid_t auid, u32 ses, u32 secid, | 700 | static inline void xfrm_audit_helper_usrinfo(kuid_t auid, unsigned int ses, u32 secid, |
701 | struct audit_buffer *audit_buf) | 701 | struct audit_buffer *audit_buf) |
702 | { | 702 | { |
703 | char *secctx; | 703 | char *secctx; |
@@ -714,13 +714,13 @@ static inline void xfrm_audit_helper_usrinfo(kuid_t auid, u32 ses, u32 secid, | |||
714 | } | 714 | } |
715 | 715 | ||
716 | extern void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, | 716 | extern void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, |
717 | kuid_t auid, u32 ses, u32 secid); | 717 | kuid_t auid, unsigned int ses, u32 secid); |
718 | extern void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, | 718 | extern void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, |
719 | kuid_t auid, u32 ses, u32 secid); | 719 | kuid_t auid, unsigned int ses, u32 secid); |
720 | extern void xfrm_audit_state_add(struct xfrm_state *x, int result, | 720 | extern void xfrm_audit_state_add(struct xfrm_state *x, int result, |
721 | kuid_t auid, u32 ses, u32 secid); | 721 | kuid_t auid, unsigned int ses, u32 secid); |
722 | extern void xfrm_audit_state_delete(struct xfrm_state *x, int result, | 722 | extern void xfrm_audit_state_delete(struct xfrm_state *x, int result, |
723 | kuid_t auid, u32 ses, u32 secid); | 723 | kuid_t auid, unsigned int ses, u32 secid); |
724 | extern void xfrm_audit_state_replay_overflow(struct xfrm_state *x, | 724 | extern void xfrm_audit_state_replay_overflow(struct xfrm_state *x, |
725 | struct sk_buff *skb); | 725 | struct sk_buff *skb); |
726 | extern void xfrm_audit_state_replay(struct xfrm_state *x, | 726 | extern void xfrm_audit_state_replay(struct xfrm_state *x, |
@@ -733,22 +733,22 @@ extern void xfrm_audit_state_icvfail(struct xfrm_state *x, | |||
733 | #else | 733 | #else |
734 | 734 | ||
735 | static inline void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, | 735 | static inline void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, |
736 | kuid_t auid, u32 ses, u32 secid) | 736 | kuid_t auid, unsigned int ses, u32 secid) |
737 | { | 737 | { |
738 | } | 738 | } |
739 | 739 | ||
740 | static inline void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, | 740 | static inline void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, |
741 | kuid_t auid, u32 ses, u32 secid) | 741 | kuid_t auid, unsigned int ses, u32 secid) |
742 | { | 742 | { |
743 | } | 743 | } |
744 | 744 | ||
745 | static inline void xfrm_audit_state_add(struct xfrm_state *x, int result, | 745 | static inline void xfrm_audit_state_add(struct xfrm_state *x, int result, |
746 | kuid_t auid, u32 ses, u32 secid) | 746 | kuid_t auid, unsigned int ses, u32 secid) |
747 | { | 747 | { |
748 | } | 748 | } |
749 | 749 | ||
750 | static inline void xfrm_audit_state_delete(struct xfrm_state *x, int result, | 750 | static inline void xfrm_audit_state_delete(struct xfrm_state *x, int result, |
751 | kuid_t auid, u32 ses, u32 secid) | 751 | kuid_t auid, unsigned int ses, u32 secid) |
752 | { | 752 | { |
753 | } | 753 | } |
754 | 754 | ||
diff --git a/kernel/audit.c b/kernel/audit.c index 25e4ed016793..ce8514f9aa6c 100644 --- a/kernel/audit.c +++ b/kernel/audit.c | |||
@@ -1611,7 +1611,7 @@ void audit_log_d_path(struct audit_buffer *ab, const char *prefix, | |||
1611 | 1611 | ||
1612 | void audit_log_session_info(struct audit_buffer *ab) | 1612 | void audit_log_session_info(struct audit_buffer *ab) |
1613 | { | 1613 | { |
1614 | u32 sessionid = audit_get_sessionid(current); | 1614 | unsigned int sessionid = audit_get_sessionid(current); |
1615 | uid_t auid = from_kuid(&init_user_ns, audit_get_loginuid(current)); | 1615 | uid_t auid = from_kuid(&init_user_ns, audit_get_loginuid(current)); |
1616 | 1616 | ||
1617 | audit_log_format(ab, " auid=%u ses=%u", auid, sessionid); | 1617 | audit_log_format(ab, " auid=%u ses=%u", auid, sessionid); |
diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c index 6cc8240b7aaf..629834aa4ca4 100644 --- a/kernel/auditfilter.c +++ b/kernel/auditfilter.c | |||
@@ -1005,7 +1005,7 @@ static void audit_log_rule_change(char *action, struct audit_krule *rule, int re | |||
1005 | { | 1005 | { |
1006 | struct audit_buffer *ab; | 1006 | struct audit_buffer *ab; |
1007 | uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(current)); | 1007 | uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(current)); |
1008 | u32 sessionid = audit_get_sessionid(current); | 1008 | unsigned int sessionid = audit_get_sessionid(current); |
1009 | 1009 | ||
1010 | if (!audit_enabled) | 1010 | if (!audit_enabled) |
1011 | return; | 1011 | return; |
diff --git a/kernel/auditsc.c b/kernel/auditsc.c index 05634b3ba244..5c237343cd9b 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c | |||
@@ -2011,7 +2011,7 @@ int audit_set_loginuid(kuid_t loginuid) | |||
2011 | 2011 | ||
2012 | /* are we setting or clearing? */ | 2012 | /* are we setting or clearing? */ |
2013 | if (uid_valid(loginuid)) | 2013 | if (uid_valid(loginuid)) |
2014 | sessionid = atomic_inc_return(&session_id); | 2014 | sessionid = (unsigned int)atomic_inc_return(&session_id); |
2015 | 2015 | ||
2016 | task->sessionid = sessionid; | 2016 | task->sessionid = sessionid; |
2017 | task->loginuid = loginuid; | 2017 | task->loginuid = loginuid; |
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c index 76e1873811d4..767c74a91db3 100644 --- a/net/xfrm/xfrm_policy.c +++ b/net/xfrm/xfrm_policy.c | |||
@@ -2899,12 +2899,12 @@ static void xfrm_policy_fini(struct net *net) | |||
2899 | flush_work(&net->xfrm.policy_hash_work); | 2899 | flush_work(&net->xfrm.policy_hash_work); |
2900 | #ifdef CONFIG_XFRM_SUB_POLICY | 2900 | #ifdef CONFIG_XFRM_SUB_POLICY |
2901 | audit_info.loginuid = INVALID_UID; | 2901 | audit_info.loginuid = INVALID_UID; |
2902 | audit_info.sessionid = -1; | 2902 | audit_info.sessionid = (unsigned int)-1; |
2903 | audit_info.secid = 0; | 2903 | audit_info.secid = 0; |
2904 | xfrm_policy_flush(net, XFRM_POLICY_TYPE_SUB, &audit_info); | 2904 | xfrm_policy_flush(net, XFRM_POLICY_TYPE_SUB, &audit_info); |
2905 | #endif | 2905 | #endif |
2906 | audit_info.loginuid = INVALID_UID; | 2906 | audit_info.loginuid = INVALID_UID; |
2907 | audit_info.sessionid = -1; | 2907 | audit_info.sessionid = (unsigned int)-1; |
2908 | audit_info.secid = 0; | 2908 | audit_info.secid = 0; |
2909 | xfrm_policy_flush(net, XFRM_POLICY_TYPE_MAIN, &audit_info); | 2909 | xfrm_policy_flush(net, XFRM_POLICY_TYPE_MAIN, &audit_info); |
2910 | 2910 | ||
@@ -3010,7 +3010,7 @@ static void xfrm_audit_common_policyinfo(struct xfrm_policy *xp, | |||
3010 | } | 3010 | } |
3011 | 3011 | ||
3012 | void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, | 3012 | void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, |
3013 | kuid_t auid, u32 sessionid, u32 secid) | 3013 | kuid_t auid, unsigned int sessionid, u32 secid) |
3014 | { | 3014 | { |
3015 | struct audit_buffer *audit_buf; | 3015 | struct audit_buffer *audit_buf; |
3016 | 3016 | ||
@@ -3025,7 +3025,7 @@ void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, | |||
3025 | EXPORT_SYMBOL_GPL(xfrm_audit_policy_add); | 3025 | EXPORT_SYMBOL_GPL(xfrm_audit_policy_add); |
3026 | 3026 | ||
3027 | void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, | 3027 | void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, |
3028 | kuid_t auid, u32 sessionid, u32 secid) | 3028 | kuid_t auid, unsigned int sessionid, u32 secid) |
3029 | { | 3029 | { |
3030 | struct audit_buffer *audit_buf; | 3030 | struct audit_buffer *audit_buf; |
3031 | 3031 | ||
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c index b9c3f9e943a9..dbf0719df5b0 100644 --- a/net/xfrm/xfrm_state.c +++ b/net/xfrm/xfrm_state.c | |||
@@ -2043,7 +2043,7 @@ void xfrm_state_fini(struct net *net) | |||
2043 | 2043 | ||
2044 | flush_work(&net->xfrm.state_hash_work); | 2044 | flush_work(&net->xfrm.state_hash_work); |
2045 | audit_info.loginuid = INVALID_UID; | 2045 | audit_info.loginuid = INVALID_UID; |
2046 | audit_info.sessionid = -1; | 2046 | audit_info.sessionid = (unsigned int)-1; |
2047 | audit_info.secid = 0; | 2047 | audit_info.secid = 0; |
2048 | xfrm_state_flush(net, IPSEC_PROTO_ANY, &audit_info); | 2048 | xfrm_state_flush(net, IPSEC_PROTO_ANY, &audit_info); |
2049 | flush_work(&net->xfrm.state_gc_work); | 2049 | flush_work(&net->xfrm.state_gc_work); |
@@ -2109,7 +2109,7 @@ static void xfrm_audit_helper_pktinfo(struct sk_buff *skb, u16 family, | |||
2109 | } | 2109 | } |
2110 | 2110 | ||
2111 | void xfrm_audit_state_add(struct xfrm_state *x, int result, | 2111 | void xfrm_audit_state_add(struct xfrm_state *x, int result, |
2112 | kuid_t auid, u32 sessionid, u32 secid) | 2112 | kuid_t auid, unsigned int sessionid, u32 secid) |
2113 | { | 2113 | { |
2114 | struct audit_buffer *audit_buf; | 2114 | struct audit_buffer *audit_buf; |
2115 | 2115 | ||
@@ -2124,7 +2124,7 @@ void xfrm_audit_state_add(struct xfrm_state *x, int result, | |||
2124 | EXPORT_SYMBOL_GPL(xfrm_audit_state_add); | 2124 | EXPORT_SYMBOL_GPL(xfrm_audit_state_add); |
2125 | 2125 | ||
2126 | void xfrm_audit_state_delete(struct xfrm_state *x, int result, | 2126 | void xfrm_audit_state_delete(struct xfrm_state *x, int result, |
2127 | kuid_t auid, u32 sessionid, u32 secid) | 2127 | kuid_t auid, unsigned int sessionid, u32 secid) |
2128 | { | 2128 | { |
2129 | struct audit_buffer *audit_buf; | 2129 | struct audit_buffer *audit_buf; |
2130 | 2130 | ||
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c index f964d4c00ffb..ec97e13743e6 100644 --- a/net/xfrm/xfrm_user.c +++ b/net/xfrm/xfrm_user.c | |||
@@ -600,7 +600,7 @@ static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
600 | int err; | 600 | int err; |
601 | struct km_event c; | 601 | struct km_event c; |
602 | kuid_t loginuid = audit_get_loginuid(current); | 602 | kuid_t loginuid = audit_get_loginuid(current); |
603 | u32 sessionid = audit_get_sessionid(current); | 603 | unsigned int sessionid = audit_get_sessionid(current); |
604 | u32 sid; | 604 | u32 sid; |
605 | 605 | ||
606 | err = verify_newsa_info(p, attrs); | 606 | err = verify_newsa_info(p, attrs); |
@@ -679,7 +679,7 @@ static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
679 | struct km_event c; | 679 | struct km_event c; |
680 | struct xfrm_usersa_id *p = nlmsg_data(nlh); | 680 | struct xfrm_usersa_id *p = nlmsg_data(nlh); |
681 | kuid_t loginuid = audit_get_loginuid(current); | 681 | kuid_t loginuid = audit_get_loginuid(current); |
682 | u32 sessionid = audit_get_sessionid(current); | 682 | unsigned int sessionid = audit_get_sessionid(current); |
683 | u32 sid; | 683 | u32 sid; |
684 | 684 | ||
685 | x = xfrm_user_state_lookup(net, p, attrs, &err); | 685 | x = xfrm_user_state_lookup(net, p, attrs, &err); |
@@ -1405,7 +1405,7 @@ static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1405 | int err; | 1405 | int err; |
1406 | int excl; | 1406 | int excl; |
1407 | kuid_t loginuid = audit_get_loginuid(current); | 1407 | kuid_t loginuid = audit_get_loginuid(current); |
1408 | u32 sessionid = audit_get_sessionid(current); | 1408 | unsigned int sessionid = audit_get_sessionid(current); |
1409 | u32 sid; | 1409 | u32 sid; |
1410 | 1410 | ||
1411 | err = verify_newpolicy_info(p); | 1411 | err = verify_newpolicy_info(p); |
@@ -1663,7 +1663,7 @@ static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1663 | } | 1663 | } |
1664 | } else { | 1664 | } else { |
1665 | kuid_t loginuid = audit_get_loginuid(current); | 1665 | kuid_t loginuid = audit_get_loginuid(current); |
1666 | u32 sessionid = audit_get_sessionid(current); | 1666 | unsigned int sessionid = audit_get_sessionid(current); |
1667 | u32 sid; | 1667 | u32 sid; |
1668 | 1668 | ||
1669 | security_task_getsecid(current, &sid); | 1669 | security_task_getsecid(current, &sid); |
@@ -1959,7 +1959,7 @@ static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
1959 | err = 0; | 1959 | err = 0; |
1960 | if (up->hard) { | 1960 | if (up->hard) { |
1961 | kuid_t loginuid = audit_get_loginuid(current); | 1961 | kuid_t loginuid = audit_get_loginuid(current); |
1962 | u32 sessionid = audit_get_sessionid(current); | 1962 | unsigned int sessionid = audit_get_sessionid(current); |
1963 | u32 sid; | 1963 | u32 sid; |
1964 | 1964 | ||
1965 | security_task_getsecid(current, &sid); | 1965 | security_task_getsecid(current, &sid); |
@@ -2002,7 +2002,7 @@ static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh, | |||
2002 | 2002 | ||
2003 | if (ue->hard) { | 2003 | if (ue->hard) { |
2004 | kuid_t loginuid = audit_get_loginuid(current); | 2004 | kuid_t loginuid = audit_get_loginuid(current); |
2005 | u32 sessionid = audit_get_sessionid(current); | 2005 | unsigned int sessionid = audit_get_sessionid(current); |
2006 | u32 sid; | 2006 | u32 sid; |
2007 | 2007 | ||
2008 | security_task_getsecid(current, &sid); | 2008 | security_task_getsecid(current, &sid); |