summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--drivers/tty/tty_audit.c2
-rw-r--r--include/linux/init_task.h2
-rw-r--r--include/net/netlabel.h2
-rw-r--r--include/net/xfrm.h20
-rw-r--r--kernel/audit.c2
-rw-r--r--kernel/auditfilter.c2
-rw-r--r--kernel/auditsc.c2
-rw-r--r--net/xfrm/xfrm_policy.c8
-rw-r--r--net/xfrm/xfrm_state.c6
-rw-r--r--net/xfrm/xfrm_user.c12
10 files changed, 29 insertions, 29 deletions
diff --git a/drivers/tty/tty_audit.c b/drivers/tty/tty_audit.c
index a4fdce74f883..b0e540137e39 100644
--- a/drivers/tty/tty_audit.c
+++ b/drivers/tty/tty_audit.c
@@ -67,7 +67,7 @@ static void tty_audit_log(const char *description, int major, int minor,
67 struct task_struct *tsk = current; 67 struct task_struct *tsk = current;
68 uid_t uid = from_kuid(&init_user_ns, task_uid(tsk)); 68 uid_t uid = from_kuid(&init_user_ns, task_uid(tsk));
69 uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(tsk)); 69 uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(tsk));
70 u32 sessionid = audit_get_sessionid(tsk); 70 unsigned int sessionid = audit_get_sessionid(tsk);
71 71
72 ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_TTY); 72 ab = audit_log_start(NULL, GFP_KERNEL, AUDIT_TTY);
73 if (ab) { 73 if (ab) {
diff --git a/include/linux/init_task.h b/include/linux/init_task.h
index 5cd0f0949927..a143df5ee548 100644
--- a/include/linux/init_task.h
+++ b/include/linux/init_task.h
@@ -95,7 +95,7 @@ extern struct group_info init_groups;
95#ifdef CONFIG_AUDITSYSCALL 95#ifdef CONFIG_AUDITSYSCALL
96#define INIT_IDS \ 96#define INIT_IDS \
97 .loginuid = INVALID_UID, \ 97 .loginuid = INVALID_UID, \
98 .sessionid = -1, 98 .sessionid = (unsigned int)-1,
99#else 99#else
100#define INIT_IDS 100#define INIT_IDS
101#endif 101#endif
diff --git a/include/net/netlabel.h b/include/net/netlabel.h
index 2c95d55f7914..97e6dcaf12bb 100644
--- a/include/net/netlabel.h
+++ b/include/net/netlabel.h
@@ -111,7 +111,7 @@ struct cipso_v4_doi;
111struct netlbl_audit { 111struct netlbl_audit {
112 u32 secid; 112 u32 secid;
113 kuid_t loginuid; 113 kuid_t loginuid;
114 u32 sessionid; 114 unsigned int sessionid;
115}; 115};
116 116
117/* 117/*
diff --git a/include/net/xfrm.h b/include/net/xfrm.h
index e253bf0cc7ef..f8d32b908423 100644
--- a/include/net/xfrm.h
+++ b/include/net/xfrm.h
@@ -679,7 +679,7 @@ struct xfrm_spi_skb_cb {
679struct xfrm_audit { 679struct xfrm_audit {
680 u32 secid; 680 u32 secid;
681 kuid_t loginuid; 681 kuid_t loginuid;
682 u32 sessionid; 682 unsigned int sessionid;
683}; 683};
684 684
685#ifdef CONFIG_AUDITSYSCALL 685#ifdef CONFIG_AUDITSYSCALL
@@ -697,7 +697,7 @@ static inline struct audit_buffer *xfrm_audit_start(const char *op)
697 return audit_buf; 697 return audit_buf;
698} 698}
699 699
700static inline void xfrm_audit_helper_usrinfo(kuid_t auid, u32 ses, u32 secid, 700static inline void xfrm_audit_helper_usrinfo(kuid_t auid, unsigned int ses, u32 secid,
701 struct audit_buffer *audit_buf) 701 struct audit_buffer *audit_buf)
702{ 702{
703 char *secctx; 703 char *secctx;
@@ -714,13 +714,13 @@ static inline void xfrm_audit_helper_usrinfo(kuid_t auid, u32 ses, u32 secid,
714} 714}
715 715
716extern void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, 716extern void xfrm_audit_policy_add(struct xfrm_policy *xp, int result,
717 kuid_t auid, u32 ses, u32 secid); 717 kuid_t auid, unsigned int ses, u32 secid);
718extern void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, 718extern void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result,
719 kuid_t auid, u32 ses, u32 secid); 719 kuid_t auid, unsigned int ses, u32 secid);
720extern void xfrm_audit_state_add(struct xfrm_state *x, int result, 720extern void xfrm_audit_state_add(struct xfrm_state *x, int result,
721 kuid_t auid, u32 ses, u32 secid); 721 kuid_t auid, unsigned int ses, u32 secid);
722extern void xfrm_audit_state_delete(struct xfrm_state *x, int result, 722extern void xfrm_audit_state_delete(struct xfrm_state *x, int result,
723 kuid_t auid, u32 ses, u32 secid); 723 kuid_t auid, unsigned int ses, u32 secid);
724extern void xfrm_audit_state_replay_overflow(struct xfrm_state *x, 724extern void xfrm_audit_state_replay_overflow(struct xfrm_state *x,
725 struct sk_buff *skb); 725 struct sk_buff *skb);
726extern void xfrm_audit_state_replay(struct xfrm_state *x, 726extern void xfrm_audit_state_replay(struct xfrm_state *x,
@@ -733,22 +733,22 @@ extern void xfrm_audit_state_icvfail(struct xfrm_state *x,
733#else 733#else
734 734
735static inline void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, 735static inline void xfrm_audit_policy_add(struct xfrm_policy *xp, int result,
736 kuid_t auid, u32 ses, u32 secid) 736 kuid_t auid, unsigned int ses, u32 secid)
737{ 737{
738} 738}
739 739
740static inline void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, 740static inline void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result,
741 kuid_t auid, u32 ses, u32 secid) 741 kuid_t auid, unsigned int ses, u32 secid)
742{ 742{
743} 743}
744 744
745static inline void xfrm_audit_state_add(struct xfrm_state *x, int result, 745static inline void xfrm_audit_state_add(struct xfrm_state *x, int result,
746 kuid_t auid, u32 ses, u32 secid) 746 kuid_t auid, unsigned int ses, u32 secid)
747{ 747{
748} 748}
749 749
750static inline void xfrm_audit_state_delete(struct xfrm_state *x, int result, 750static inline void xfrm_audit_state_delete(struct xfrm_state *x, int result,
751 kuid_t auid, u32 ses, u32 secid) 751 kuid_t auid, unsigned int ses, u32 secid)
752{ 752{
753} 753}
754 754
diff --git a/kernel/audit.c b/kernel/audit.c
index 25e4ed016793..ce8514f9aa6c 100644
--- a/kernel/audit.c
+++ b/kernel/audit.c
@@ -1611,7 +1611,7 @@ void audit_log_d_path(struct audit_buffer *ab, const char *prefix,
1611 1611
1612void audit_log_session_info(struct audit_buffer *ab) 1612void audit_log_session_info(struct audit_buffer *ab)
1613{ 1613{
1614 u32 sessionid = audit_get_sessionid(current); 1614 unsigned int sessionid = audit_get_sessionid(current);
1615 uid_t auid = from_kuid(&init_user_ns, audit_get_loginuid(current)); 1615 uid_t auid = from_kuid(&init_user_ns, audit_get_loginuid(current));
1616 1616
1617 audit_log_format(ab, " auid=%u ses=%u", auid, sessionid); 1617 audit_log_format(ab, " auid=%u ses=%u", auid, sessionid);
diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c
index 6cc8240b7aaf..629834aa4ca4 100644
--- a/kernel/auditfilter.c
+++ b/kernel/auditfilter.c
@@ -1005,7 +1005,7 @@ static void audit_log_rule_change(char *action, struct audit_krule *rule, int re
1005{ 1005{
1006 struct audit_buffer *ab; 1006 struct audit_buffer *ab;
1007 uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(current)); 1007 uid_t loginuid = from_kuid(&init_user_ns, audit_get_loginuid(current));
1008 u32 sessionid = audit_get_sessionid(current); 1008 unsigned int sessionid = audit_get_sessionid(current);
1009 1009
1010 if (!audit_enabled) 1010 if (!audit_enabled)
1011 return; 1011 return;
diff --git a/kernel/auditsc.c b/kernel/auditsc.c
index 05634b3ba244..5c237343cd9b 100644
--- a/kernel/auditsc.c
+++ b/kernel/auditsc.c
@@ -2011,7 +2011,7 @@ int audit_set_loginuid(kuid_t loginuid)
2011 2011
2012 /* are we setting or clearing? */ 2012 /* are we setting or clearing? */
2013 if (uid_valid(loginuid)) 2013 if (uid_valid(loginuid))
2014 sessionid = atomic_inc_return(&session_id); 2014 sessionid = (unsigned int)atomic_inc_return(&session_id);
2015 2015
2016 task->sessionid = sessionid; 2016 task->sessionid = sessionid;
2017 task->loginuid = loginuid; 2017 task->loginuid = loginuid;
diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c
index 76e1873811d4..767c74a91db3 100644
--- a/net/xfrm/xfrm_policy.c
+++ b/net/xfrm/xfrm_policy.c
@@ -2899,12 +2899,12 @@ static void xfrm_policy_fini(struct net *net)
2899 flush_work(&net->xfrm.policy_hash_work); 2899 flush_work(&net->xfrm.policy_hash_work);
2900#ifdef CONFIG_XFRM_SUB_POLICY 2900#ifdef CONFIG_XFRM_SUB_POLICY
2901 audit_info.loginuid = INVALID_UID; 2901 audit_info.loginuid = INVALID_UID;
2902 audit_info.sessionid = -1; 2902 audit_info.sessionid = (unsigned int)-1;
2903 audit_info.secid = 0; 2903 audit_info.secid = 0;
2904 xfrm_policy_flush(net, XFRM_POLICY_TYPE_SUB, &audit_info); 2904 xfrm_policy_flush(net, XFRM_POLICY_TYPE_SUB, &audit_info);
2905#endif 2905#endif
2906 audit_info.loginuid = INVALID_UID; 2906 audit_info.loginuid = INVALID_UID;
2907 audit_info.sessionid = -1; 2907 audit_info.sessionid = (unsigned int)-1;
2908 audit_info.secid = 0; 2908 audit_info.secid = 0;
2909 xfrm_policy_flush(net, XFRM_POLICY_TYPE_MAIN, &audit_info); 2909 xfrm_policy_flush(net, XFRM_POLICY_TYPE_MAIN, &audit_info);
2910 2910
@@ -3010,7 +3010,7 @@ static void xfrm_audit_common_policyinfo(struct xfrm_policy *xp,
3010} 3010}
3011 3011
3012void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, 3012void xfrm_audit_policy_add(struct xfrm_policy *xp, int result,
3013 kuid_t auid, u32 sessionid, u32 secid) 3013 kuid_t auid, unsigned int sessionid, u32 secid)
3014{ 3014{
3015 struct audit_buffer *audit_buf; 3015 struct audit_buffer *audit_buf;
3016 3016
@@ -3025,7 +3025,7 @@ void xfrm_audit_policy_add(struct xfrm_policy *xp, int result,
3025EXPORT_SYMBOL_GPL(xfrm_audit_policy_add); 3025EXPORT_SYMBOL_GPL(xfrm_audit_policy_add);
3026 3026
3027void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, 3027void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result,
3028 kuid_t auid, u32 sessionid, u32 secid) 3028 kuid_t auid, unsigned int sessionid, u32 secid)
3029{ 3029{
3030 struct audit_buffer *audit_buf; 3030 struct audit_buffer *audit_buf;
3031 3031
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
index b9c3f9e943a9..dbf0719df5b0 100644
--- a/net/xfrm/xfrm_state.c
+++ b/net/xfrm/xfrm_state.c
@@ -2043,7 +2043,7 @@ void xfrm_state_fini(struct net *net)
2043 2043
2044 flush_work(&net->xfrm.state_hash_work); 2044 flush_work(&net->xfrm.state_hash_work);
2045 audit_info.loginuid = INVALID_UID; 2045 audit_info.loginuid = INVALID_UID;
2046 audit_info.sessionid = -1; 2046 audit_info.sessionid = (unsigned int)-1;
2047 audit_info.secid = 0; 2047 audit_info.secid = 0;
2048 xfrm_state_flush(net, IPSEC_PROTO_ANY, &audit_info); 2048 xfrm_state_flush(net, IPSEC_PROTO_ANY, &audit_info);
2049 flush_work(&net->xfrm.state_gc_work); 2049 flush_work(&net->xfrm.state_gc_work);
@@ -2109,7 +2109,7 @@ static void xfrm_audit_helper_pktinfo(struct sk_buff *skb, u16 family,
2109} 2109}
2110 2110
2111void xfrm_audit_state_add(struct xfrm_state *x, int result, 2111void xfrm_audit_state_add(struct xfrm_state *x, int result,
2112 kuid_t auid, u32 sessionid, u32 secid) 2112 kuid_t auid, unsigned int sessionid, u32 secid)
2113{ 2113{
2114 struct audit_buffer *audit_buf; 2114 struct audit_buffer *audit_buf;
2115 2115
@@ -2124,7 +2124,7 @@ void xfrm_audit_state_add(struct xfrm_state *x, int result,
2124EXPORT_SYMBOL_GPL(xfrm_audit_state_add); 2124EXPORT_SYMBOL_GPL(xfrm_audit_state_add);
2125 2125
2126void xfrm_audit_state_delete(struct xfrm_state *x, int result, 2126void xfrm_audit_state_delete(struct xfrm_state *x, int result,
2127 kuid_t auid, u32 sessionid, u32 secid) 2127 kuid_t auid, unsigned int sessionid, u32 secid)
2128{ 2128{
2129 struct audit_buffer *audit_buf; 2129 struct audit_buffer *audit_buf;
2130 2130
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
index f964d4c00ffb..ec97e13743e6 100644
--- a/net/xfrm/xfrm_user.c
+++ b/net/xfrm/xfrm_user.c
@@ -600,7 +600,7 @@ static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
600 int err; 600 int err;
601 struct km_event c; 601 struct km_event c;
602 kuid_t loginuid = audit_get_loginuid(current); 602 kuid_t loginuid = audit_get_loginuid(current);
603 u32 sessionid = audit_get_sessionid(current); 603 unsigned int sessionid = audit_get_sessionid(current);
604 u32 sid; 604 u32 sid;
605 605
606 err = verify_newsa_info(p, attrs); 606 err = verify_newsa_info(p, attrs);
@@ -679,7 +679,7 @@ static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
679 struct km_event c; 679 struct km_event c;
680 struct xfrm_usersa_id *p = nlmsg_data(nlh); 680 struct xfrm_usersa_id *p = nlmsg_data(nlh);
681 kuid_t loginuid = audit_get_loginuid(current); 681 kuid_t loginuid = audit_get_loginuid(current);
682 u32 sessionid = audit_get_sessionid(current); 682 unsigned int sessionid = audit_get_sessionid(current);
683 u32 sid; 683 u32 sid;
684 684
685 x = xfrm_user_state_lookup(net, p, attrs, &err); 685 x = xfrm_user_state_lookup(net, p, attrs, &err);
@@ -1405,7 +1405,7 @@ static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1405 int err; 1405 int err;
1406 int excl; 1406 int excl;
1407 kuid_t loginuid = audit_get_loginuid(current); 1407 kuid_t loginuid = audit_get_loginuid(current);
1408 u32 sessionid = audit_get_sessionid(current); 1408 unsigned int sessionid = audit_get_sessionid(current);
1409 u32 sid; 1409 u32 sid;
1410 1410
1411 err = verify_newpolicy_info(p); 1411 err = verify_newpolicy_info(p);
@@ -1663,7 +1663,7 @@ static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1663 } 1663 }
1664 } else { 1664 } else {
1665 kuid_t loginuid = audit_get_loginuid(current); 1665 kuid_t loginuid = audit_get_loginuid(current);
1666 u32 sessionid = audit_get_sessionid(current); 1666 unsigned int sessionid = audit_get_sessionid(current);
1667 u32 sid; 1667 u32 sid;
1668 1668
1669 security_task_getsecid(current, &sid); 1669 security_task_getsecid(current, &sid);
@@ -1959,7 +1959,7 @@ static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
1959 err = 0; 1959 err = 0;
1960 if (up->hard) { 1960 if (up->hard) {
1961 kuid_t loginuid = audit_get_loginuid(current); 1961 kuid_t loginuid = audit_get_loginuid(current);
1962 u32 sessionid = audit_get_sessionid(current); 1962 unsigned int sessionid = audit_get_sessionid(current);
1963 u32 sid; 1963 u32 sid;
1964 1964
1965 security_task_getsecid(current, &sid); 1965 security_task_getsecid(current, &sid);
@@ -2002,7 +2002,7 @@ static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
2002 2002
2003 if (ue->hard) { 2003 if (ue->hard) {
2004 kuid_t loginuid = audit_get_loginuid(current); 2004 kuid_t loginuid = audit_get_loginuid(current);
2005 u32 sessionid = audit_get_sessionid(current); 2005 unsigned int sessionid = audit_get_sessionid(current);
2006 u32 sid; 2006 u32 sid;
2007 2007
2008 security_task_getsecid(current, &sid); 2008 security_task_getsecid(current, &sid);