diff options
| author | Richard Guy Briggs <rgb@redhat.com> | 2013-05-20 15:08:18 -0400 |
|---|---|---|
| committer | Eric Paris <eparis@redhat.com> | 2013-11-05 11:07:27 -0500 |
| commit | 42f74461a5b60cf6b42887e6d2ff5b7be4abf1ca (patch) | |
| tree | 33e5ebad46ef3cbb64d4d3ea9fab16d206f72c54 | |
| parent | 0868a5e150bc4c47e7a003367cd755811eb41e0b (diff) | |
audit: change decimal constant to macro for invalid uid
SFR reported this 2013-05-15:
> After merging the final tree, today's linux-next build (i386 defconfig)
> produced this warning:
>
> kernel/auditfilter.c: In function 'audit_data_to_entry':
> kernel/auditfilter.c:426:3: warning: this decimal constant is unsigned only
> in ISO C90 [enabled by default]
>
> Introduced by commit 780a7654cee8 ("audit: Make testing for a valid
> loginuid explicit") from Linus' tree.
Replace this decimal constant in the code with a macro to make it more readable
(add to the unsigned cast to quiet the warning).
Cc: Stephen Rothwell <sfr@canb.auug.org.au>
Cc: "Eric W. Biederman" <ebiederm@xmission.com>
Signed-off-by: Richard Guy Briggs <rgb@redhat.com>
Signed-off-by: Eric Paris <eparis@redhat.com>
| -rw-r--r-- | include/uapi/linux/audit.h | 2 | ||||
| -rw-r--r-- | kernel/auditfilter.c | 2 |
2 files changed, 3 insertions, 1 deletions
diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h index 5dfcd85037e2..c1f0fced3ede 100644 --- a/include/uapi/linux/audit.h +++ b/include/uapi/linux/audit.h | |||
| @@ -380,6 +380,8 @@ struct audit_tty_status { | |||
| 380 | __u32 log_passwd; /* 1 = enabled, 0 = disabled */ | 380 | __u32 log_passwd; /* 1 = enabled, 0 = disabled */ |
| 381 | }; | 381 | }; |
| 382 | 382 | ||
| 383 | #define AUDIT_UID_UNSET (unsigned int)-1 | ||
| 384 | |||
| 383 | /* audit_rule_data supports filter rules with both integer and string | 385 | /* audit_rule_data supports filter rules with both integer and string |
| 384 | * fields. It corresponds with AUDIT_ADD_RULE, AUDIT_DEL_RULE and | 386 | * fields. It corresponds with AUDIT_ADD_RULE, AUDIT_DEL_RULE and |
| 385 | * AUDIT_LIST_RULES requests. | 387 | * AUDIT_LIST_RULES requests. |
diff --git a/kernel/auditfilter.c b/kernel/auditfilter.c index f7aee8be7fb2..8a344cebd8bf 100644 --- a/kernel/auditfilter.c +++ b/kernel/auditfilter.c | |||
| @@ -423,7 +423,7 @@ static struct audit_entry *audit_data_to_entry(struct audit_rule_data *data, | |||
| 423 | f->lsm_rule = NULL; | 423 | f->lsm_rule = NULL; |
| 424 | 424 | ||
| 425 | /* Support legacy tests for a valid loginuid */ | 425 | /* Support legacy tests for a valid loginuid */ |
| 426 | if ((f->type == AUDIT_LOGINUID) && (f->val == ~0U)) { | 426 | if ((f->type == AUDIT_LOGINUID) && (f->val == AUDIT_UID_UNSET)) { |
| 427 | f->type = AUDIT_LOGINUID_SET; | 427 | f->type = AUDIT_LOGINUID_SET; |
| 428 | f->val = 0; | 428 | f->val = 0; |
| 429 | } | 429 | } |
