diff options
Diffstat (limited to 'include/net')
| -rw-r--r-- | include/net/compat.h | 3 | ||||
| -rw-r--r-- | include/net/ip_vs.h | 3 | ||||
| -rw-r--r-- | include/net/netfilter/nf_conntrack_tuple.h | 10 | ||||
| -rw-r--r-- | include/net/netlabel.h | 1 | ||||
| -rw-r--r-- | include/net/route.h | 2 | ||||
| -rw-r--r-- | include/net/xfrm.h | 23 |
6 files changed, 19 insertions, 23 deletions
diff --git a/include/net/compat.h b/include/net/compat.h index 05fa5d0254ab..164cb682e220 100644 --- a/include/net/compat.h +++ b/include/net/compat.h | |||
| @@ -42,5 +42,8 @@ extern int cmsghdr_from_user_compat_to_kern(struct msghdr *, struct sock *, unsi | |||
| 42 | 42 | ||
| 43 | extern int compat_mc_setsockopt(struct sock *, int, int, char __user *, int, | 43 | extern int compat_mc_setsockopt(struct sock *, int, int, char __user *, int, |
| 44 | int (*)(struct sock *, int, int, char __user *, int)); | 44 | int (*)(struct sock *, int, int, char __user *, int)); |
| 45 | extern int compat_mc_getsockopt(struct sock *, int, int, char __user *, | ||
| 46 | int __user *, int (*)(struct sock *, int, int, char __user *, | ||
| 47 | int __user *)); | ||
| 45 | 48 | ||
| 46 | #endif /* NET_COMPAT_H */ | 49 | #endif /* NET_COMPAT_H */ |
diff --git a/include/net/ip_vs.h b/include/net/ip_vs.h index 56f3c94ae620..9a51ebad3f1f 100644 --- a/include/net/ip_vs.h +++ b/include/net/ip_vs.h | |||
| @@ -405,7 +405,8 @@ struct sk_buff; | |||
| 405 | struct ip_vs_protocol { | 405 | struct ip_vs_protocol { |
| 406 | struct ip_vs_protocol *next; | 406 | struct ip_vs_protocol *next; |
| 407 | char *name; | 407 | char *name; |
| 408 | __u16 protocol; | 408 | u16 protocol; |
| 409 | u16 num_states; | ||
| 409 | int dont_defrag; | 410 | int dont_defrag; |
| 410 | atomic_t appcnt; /* counter of proto app incs */ | 411 | atomic_t appcnt; /* counter of proto app incs */ |
| 411 | int *timeout_table; /* protocol timeout table */ | 412 | int *timeout_table; /* protocol timeout table */ |
diff --git a/include/net/netfilter/nf_conntrack_tuple.h b/include/net/netfilter/nf_conntrack_tuple.h index 1bb7087833d3..a6874ba22d54 100644 --- a/include/net/netfilter/nf_conntrack_tuple.h +++ b/include/net/netfilter/nf_conntrack_tuple.h | |||
| @@ -107,16 +107,6 @@ struct nf_conntrack_tuple_mask | |||
| 107 | } src; | 107 | } src; |
| 108 | }; | 108 | }; |
| 109 | 109 | ||
| 110 | /* This is optimized opposed to a memset of the whole structure. Everything we | ||
| 111 | * really care about is the source/destination unions */ | ||
| 112 | #define NF_CT_TUPLE_U_BLANK(tuple) \ | ||
| 113 | do { \ | ||
| 114 | (tuple)->src.u.all = 0; \ | ||
| 115 | (tuple)->dst.u.all = 0; \ | ||
| 116 | memset(&(tuple)->src.u3, 0, sizeof((tuple)->src.u3)); \ | ||
| 117 | memset(&(tuple)->dst.u3, 0, sizeof((tuple)->dst.u3)); \ | ||
| 118 | } while (0) | ||
| 119 | |||
| 120 | #ifdef __KERNEL__ | 110 | #ifdef __KERNEL__ |
| 121 | 111 | ||
| 122 | static inline void nf_ct_dump_tuple_ip(const struct nf_conntrack_tuple *t) | 112 | static inline void nf_ct_dump_tuple_ip(const struct nf_conntrack_tuple *t) |
diff --git a/include/net/netlabel.h b/include/net/netlabel.h index 5e53a85b5ca1..e4d2d6baa983 100644 --- a/include/net/netlabel.h +++ b/include/net/netlabel.h | |||
| @@ -103,6 +103,7 @@ struct cipso_v4_doi; | |||
| 103 | struct netlbl_audit { | 103 | struct netlbl_audit { |
| 104 | u32 secid; | 104 | u32 secid; |
| 105 | uid_t loginuid; | 105 | uid_t loginuid; |
| 106 | u32 sessionid; | ||
| 106 | }; | 107 | }; |
| 107 | 108 | ||
| 108 | /* | 109 | /* |
diff --git a/include/net/route.h b/include/net/route.h index c6338802e8f1..fc836ff824cc 100644 --- a/include/net/route.h +++ b/include/net/route.h | |||
| @@ -116,7 +116,7 @@ extern int __ip_route_output_key(struct net *, struct rtable **, const struct f | |||
| 116 | extern int ip_route_output_key(struct net *, struct rtable **, struct flowi *flp); | 116 | extern int ip_route_output_key(struct net *, struct rtable **, struct flowi *flp); |
| 117 | extern int ip_route_output_flow(struct net *, struct rtable **rp, struct flowi *flp, struct sock *sk, int flags); | 117 | extern int ip_route_output_flow(struct net *, struct rtable **rp, struct flowi *flp, struct sock *sk, int flags); |
| 118 | extern int ip_route_input(struct sk_buff*, __be32 dst, __be32 src, u8 tos, struct net_device *devin); | 118 | extern int ip_route_input(struct sk_buff*, __be32 dst, __be32 src, u8 tos, struct net_device *devin); |
| 119 | extern unsigned short ip_rt_frag_needed(struct net *net, struct iphdr *iph, unsigned short new_mtu); | 119 | extern unsigned short ip_rt_frag_needed(struct net *net, struct iphdr *iph, unsigned short new_mtu, struct net_device *dev); |
| 120 | extern void ip_rt_send_redirect(struct sk_buff *skb); | 120 | extern void ip_rt_send_redirect(struct sk_buff *skb); |
| 121 | 121 | ||
| 122 | extern unsigned inet_addr_type(struct net *net, __be32 addr); | 122 | extern unsigned inet_addr_type(struct net *net, __be32 addr); |
diff --git a/include/net/xfrm.h b/include/net/xfrm.h index baa9f372cfd1..d1350bcccb03 100644 --- a/include/net/xfrm.h +++ b/include/net/xfrm.h | |||
| @@ -597,8 +597,9 @@ struct xfrm_spi_skb_cb { | |||
| 597 | /* Audit Information */ | 597 | /* Audit Information */ |
| 598 | struct xfrm_audit | 598 | struct xfrm_audit |
| 599 | { | 599 | { |
| 600 | u32 loginuid; | ||
| 601 | u32 secid; | 600 | u32 secid; |
| 601 | uid_t loginuid; | ||
| 602 | u32 sessionid; | ||
| 602 | }; | 603 | }; |
| 603 | 604 | ||
| 604 | #ifdef CONFIG_AUDITSYSCALL | 605 | #ifdef CONFIG_AUDITSYSCALL |
| @@ -616,13 +617,13 @@ static inline struct audit_buffer *xfrm_audit_start(const char *op) | |||
| 616 | return audit_buf; | 617 | return audit_buf; |
| 617 | } | 618 | } |
| 618 | 619 | ||
| 619 | static inline void xfrm_audit_helper_usrinfo(u32 auid, u32 secid, | 620 | static inline void xfrm_audit_helper_usrinfo(uid_t auid, u32 ses, u32 secid, |
| 620 | struct audit_buffer *audit_buf) | 621 | struct audit_buffer *audit_buf) |
| 621 | { | 622 | { |
| 622 | char *secctx; | 623 | char *secctx; |
| 623 | u32 secctx_len; | 624 | u32 secctx_len; |
| 624 | 625 | ||
| 625 | audit_log_format(audit_buf, " auid=%u", auid); | 626 | audit_log_format(audit_buf, " auid=%u ses=%u", auid, ses); |
| 626 | if (secid != 0 && | 627 | if (secid != 0 && |
| 627 | security_secid_to_secctx(secid, &secctx, &secctx_len) == 0) { | 628 | security_secid_to_secctx(secid, &secctx, &secctx_len) == 0) { |
| 628 | audit_log_format(audit_buf, " subj=%s", secctx); | 629 | audit_log_format(audit_buf, " subj=%s", secctx); |
| @@ -632,13 +633,13 @@ static inline void xfrm_audit_helper_usrinfo(u32 auid, u32 secid, | |||
| 632 | } | 633 | } |
| 633 | 634 | ||
| 634 | extern void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, | 635 | extern void xfrm_audit_policy_add(struct xfrm_policy *xp, int result, |
| 635 | u32 auid, u32 secid); | 636 | u32 auid, u32 ses, u32 secid); |
| 636 | extern void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, | 637 | extern void xfrm_audit_policy_delete(struct xfrm_policy *xp, int result, |
| 637 | u32 auid, u32 secid); | 638 | u32 auid, u32 ses, u32 secid); |
| 638 | extern void xfrm_audit_state_add(struct xfrm_state *x, int result, | 639 | extern void xfrm_audit_state_add(struct xfrm_state *x, int result, |
| 639 | u32 auid, u32 secid); | 640 | u32 auid, u32 ses, u32 secid); |
| 640 | extern void xfrm_audit_state_delete(struct xfrm_state *x, int result, | 641 | extern void xfrm_audit_state_delete(struct xfrm_state *x, int result, |
| 641 | u32 auid, u32 secid); | 642 | u32 auid, u32 ses, u32 secid); |
| 642 | extern void xfrm_audit_state_replay_overflow(struct xfrm_state *x, | 643 | extern void xfrm_audit_state_replay_overflow(struct xfrm_state *x, |
| 643 | struct sk_buff *skb); | 644 | struct sk_buff *skb); |
| 644 | extern void xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family); | 645 | extern void xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family); |
| @@ -647,10 +648,10 @@ extern void xfrm_audit_state_notfound(struct sk_buff *skb, u16 family, | |||
| 647 | extern void xfrm_audit_state_icvfail(struct xfrm_state *x, | 648 | extern void xfrm_audit_state_icvfail(struct xfrm_state *x, |
| 648 | struct sk_buff *skb, u8 proto); | 649 | struct sk_buff *skb, u8 proto); |
| 649 | #else | 650 | #else |
| 650 | #define xfrm_audit_policy_add(x, r, a, s) do { ; } while (0) | 651 | #define xfrm_audit_policy_add(x, r, a, se, s) do { ; } while (0) |
| 651 | #define xfrm_audit_policy_delete(x, r, a, s) do { ; } while (0) | 652 | #define xfrm_audit_policy_delete(x, r, a, se, s) do { ; } while (0) |
| 652 | #define xfrm_audit_state_add(x, r, a, s) do { ; } while (0) | 653 | #define xfrm_audit_state_add(x, r, a, se, s) do { ; } while (0) |
| 653 | #define xfrm_audit_state_delete(x, r, a, s) do { ; } while (0) | 654 | #define xfrm_audit_state_delete(x, r, a, se, s) do { ; } while (0) |
| 654 | #define xfrm_audit_state_replay_overflow(x, s) do { ; } while (0) | 655 | #define xfrm_audit_state_replay_overflow(x, s) do { ; } while (0) |
| 655 | #define xfrm_audit_state_notfound_simple(s, f) do { ; } while (0) | 656 | #define xfrm_audit_state_notfound_simple(s, f) do { ; } while (0) |
| 656 | #define xfrm_audit_state_notfound(s, f, sp, sq) do { ; } while (0) | 657 | #define xfrm_audit_state_notfound(s, f, sp, sq) do { ; } while (0) |
