lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 17 Aug 2022 01:58:07 +0800 From: Xin Gao <gaoxin@...rlc.com> To: paul@...l-moore.com, stephen.smalley.work@...il.com, eparis@...isplace.org Cc: selinux@...r.kernel.org, linux-kernel@...r.kernel.org, Xin Gao <gaoxin@...rlc.com> Subject: [PATCH] selinux: Variable type completion 'unsigned int' is better than 'unsigned'. Signed-off-by: Xin Gao <gaoxin@...rlc.com> --- security/selinux/hooks.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index beceb89f68d9..13f3271d2c6a 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -2392,7 +2392,7 @@ static int selinux_bprm_creds_for_exec(struct linux_binprm *bprm) return 0; } -static int match_file(const void *p, struct file *file, unsigned fd) +static int match_file(const void *p, struct file *file, unsigned int fd) { return file_has_perm(p, file, file_to_av(file)) ? fd + 1 : 0; } @@ -2404,7 +2404,7 @@ static inline void flush_unauthorized_files(const struct cred *cred, struct file *file, *devnull = NULL; struct tty_struct *tty; int drop_tty = 0; - unsigned n; + unsigned int n; tty = get_current_tty(); if (tty) { -- 2.30.2
Powered by blists - more mailing lists