@@ -1023,7 +1023,6 @@ static int apparmor_task_kill(struct task_struct *target, struct kernel_siginfo
1023
1023
cl = aa_get_newest_cred_label (cred );
1024
1024
error = aa_may_signal (cred , cl , tc , tl , sig );
1025
1025
aa_put_label (cl );
1026
- return error ;
1027
1026
} else {
1028
1027
cl = __begin_current_label_crit_section ();
1029
1028
error = aa_may_signal (current_cred (), cl , tc , tl , sig );
@@ -1056,9 +1055,6 @@ static int apparmor_userns_create(const struct cred *cred)
1056
1055
return error ;
1057
1056
}
1058
1057
1059
- /**
1060
- * apparmor_sk_alloc_security - allocate and attach the sk_security field
1061
- */
1062
1058
static int apparmor_sk_alloc_security (struct sock * sk , int family , gfp_t flags )
1063
1059
{
1064
1060
struct aa_sk_ctx * ctx ;
@@ -1072,9 +1068,6 @@ static int apparmor_sk_alloc_security(struct sock *sk, int family, gfp_t flags)
1072
1068
return 0 ;
1073
1069
}
1074
1070
1075
- /**
1076
- * apparmor_sk_free_security - free the sk_security field
1077
- */
1078
1071
static void apparmor_sk_free_security (struct sock * sk )
1079
1072
{
1080
1073
struct aa_sk_ctx * ctx = aa_sock (sk );
@@ -1087,6 +1080,8 @@ static void apparmor_sk_free_security(struct sock *sk)
1087
1080
1088
1081
/**
1089
1082
* apparmor_sk_clone_security - clone the sk_security field
1083
+ * @sk: sock to have security cloned
1084
+ * @newsk: sock getting clone
1090
1085
*/
1091
1086
static void apparmor_sk_clone_security (const struct sock * sk ,
1092
1087
struct sock * newsk )
@@ -1103,9 +1098,6 @@ static void apparmor_sk_clone_security(const struct sock *sk,
1103
1098
new -> peer = aa_get_label (ctx -> peer );
1104
1099
}
1105
1100
1106
- /**
1107
- * apparmor_socket_create - check perms before creating a new socket
1108
- */
1109
1101
static int apparmor_socket_create (int family , int type , int protocol , int kern )
1110
1102
{
1111
1103
struct aa_label * label ;
@@ -1127,10 +1119,14 @@ static int apparmor_socket_create(int family, int type, int protocol, int kern)
1127
1119
1128
1120
/**
1129
1121
* apparmor_socket_post_create - setup the per-socket security struct
1122
+ * @sock: socket that is being setup
1123
+ * @family: family of socket being created
1124
+ * @type: type of the socket
1125
+ * @ptotocol: protocol of the socket
1126
+ * @kern: socket is a special kernel socket
1130
1127
*
1131
1128
* Note:
1132
- * - kernel sockets currently labeled unconfined but we may want to
1133
- * move to a special kernel label
1129
+ * - kernel sockets labeled kernel_t used to use unconfined
1134
1130
* - socket may not have sk here if created with sock_create_lite or
1135
1131
* sock_alloc. These should be accept cases which will be handled in
1136
1132
* sock_graft.
@@ -1156,9 +1152,6 @@ static int apparmor_socket_post_create(struct socket *sock, int family,
1156
1152
return 0 ;
1157
1153
}
1158
1154
1159
- /**
1160
- * apparmor_socket_bind - check perms before bind addr to socket
1161
- */
1162
1155
static int apparmor_socket_bind (struct socket * sock ,
1163
1156
struct sockaddr * address , int addrlen )
1164
1157
{
@@ -1172,9 +1165,6 @@ static int apparmor_socket_bind(struct socket *sock,
1172
1165
aa_sk_perm (OP_BIND , AA_MAY_BIND , sock -> sk ));
1173
1166
}
1174
1167
1175
- /**
1176
- * apparmor_socket_connect - check perms before connecting @sock to @address
1177
- */
1178
1168
static int apparmor_socket_connect (struct socket * sock ,
1179
1169
struct sockaddr * address , int addrlen )
1180
1170
{
@@ -1188,9 +1178,6 @@ static int apparmor_socket_connect(struct socket *sock,
1188
1178
aa_sk_perm (OP_CONNECT , AA_MAY_CONNECT , sock -> sk ));
1189
1179
}
1190
1180
1191
- /**
1192
- * apparmor_socket_listen - check perms before allowing listen
1193
- */
1194
1181
static int apparmor_socket_listen (struct socket * sock , int backlog )
1195
1182
{
1196
1183
AA_BUG (!sock );
@@ -1202,9 +1189,7 @@ static int apparmor_socket_listen(struct socket *sock, int backlog)
1202
1189
aa_sk_perm (OP_LISTEN , AA_MAY_LISTEN , sock -> sk ));
1203
1190
}
1204
1191
1205
- /**
1206
- * apparmor_socket_accept - check perms before accepting a new connection.
1207
- *
1192
+ /*
1208
1193
* Note: while @newsock is created and has some information, the accept
1209
1194
* has not been done.
1210
1195
*/
@@ -1233,18 +1218,12 @@ static int aa_sock_msg_perm(const char *op, u32 request, struct socket *sock,
1233
1218
aa_sk_perm (op , request , sock -> sk ));
1234
1219
}
1235
1220
1236
- /**
1237
- * apparmor_socket_sendmsg - check perms before sending msg to another socket
1238
- */
1239
1221
static int apparmor_socket_sendmsg (struct socket * sock ,
1240
1222
struct msghdr * msg , int size )
1241
1223
{
1242
1224
return aa_sock_msg_perm (OP_SENDMSG , AA_MAY_SEND , sock , msg , size );
1243
1225
}
1244
1226
1245
- /**
1246
- * apparmor_socket_recvmsg - check perms before receiving a message
1247
- */
1248
1227
static int apparmor_socket_recvmsg (struct socket * sock ,
1249
1228
struct msghdr * msg , int size , int flags )
1250
1229
{
@@ -1263,17 +1242,11 @@ static int aa_sock_perm(const char *op, u32 request, struct socket *sock)
1263
1242
aa_sk_perm (op , request , sock -> sk ));
1264
1243
}
1265
1244
1266
- /**
1267
- * apparmor_socket_getsockname - check perms before getting the local address
1268
- */
1269
1245
static int apparmor_socket_getsockname (struct socket * sock )
1270
1246
{
1271
1247
return aa_sock_perm (OP_GETSOCKNAME , AA_MAY_GETATTR , sock );
1272
1248
}
1273
1249
1274
- /**
1275
- * apparmor_socket_getpeername - check perms before getting remote address
1276
- */
1277
1250
static int apparmor_socket_getpeername (struct socket * sock )
1278
1251
{
1279
1252
return aa_sock_perm (OP_GETPEERNAME , AA_MAY_GETATTR , sock );
@@ -1292,29 +1265,20 @@ static int aa_sock_opt_perm(const char *op, u32 request, struct socket *sock,
1292
1265
aa_sk_perm (op , request , sock -> sk ));
1293
1266
}
1294
1267
1295
- /**
1296
- * apparmor_socket_getsockopt - check perms before getting socket options
1297
- */
1298
1268
static int apparmor_socket_getsockopt (struct socket * sock , int level ,
1299
1269
int optname )
1300
1270
{
1301
1271
return aa_sock_opt_perm (OP_GETSOCKOPT , AA_MAY_GETOPT , sock ,
1302
1272
level , optname );
1303
1273
}
1304
1274
1305
- /**
1306
- * apparmor_socket_setsockopt - check perms before setting socket options
1307
- */
1308
1275
static int apparmor_socket_setsockopt (struct socket * sock , int level ,
1309
1276
int optname )
1310
1277
{
1311
1278
return aa_sock_opt_perm (OP_SETSOCKOPT , AA_MAY_SETOPT , sock ,
1312
1279
level , optname );
1313
1280
}
1314
1281
1315
- /**
1316
- * apparmor_socket_shutdown - check perms before shutting down @sock conn
1317
- */
1318
1282
static int apparmor_socket_shutdown (struct socket * sock , int how )
1319
1283
{
1320
1284
return aa_sock_perm (OP_SHUTDOWN , AA_MAY_SHUTDOWN , sock );
@@ -1323,6 +1287,8 @@ static int apparmor_socket_shutdown(struct socket *sock, int how)
1323
1287
#ifdef CONFIG_NETWORK_SECMARK
1324
1288
/**
1325
1289
* apparmor_socket_sock_rcv_skb - check perms before associating skb to sk
1290
+ * @sk: sk to associate @skb with
1291
+ * @skb: skb to check for perms
1326
1292
*
1327
1293
* Note: can not sleep may be called with locks held
1328
1294
*
@@ -1354,6 +1320,11 @@ static struct aa_label *sk_peer_label(struct sock *sk)
1354
1320
1355
1321
/**
1356
1322
* apparmor_socket_getpeersec_stream - get security context of peer
1323
+ * @sock: socket that we are trying to get the peer context of
1324
+ * @optval: output - buffer to copy peer name to
1325
+ * @optlen: output - size of copied name in @optval
1326
+ * @len: size of @optval buffer
1327
+ * Returns: 0 on success, -errno of failure
1357
1328
*
1358
1329
* Note: for tcp only valid if using ipsec or cipso on lan
1359
1330
*/
@@ -2182,7 +2153,7 @@ __initcall(apparmor_nf_ip_init);
2182
2153
static char nulldfa_src [] = {
2183
2154
#include "nulldfa.in"
2184
2155
};
2185
- struct aa_dfa * nulldfa ;
2156
+ static struct aa_dfa * nulldfa ;
2186
2157
2187
2158
static char stacksplitdfa_src [] = {
2188
2159
#include "stacksplitdfa.in"
0 commit comments