@@ -1023,7 +1023,6 @@ static int apparmor_task_kill(struct task_struct *target, struct kernel_siginfo
10231023 cl = aa_get_newest_cred_label (cred );
10241024 error = aa_may_signal (cred , cl , tc , tl , sig );
10251025 aa_put_label (cl );
1026- return error ;
10271026 } else {
10281027 cl = __begin_current_label_crit_section ();
10291028 error = aa_may_signal (current_cred (), cl , tc , tl , sig );
@@ -1056,9 +1055,6 @@ static int apparmor_userns_create(const struct cred *cred)
10561055 return error ;
10571056}
10581057
1059- /**
1060- * apparmor_sk_alloc_security - allocate and attach the sk_security field
1061- */
10621058static int apparmor_sk_alloc_security (struct sock * sk , int family , gfp_t flags )
10631059{
10641060 struct aa_sk_ctx * ctx ;
@@ -1072,9 +1068,6 @@ static int apparmor_sk_alloc_security(struct sock *sk, int family, gfp_t flags)
10721068 return 0 ;
10731069}
10741070
1075- /**
1076- * apparmor_sk_free_security - free the sk_security field
1077- */
10781071static void apparmor_sk_free_security (struct sock * sk )
10791072{
10801073 struct aa_sk_ctx * ctx = aa_sock (sk );
@@ -1087,6 +1080,8 @@ static void apparmor_sk_free_security(struct sock *sk)
10871080
10881081/**
10891082 * apparmor_sk_clone_security - clone the sk_security field
1083+ * @sk: sock to have security cloned
1084+ * @newsk: sock getting clone
10901085 */
10911086static void apparmor_sk_clone_security (const struct sock * sk ,
10921087 struct sock * newsk )
@@ -1103,9 +1098,6 @@ static void apparmor_sk_clone_security(const struct sock *sk,
11031098 new -> peer = aa_get_label (ctx -> peer );
11041099}
11051100
1106- /**
1107- * apparmor_socket_create - check perms before creating a new socket
1108- */
11091101static int apparmor_socket_create (int family , int type , int protocol , int kern )
11101102{
11111103 struct aa_label * label ;
@@ -1127,10 +1119,14 @@ static int apparmor_socket_create(int family, int type, int protocol, int kern)
11271119
11281120/**
11291121 * apparmor_socket_post_create - setup the per-socket security struct
1122+ * @sock: socket that is being setup
1123+ * @family: family of socket being created
1124+ * @type: type of the socket
1125+ * @ptotocol: protocol of the socket
1126+ * @kern: socket is a special kernel socket
11301127 *
11311128 * Note:
1132- * - kernel sockets currently labeled unconfined but we may want to
1133- * move to a special kernel label
1129+ * - kernel sockets labeled kernel_t used to use unconfined
11341130 * - socket may not have sk here if created with sock_create_lite or
11351131 * sock_alloc. These should be accept cases which will be handled in
11361132 * sock_graft.
@@ -1156,9 +1152,6 @@ static int apparmor_socket_post_create(struct socket *sock, int family,
11561152 return 0 ;
11571153}
11581154
1159- /**
1160- * apparmor_socket_bind - check perms before bind addr to socket
1161- */
11621155static int apparmor_socket_bind (struct socket * sock ,
11631156 struct sockaddr * address , int addrlen )
11641157{
@@ -1172,9 +1165,6 @@ static int apparmor_socket_bind(struct socket *sock,
11721165 aa_sk_perm (OP_BIND , AA_MAY_BIND , sock -> sk ));
11731166}
11741167
1175- /**
1176- * apparmor_socket_connect - check perms before connecting @sock to @address
1177- */
11781168static int apparmor_socket_connect (struct socket * sock ,
11791169 struct sockaddr * address , int addrlen )
11801170{
@@ -1188,9 +1178,6 @@ static int apparmor_socket_connect(struct socket *sock,
11881178 aa_sk_perm (OP_CONNECT , AA_MAY_CONNECT , sock -> sk ));
11891179}
11901180
1191- /**
1192- * apparmor_socket_listen - check perms before allowing listen
1193- */
11941181static int apparmor_socket_listen (struct socket * sock , int backlog )
11951182{
11961183 AA_BUG (!sock );
@@ -1202,9 +1189,7 @@ static int apparmor_socket_listen(struct socket *sock, int backlog)
12021189 aa_sk_perm (OP_LISTEN , AA_MAY_LISTEN , sock -> sk ));
12031190}
12041191
1205- /**
1206- * apparmor_socket_accept - check perms before accepting a new connection.
1207- *
1192+ /*
12081193 * Note: while @newsock is created and has some information, the accept
12091194 * has not been done.
12101195 */
@@ -1233,18 +1218,12 @@ static int aa_sock_msg_perm(const char *op, u32 request, struct socket *sock,
12331218 aa_sk_perm (op , request , sock -> sk ));
12341219}
12351220
1236- /**
1237- * apparmor_socket_sendmsg - check perms before sending msg to another socket
1238- */
12391221static int apparmor_socket_sendmsg (struct socket * sock ,
12401222 struct msghdr * msg , int size )
12411223{
12421224 return aa_sock_msg_perm (OP_SENDMSG , AA_MAY_SEND , sock , msg , size );
12431225}
12441226
1245- /**
1246- * apparmor_socket_recvmsg - check perms before receiving a message
1247- */
12481227static int apparmor_socket_recvmsg (struct socket * sock ,
12491228 struct msghdr * msg , int size , int flags )
12501229{
@@ -1263,17 +1242,11 @@ static int aa_sock_perm(const char *op, u32 request, struct socket *sock)
12631242 aa_sk_perm (op , request , sock -> sk ));
12641243}
12651244
1266- /**
1267- * apparmor_socket_getsockname - check perms before getting the local address
1268- */
12691245static int apparmor_socket_getsockname (struct socket * sock )
12701246{
12711247 return aa_sock_perm (OP_GETSOCKNAME , AA_MAY_GETATTR , sock );
12721248}
12731249
1274- /**
1275- * apparmor_socket_getpeername - check perms before getting remote address
1276- */
12771250static int apparmor_socket_getpeername (struct socket * sock )
12781251{
12791252 return aa_sock_perm (OP_GETPEERNAME , AA_MAY_GETATTR , sock );
@@ -1292,29 +1265,20 @@ static int aa_sock_opt_perm(const char *op, u32 request, struct socket *sock,
12921265 aa_sk_perm (op , request , sock -> sk ));
12931266}
12941267
1295- /**
1296- * apparmor_socket_getsockopt - check perms before getting socket options
1297- */
12981268static int apparmor_socket_getsockopt (struct socket * sock , int level ,
12991269 int optname )
13001270{
13011271 return aa_sock_opt_perm (OP_GETSOCKOPT , AA_MAY_GETOPT , sock ,
13021272 level , optname );
13031273}
13041274
1305- /**
1306- * apparmor_socket_setsockopt - check perms before setting socket options
1307- */
13081275static int apparmor_socket_setsockopt (struct socket * sock , int level ,
13091276 int optname )
13101277{
13111278 return aa_sock_opt_perm (OP_SETSOCKOPT , AA_MAY_SETOPT , sock ,
13121279 level , optname );
13131280}
13141281
1315- /**
1316- * apparmor_socket_shutdown - check perms before shutting down @sock conn
1317- */
13181282static int apparmor_socket_shutdown (struct socket * sock , int how )
13191283{
13201284 return aa_sock_perm (OP_SHUTDOWN , AA_MAY_SHUTDOWN , sock );
@@ -1323,6 +1287,8 @@ static int apparmor_socket_shutdown(struct socket *sock, int how)
13231287#ifdef CONFIG_NETWORK_SECMARK
13241288/**
13251289 * apparmor_socket_sock_rcv_skb - check perms before associating skb to sk
1290+ * @sk: sk to associate @skb with
1291+ * @skb: skb to check for perms
13261292 *
13271293 * Note: can not sleep may be called with locks held
13281294 *
@@ -1354,6 +1320,11 @@ static struct aa_label *sk_peer_label(struct sock *sk)
13541320
13551321/**
13561322 * apparmor_socket_getpeersec_stream - get security context of peer
1323+ * @sock: socket that we are trying to get the peer context of
1324+ * @optval: output - buffer to copy peer name to
1325+ * @optlen: output - size of copied name in @optval
1326+ * @len: size of @optval buffer
1327+ * Returns: 0 on success, -errno of failure
13571328 *
13581329 * Note: for tcp only valid if using ipsec or cipso on lan
13591330 */
@@ -2182,7 +2153,7 @@ __initcall(apparmor_nf_ip_init);
21822153static char nulldfa_src [] = {
21832154 #include "nulldfa.in"
21842155};
2185- struct aa_dfa * nulldfa ;
2156+ static struct aa_dfa * nulldfa ;
21862157
21872158static char stacksplitdfa_src [] = {
21882159 #include "stacksplitdfa.in"
0 commit comments