Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp1782450ybb; Fri, 29 Mar 2019 11:11:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqz4K7darDArb3DUxPrFDzTjyj3WolxLs0MtLtyt+M385GERZFOt182+lUZxWJit/CqrkfoL X-Received: by 2002:a63:6881:: with SMTP id d123mr46650467pgc.10.1553883106156; Fri, 29 Mar 2019 11:11:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553883106; cv=none; d=google.com; s=arc-20160816; b=akSwJgBj95mLEy4rCFYXRUiyJhv3WWKWajeIxF0xmQg/yj6WvDbvdwP8wx/o9vI5k2 01LLjuUzcvnM3fD5anSKskhLi0bnF+sakTh99P0Td+jIWmaZ3yuHoRWwXVUp1aSftWgT mlnPQpmr+0xNJDaKvbzfdTgDxV++10YYO3r9WP0SWgQcwrpfqXW0ifFi82+TAoOJznmV Ceyz6uke8hhA9aJBlKpiYO19wlaDgyOV12wFKzsoAesTl72X6NB2l0pyet4F1/gP/okN UcessmCgLmGcCa14wQawhMgZb0D+Ty3HzFeHYg7MWtfaP+L0i/yW0rQBfqGTyzKVuVpW AOHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date; bh=yQ2LqkpABL41lckUsKI/Adh0on3gb0uy8+uFMxLEd78=; b=lnZza7Nd+Wj76jk3K7PFtZGrO7rAbY/H/uw0K4/CZs8Qv2uLu162H30Oh6lAXb98bW 1zpDGL+QRUWbhIjcMg5N3SxHVmRJ984GbJx9EoqS8rkVH9DUINjWmkcUlatbOMo+hpig ychEgGN8hw2Gc1zjaa++xBki58YHqw8wPbJb8l6FWydq9jy71ZNqV6+Vjl2R2MlKIs0b loi12kbCPToZ47ZNQeF4qx+PobJa6bpsB4Y3eZQl3nCpnkDU5D1si0KLXiF7tdxpjOve 46YCbAG9dxOqDWfR4C0WI3IHdNNQEWgpDNosRxBf3Ny4C6+8B4PRVmPQqDtApdM46bIV ALkw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m5si2391166plt.12.2019.03.29.11.11.29; Fri, 29 Mar 2019 11:11:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729968AbfC2SKt (ORCPT + 99 others); Fri, 29 Mar 2019 14:10:49 -0400 Received: from namei.org ([65.99.196.166]:59226 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729652AbfC2SKt (ORCPT ); Fri, 29 Mar 2019 14:10:49 -0400 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id x2TIAmPw001059; Fri, 29 Mar 2019 18:10:48 GMT Date: Sat, 30 Mar 2019 05:10:48 +1100 (AEDT) From: James Morris To: Linus Torvalds cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [GIT PULL] security: yama fix for v5.1 Message-ID: User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Please pull this fix for the Yama LSM by Jann Horn. The following changes since commit 8c7ae38d1ce12a0eaeba655df8562552b3596c7f: afs: Fix StoreData op marshalling (2019-03-28 08:54:20 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git fixes-v5.1 for you to fetch changes up to 1aa176ef5a451adc0546d5aaa3fb107975c786b7: Yama: mark local symbols as static (2019-03-28 10:02:29 -0700) ---------------------------------------------------------------- Jann Horn (1): Yama: mark local symbols as static security/yama/yama_lsm.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) --- commit 1aa176ef5a451adc0546d5aaa3fb107975c786b7 Author: Jann Horn Date: Wed Mar 27 17:21:42 2019 -0700 Yama: mark local symbols as static sparse complains that Yama defines functions and a variable as non-static even though they don't exist in any header. Fix it by making them static. Co-developed-by: Mukesh Ojha Signed-off-by: Mukesh Ojha Signed-off-by: Jann Horn [kees: merged similar static-ness fixes into a single patch] Link: https://lkml.kernel.org/r/20190326230841.87834-1-jannh@google.com Link: https://lkml.kernel.org/r/1553673018-19234-1-git-send-email-mojha@codeaurora.org Signed-off-by: Kees Cook Signed-off-by: James Morris diff --git a/security/yama/yama_lsm.c b/security/yama/yama_lsm.c index 57cc60722dd3..efac68556b45 100644 --- a/security/yama/yama_lsm.c +++ b/security/yama/yama_lsm.c @@ -206,7 +206,7 @@ static void yama_ptracer_del(struct task_struct *tracer, * yama_task_free - check for task_pid to remove from exception list * @task: task being removed */ -void yama_task_free(struct task_struct *task) +static void yama_task_free(struct task_struct *task) { yama_ptracer_del(task, task); } @@ -222,7 +222,7 @@ void yama_task_free(struct task_struct *task) * Return 0 on success, -ve on error. -ENOSYS is returned when Yama * does not handle the given option. */ -int yama_task_prctl(int option, unsigned long arg2, unsigned long arg3, +static int yama_task_prctl(int option, unsigned long arg2, unsigned long arg3, unsigned long arg4, unsigned long arg5) { int rc = -ENOSYS; @@ -401,7 +401,7 @@ static int yama_ptrace_access_check(struct task_struct *child, * * Returns 0 if following the ptrace is allowed, -ve on error. */ -int yama_ptrace_traceme(struct task_struct *parent) +static int yama_ptrace_traceme(struct task_struct *parent) { int rc = 0; @@ -452,7 +452,7 @@ static int yama_dointvec_minmax(struct ctl_table *table, int write, static int zero; static int max_scope = YAMA_SCOPE_NO_ATTACH; -struct ctl_path yama_sysctl_path[] = { +static struct ctl_path yama_sysctl_path[] = { { .procname = "kernel", }, { .procname = "yama", }, { }