Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3014654ybl; Sun, 12 Jan 2020 07:45:32 -0800 (PST) X-Google-Smtp-Source: APXvYqyuOrglceZHeuMGe79ZnLJZ1IgmDYMtII8R02vrSPXMK2KHDptJ9DsOkEUw4cDOgIJ+Rwgz X-Received: by 2002:a9d:624e:: with SMTP id i14mr10344423otk.371.1578843932657; Sun, 12 Jan 2020 07:45:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578843932; cv=none; d=google.com; s=arc-20160816; b=x4RggAmxhjTnV2mRy2h48DjYTtMC5/qiMhJDWAWiojm0c/BARf2TxOOoD/4i+v+/gQ qkOI+y1sstaNmGtV54abNsz1QodTb1wRNfIgmjxfVL+c5u95IKmGYwJDTePhhBAOMpSK ywCks8VN2ILQXtahWjKlYKnDWV+KX2uj8iowqZIq8rh9FFw+uZFCYJKr+Fwn/6LfLY8o rSN+SmFAJvroaIuqVVl6O3Z3C6kKd3w175wshUmv7b5yLdpcM+nWLGrV2ZRFunTTnqXD cnW74aQoPsRykf0nbFNO+dTkPAYmyCgmftykjPzq6z4abH3Ru50uvrmCu5v1vVjfGgYW YuEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature:domainkey-signature; bh=WZCWRBGh1t2SRmpgaZUMd0Pp5ss91MIxscX3R7XSddw=; b=sPDBT93iRuSh7T19tpd0/w58MXlRUVnNBq5tiYswaaMYtep8Szv7G78TmnaG4uaZap PNxeNUCwu50SBnAp5i2s0CnRPi0ip3GHvhYT8O//Mh3G/T+iTvvdNQxP1tXN6SaCt+CV RqvkrWvRxYtcQ5YSQ+pbHr5FVj1+jtYtWR/p4H4XloJ+7MNJgujf3Z2vTA5HXjYQ3I36 eOqTUakeDJ980UwUXX8vHJ/JL2n2QPEXwyZQxb1Zbe5xtEQjlR181iu1j3pxPzWbjJIY VQVv0VAuE6ZfiPbvl29ogoDZfXB8JpfHiHNCmKZFW6itWUr6QOIy0bhNGfisnz0mD4ae F2WA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@zoho.com header.s=zm2020 header.b=Lc42kDsn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=zoho.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w196si4710272oia.135.2020.01.12.07.45.08; Sun, 12 Jan 2020 07:45:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@zoho.com header.s=zm2020 header.b=Lc42kDsn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=zoho.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733083AbgALPnb (ORCPT + 99 others); Sun, 12 Jan 2020 10:43:31 -0500 Received: from sender4-pp-o98.zoho.com ([136.143.188.98]:25839 "EHLO sender4-pp-o98.zoho.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733062AbgALPna (ORCPT ); Sun, 12 Jan 2020 10:43:30 -0500 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=zapps768; d=zoho.com; h=from:to:cc:subject:date:message-id; b=TpebOZGE2wj9DS1vbyFXR1OxvP3buNgiUn1PZEURTyPZdokpYso5kjjexrrATRu6mebcne9AnIwh aGpqroOyu/fbaj36CLKoDHCjvHzUU7M1ct801EPqFn54RnTHSyeT DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1578843793; s=zm2020; d=zoho.com; i=yehs2007@zoho.com; h=From:To:Cc:Subject:Date:Message-Id; bh=WZCWRBGh1t2SRmpgaZUMd0Pp5ss91MIxscX3R7XSddw=; b=Lc42kDsn5FRRKHVh8hp2zXXzP2AertqsMUS+iyql394uJ17DJn0/XXHy7r2XIrbA T2chrfq2GEEqj6sZ2YMUFRqLPglrtMOJb29E+aGm/JJMpHi2x7zhkKB/rQw+5Dd4lkv 4x+Yvkb9Cq9TvAyqtqQzkYLZ+0FCX6n9X8x5EPYQ= Received: from YEHS1XPF1D05WL.lenovo.com (123.120.59.236 [123.120.59.236]) by mx.zohomail.com with SMTPS id 1578843787996562.0534033364099; Sun, 12 Jan 2020 07:43:07 -0800 (PST) From: Huaisheng Ye To: paul@paul-moore.com, sds@tycho.nsa.gov, eparis@parisplace.org, jmorris@namei.org, serge@hallyn.com Cc: tyu1@lenovo.com, linux-security-module@vger.kernel.org, selinux@vger.kernel.org, linux-kernel@vger.kernel.org, Huaisheng Ye Subject: [PATCH] selinux: remove redundant selinux_nlmsg_perm Date: Sun, 12 Jan 2020 23:42:16 +0800 Message-Id: <20200112154216.46992-1-yehs2007@zoho.com> X-Mailer: git-send-email 2.17.0.windows.1 X-ZohoMailClient: External Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Huaisheng Ye selinux_nlmsg_perm is used for only by selinux_netlink_send. Remove the redundant function to simplify the code. Signed-off-by: Huaisheng Ye --- security/selinux/hooks.c | 73 ++++++++++++++++++++++-------------------------- 1 file changed, 34 insertions(+), 39 deletions(-) diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index fb1b9da..9f3f966 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -5507,44 +5507,6 @@ static int selinux_tun_dev_open(void *security) return 0; } -static int selinux_nlmsg_perm(struct sock *sk, struct sk_buff *skb) -{ - int err = 0; - u32 perm; - struct nlmsghdr *nlh; - struct sk_security_struct *sksec = sk->sk_security; - - if (skb->len < NLMSG_HDRLEN) { - err = -EINVAL; - goto out; - } - nlh = nlmsg_hdr(skb); - - err = selinux_nlmsg_lookup(sksec->sclass, nlh->nlmsg_type, &perm); - if (err) { - if (err == -EINVAL) { - pr_warn_ratelimited("SELinux: unrecognized netlink" - " message: protocol=%hu nlmsg_type=%hu sclass=%s" - " pig=%d comm=%s\n", - sk->sk_protocol, nlh->nlmsg_type, - secclass_map[sksec->sclass - 1].name, - task_pid_nr(current), current->comm); - if (!enforcing_enabled(&selinux_state) || - security_get_allow_unknown(&selinux_state)) - err = 0; - } - - /* Ignore */ - if (err == -ENOENT) - err = 0; - goto out; - } - - err = sock_has_perm(sk, perm); -out: - return err; -} - #ifdef CONFIG_NETFILTER static unsigned int selinux_ip_forward(struct sk_buff *skb, @@ -5873,7 +5835,40 @@ static unsigned int selinux_ipv6_postroute(void *priv, static int selinux_netlink_send(struct sock *sk, struct sk_buff *skb) { - return selinux_nlmsg_perm(sk, skb); + int err = 0; + u32 perm; + struct nlmsghdr *nlh; + struct sk_security_struct *sksec = sk->sk_security; + + if (skb->len < NLMSG_HDRLEN) { + err = -EINVAL; + goto out; + } + nlh = nlmsg_hdr(skb); + + err = selinux_nlmsg_lookup(sksec->sclass, nlh->nlmsg_type, &perm); + if (err) { + if (err == -EINVAL) { + pr_warn_ratelimited("SELinux: unrecognized netlink" + " message: protocol=%hu nlmsg_type=%hu sclass=%s" + " pig=%d comm=%s\n", + sk->sk_protocol, nlh->nlmsg_type, + secclass_map[sksec->sclass - 1].name, + task_pid_nr(current), current->comm); + if (!enforcing_enabled(&selinux_state) || + security_get_allow_unknown(&selinux_state)) + err = 0; + } + + /* Ignore */ + if (err == -ENOENT) + err = 0; + goto out; + } + + err = sock_has_perm(sk, perm); +out: + return err; } static void ipc_init_security(struct ipc_security_struct *isec, u16 sclass) -- 1.8.3.1