net.c (e844fe9b51c984472ea98be3b2d1201ba9ee3213) | net.c (33fc95d8293cfca352ac875668857293e22d7d51) |
---|---|
1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * AppArmor security module 4 * 5 * This file contains AppArmor network mediation 6 * 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2017 Canonical Ltd. --- 95 unchanged lines hidden (view full) --- 104 } 105} 106 107/* Generic af perm */ 108int aa_profile_af_perm(struct aa_profile *profile, struct common_audit_data *sa, 109 u32 request, u16 family, int type) 110{ 111 struct aa_perms perms = { }; | 1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * AppArmor security module 4 * 5 * This file contains AppArmor network mediation 6 * 7 * Copyright (C) 1998-2008 Novell/SUSE 8 * Copyright 2009-2017 Canonical Ltd. --- 95 unchanged lines hidden (view full) --- 104 } 105} 106 107/* Generic af perm */ 108int aa_profile_af_perm(struct aa_profile *profile, struct common_audit_data *sa, 109 u32 request, u16 family, int type) 110{ 111 struct aa_perms perms = { }; |
112 unsigned int state; | 112 aa_state_t state; |
113 __be16 buffer[2]; 114 115 AA_BUG(family >= AF_MAX); 116 AA_BUG(type < 0 || type >= SOCK_MAX); 117 118 if (profile_unconfined(profile)) 119 return 0; 120 state = PROFILE_MEDIATES(profile, AA_CLASS_NET); --- 137 unchanged lines hidden --- | 113 __be16 buffer[2]; 114 115 AA_BUG(family >= AF_MAX); 116 AA_BUG(type < 0 || type >= SOCK_MAX); 117 118 if (profile_unconfined(profile)) 119 return 0; 120 state = PROFILE_MEDIATES(profile, AA_CLASS_NET); --- 137 unchanged lines hidden --- |