Merge branch 'next' of git://git.infradead.org/users/pcmoore/selinux into next
This commit is contained in:
@@ -444,11 +444,15 @@ static void avc_audit_post_callback(struct audit_buffer *ab, void *a)
|
|||||||
avc_dump_query(ab, ad->selinux_audit_data->ssid,
|
avc_dump_query(ab, ad->selinux_audit_data->ssid,
|
||||||
ad->selinux_audit_data->tsid,
|
ad->selinux_audit_data->tsid,
|
||||||
ad->selinux_audit_data->tclass);
|
ad->selinux_audit_data->tclass);
|
||||||
|
if (ad->selinux_audit_data->denied) {
|
||||||
|
audit_log_format(ab, " permissive=%u",
|
||||||
|
ad->selinux_audit_data->result ? 0 : 1);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* This is the slow part of avc audit with big stack footprint */
|
/* This is the slow part of avc audit with big stack footprint */
|
||||||
noinline int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
noinline int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
||||||
u32 requested, u32 audited, u32 denied,
|
u32 requested, u32 audited, u32 denied, int result,
|
||||||
struct common_audit_data *a,
|
struct common_audit_data *a,
|
||||||
unsigned flags)
|
unsigned flags)
|
||||||
{
|
{
|
||||||
@@ -477,6 +481,7 @@ noinline int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
|||||||
sad.tsid = tsid;
|
sad.tsid = tsid;
|
||||||
sad.audited = audited;
|
sad.audited = audited;
|
||||||
sad.denied = denied;
|
sad.denied = denied;
|
||||||
|
sad.result = result;
|
||||||
|
|
||||||
a->selinux_audit_data = &sad;
|
a->selinux_audit_data = &sad;
|
||||||
|
|
||||||
|
|||||||
@@ -2123,11 +2123,13 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm)
|
|||||||
new_tsec->exec_sid = 0;
|
new_tsec->exec_sid = 0;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Minimize confusion: if no_new_privs and a transition is
|
* Minimize confusion: if no_new_privs or nosuid and a
|
||||||
* explicitly requested, then fail the exec.
|
* transition is explicitly requested, then fail the exec.
|
||||||
*/
|
*/
|
||||||
if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)
|
if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)
|
||||||
return -EPERM;
|
return -EPERM;
|
||||||
|
if (bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID)
|
||||||
|
return -EACCES;
|
||||||
} else {
|
} else {
|
||||||
/* Check for a default transition on this program. */
|
/* Check for a default transition on this program. */
|
||||||
rc = security_transition_sid(old_tsec->sid, isec->sid,
|
rc = security_transition_sid(old_tsec->sid, isec->sid,
|
||||||
@@ -2770,6 +2772,7 @@ static int selinux_inode_follow_link(struct dentry *dentry, struct nameidata *na
|
|||||||
|
|
||||||
static noinline int audit_inode_permission(struct inode *inode,
|
static noinline int audit_inode_permission(struct inode *inode,
|
||||||
u32 perms, u32 audited, u32 denied,
|
u32 perms, u32 audited, u32 denied,
|
||||||
|
int result,
|
||||||
unsigned flags)
|
unsigned flags)
|
||||||
{
|
{
|
||||||
struct common_audit_data ad;
|
struct common_audit_data ad;
|
||||||
@@ -2780,7 +2783,7 @@ static noinline int audit_inode_permission(struct inode *inode,
|
|||||||
ad.u.inode = inode;
|
ad.u.inode = inode;
|
||||||
|
|
||||||
rc = slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms,
|
rc = slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms,
|
||||||
audited, denied, &ad, flags);
|
audited, denied, result, &ad, flags);
|
||||||
if (rc)
|
if (rc)
|
||||||
return rc;
|
return rc;
|
||||||
return 0;
|
return 0;
|
||||||
@@ -2822,7 +2825,7 @@ static int selinux_inode_permission(struct inode *inode, int mask)
|
|||||||
if (likely(!audited))
|
if (likely(!audited))
|
||||||
return rc;
|
return rc;
|
||||||
|
|
||||||
rc2 = audit_inode_permission(inode, perms, audited, denied, flags);
|
rc2 = audit_inode_permission(inode, perms, audited, denied, rc, flags);
|
||||||
if (rc2)
|
if (rc2)
|
||||||
return rc2;
|
return rc2;
|
||||||
return rc;
|
return rc;
|
||||||
|
|||||||
@@ -102,7 +102,7 @@ static inline u32 avc_audit_required(u32 requested,
|
|||||||
}
|
}
|
||||||
|
|
||||||
int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
int slow_avc_audit(u32 ssid, u32 tsid, u16 tclass,
|
||||||
u32 requested, u32 audited, u32 denied,
|
u32 requested, u32 audited, u32 denied, int result,
|
||||||
struct common_audit_data *a,
|
struct common_audit_data *a,
|
||||||
unsigned flags);
|
unsigned flags);
|
||||||
|
|
||||||
@@ -137,7 +137,7 @@ static inline int avc_audit(u32 ssid, u32 tsid,
|
|||||||
if (likely(!audited))
|
if (likely(!audited))
|
||||||
return 0;
|
return 0;
|
||||||
return slow_avc_audit(ssid, tsid, tclass,
|
return slow_avc_audit(ssid, tsid, tclass,
|
||||||
requested, audited, denied,
|
requested, audited, denied, result,
|
||||||
a, 0);
|
a, 0);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -6,6 +6,7 @@
|
|||||||
#include <linux/kernel.h>
|
#include <linux/kernel.h>
|
||||||
#include <linux/slab.h>
|
#include <linux/slab.h>
|
||||||
#include <linux/errno.h>
|
#include <linux/errno.h>
|
||||||
|
#include <linux/sched.h>
|
||||||
#include "hashtab.h"
|
#include "hashtab.h"
|
||||||
|
|
||||||
struct hashtab *hashtab_create(u32 (*hash_value)(struct hashtab *h, const void *key),
|
struct hashtab *hashtab_create(u32 (*hash_value)(struct hashtab *h, const void *key),
|
||||||
@@ -40,6 +41,8 @@ int hashtab_insert(struct hashtab *h, void *key, void *datum)
|
|||||||
u32 hvalue;
|
u32 hvalue;
|
||||||
struct hashtab_node *prev, *cur, *newnode;
|
struct hashtab_node *prev, *cur, *newnode;
|
||||||
|
|
||||||
|
cond_resched();
|
||||||
|
|
||||||
if (!h || h->nel == HASHTAB_MAX_NODES)
|
if (!h || h->nel == HASHTAB_MAX_NODES)
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
|
|||||||
@@ -492,6 +492,8 @@ int mls_convert_context(struct policydb *oldp,
|
|||||||
rc = ebitmap_set_bit(&bitmap, catdatum->value - 1, 1);
|
rc = ebitmap_set_bit(&bitmap, catdatum->value - 1, 1);
|
||||||
if (rc)
|
if (rc)
|
||||||
return rc;
|
return rc;
|
||||||
|
|
||||||
|
cond_resched();
|
||||||
}
|
}
|
||||||
ebitmap_destroy(&c->range.level[l].cat);
|
ebitmap_destroy(&c->range.level[l].cat);
|
||||||
c->range.level[l].cat = bitmap;
|
c->range.level[l].cat = bitmap;
|
||||||
|
|||||||
Reference in New Issue
Block a user