Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
0821e30c
Commit
0821e30c
authored
Nov 24, 2016
by
James Morris
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'stable-4.10' of
git://git.infradead.org/users/pcmoore/selinux
into next
parents
b075361e
9287aed2
Changes
8
Hide whitespace changes
Inline
Side-by-side
Showing
8 changed files
with
97 additions
and
72 deletions
+97
-72
fs/proc/base.c
fs/proc/base.c
+9
-14
fs/proc/fd.c
fs/proc/fd.c
+2
-4
fs/proc/internal.h
fs/proc/internal.h
+1
-1
fs/proc/namespaces.c
fs/proc/namespaces.c
+1
-2
security/selinux/hooks.c
security/selinux/hooks.c
+73
-47
security/selinux/include/classmap.h
security/selinux/include/classmap.h
+4
-0
security/selinux/include/objsec.h
security/selinux/include/objsec.h
+3
-2
security/selinux/selinuxfs.c
security/selinux/selinuxfs.c
+4
-2
No files found.
fs/proc/base.c
View file @
0821e30c
...
...
@@ -1664,7 +1664,8 @@ const struct inode_operations proc_pid_link_inode_operations = {
/* building an inode */
struct
inode
*
proc_pid_make_inode
(
struct
super_block
*
sb
,
struct
task_struct
*
task
)
struct
inode
*
proc_pid_make_inode
(
struct
super_block
*
sb
,
struct
task_struct
*
task
,
umode_t
mode
)
{
struct
inode
*
inode
;
struct
proc_inode
*
ei
;
...
...
@@ -1678,6 +1679,7 @@ struct inode *proc_pid_make_inode(struct super_block * sb, struct task_struct *t
/* Common stuff */
ei
=
PROC_I
(
inode
);
inode
->
i_mode
=
mode
;
inode
->
i_ino
=
get_next_ino
();
inode
->
i_mtime
=
inode
->
i_atime
=
inode
->
i_ctime
=
current_time
(
inode
);
inode
->
i_op
=
&
proc_def_inode_operations
;
...
...
@@ -2004,7 +2006,9 @@ proc_map_files_instantiate(struct inode *dir, struct dentry *dentry,
struct
proc_inode
*
ei
;
struct
inode
*
inode
;
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
);
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
,
S_IFLNK
|
((
mode
&
FMODE_READ
)
?
S_IRUSR
:
0
)
|
((
mode
&
FMODE_WRITE
)
?
S_IWUSR
:
0
));
if
(
!
inode
)
return
-
ENOENT
;
...
...
@@ -2013,12 +2017,6 @@ proc_map_files_instantiate(struct inode *dir, struct dentry *dentry,
inode
->
i_op
=
&
proc_map_files_link_inode_operations
;
inode
->
i_size
=
64
;
inode
->
i_mode
=
S_IFLNK
;
if
(
mode
&
FMODE_READ
)
inode
->
i_mode
|=
S_IRUSR
;
if
(
mode
&
FMODE_WRITE
)
inode
->
i_mode
|=
S_IWUSR
;
d_set_d_op
(
dentry
,
&
tid_map_files_dentry_operations
);
d_add
(
dentry
,
inode
);
...
...
@@ -2372,12 +2370,11 @@ static int proc_pident_instantiate(struct inode *dir,
struct
inode
*
inode
;
struct
proc_inode
*
ei
;
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
);
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
,
p
->
mode
);
if
(
!
inode
)
goto
out
;
ei
=
PROC_I
(
inode
);
inode
->
i_mode
=
p
->
mode
;
if
(
S_ISDIR
(
inode
->
i_mode
))
set_nlink
(
inode
,
2
);
/* Use getattr to fix if necessary */
if
(
p
->
iop
)
...
...
@@ -3059,11 +3056,10 @@ static int proc_pid_instantiate(struct inode *dir,
{
struct
inode
*
inode
;
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
);
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
,
S_IFDIR
|
S_IRUGO
|
S_IXUGO
);
if
(
!
inode
)
goto
out
;
inode
->
i_mode
=
S_IFDIR
|
S_IRUGO
|
S_IXUGO
;
inode
->
i_op
=
&
proc_tgid_base_inode_operations
;
inode
->
i_fop
=
&
proc_tgid_base_operations
;
inode
->
i_flags
|=
S_IMMUTABLE
;
...
...
@@ -3352,11 +3348,10 @@ static int proc_task_instantiate(struct inode *dir,
struct
dentry
*
dentry
,
struct
task_struct
*
task
,
const
void
*
ptr
)
{
struct
inode
*
inode
;
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
);
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
,
S_IFDIR
|
S_IRUGO
|
S_IXUGO
);
if
(
!
inode
)
goto
out
;
inode
->
i_mode
=
S_IFDIR
|
S_IRUGO
|
S_IXUGO
;
inode
->
i_op
=
&
proc_tid_base_inode_operations
;
inode
->
i_fop
=
&
proc_tid_base_operations
;
inode
->
i_flags
|=
S_IMMUTABLE
;
...
...
fs/proc/fd.c
View file @
0821e30c
...
...
@@ -183,14 +183,13 @@ proc_fd_instantiate(struct inode *dir, struct dentry *dentry,
struct
proc_inode
*
ei
;
struct
inode
*
inode
;
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
);
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
,
S_IFLNK
);
if
(
!
inode
)
goto
out
;
ei
=
PROC_I
(
inode
);
ei
->
fd
=
fd
;
inode
->
i_mode
=
S_IFLNK
;
inode
->
i_op
=
&
proc_pid_link_inode_operations
;
inode
->
i_size
=
64
;
...
...
@@ -322,14 +321,13 @@ proc_fdinfo_instantiate(struct inode *dir, struct dentry *dentry,
struct
proc_inode
*
ei
;
struct
inode
*
inode
;
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
);
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
,
S_IFREG
|
S_IRUSR
);
if
(
!
inode
)
goto
out
;
ei
=
PROC_I
(
inode
);
ei
->
fd
=
fd
;
inode
->
i_mode
=
S_IFREG
|
S_IRUSR
;
inode
->
i_fop
=
&
proc_fdinfo_file_operations
;
d_set_d_op
(
dentry
,
&
tid_fd_dentry_operations
);
...
...
fs/proc/internal.h
View file @
0821e30c
...
...
@@ -162,7 +162,7 @@ extern int proc_pid_statm(struct seq_file *, struct pid_namespace *,
extern
const
struct
dentry_operations
pid_dentry_operations
;
extern
int
pid_getattr
(
struct
vfsmount
*
,
struct
dentry
*
,
struct
kstat
*
);
extern
int
proc_setattr
(
struct
dentry
*
,
struct
iattr
*
);
extern
struct
inode
*
proc_pid_make_inode
(
struct
super_block
*
,
struct
task_struct
*
);
extern
struct
inode
*
proc_pid_make_inode
(
struct
super_block
*
,
struct
task_struct
*
,
umode_t
);
extern
int
pid_revalidate
(
struct
dentry
*
,
unsigned
int
);
extern
int
pid_delete_dentry
(
const
struct
dentry
*
);
extern
int
proc_pid_readdir
(
struct
file
*
,
struct
dir_context
*
);
...
...
fs/proc/namespaces.c
View file @
0821e30c
...
...
@@ -92,12 +92,11 @@ static int proc_ns_instantiate(struct inode *dir,
struct
inode
*
inode
;
struct
proc_inode
*
ei
;
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
);
inode
=
proc_pid_make_inode
(
dir
->
i_sb
,
task
,
S_IFLNK
|
S_IRWXUGO
);
if
(
!
inode
)
goto
out
;
ei
=
PROC_I
(
inode
);
inode
->
i_mode
=
S_IFLNK
|
S_IRWXUGO
;
inode
->
i_op
=
&
proc_ns_link_inode_operations
;
ei
->
ns_ops
=
ns_ops
;
...
...
security/selinux/hooks.c
View file @
0821e30c
...
...
@@ -231,12 +231,13 @@ static int inode_alloc_security(struct inode *inode)
if
(
!
isec
)
return
-
ENOMEM
;
mutex
_init
(
&
isec
->
lock
);
spin_lock
_init
(
&
isec
->
lock
);
INIT_LIST_HEAD
(
&
isec
->
list
);
isec
->
inode
=
inode
;
isec
->
sid
=
SECINITSID_UNLABELED
;
isec
->
sclass
=
SECCLASS_FILE
;
isec
->
task_sid
=
sid
;
isec
->
initialized
=
LABEL_INVALID
;
inode
->
i_security
=
isec
;
return
0
;
...
...
@@ -247,7 +248,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
/*
* Try reloading inode security labels that have been marked as invalid. The
* @may_sleep parameter indicates when sleeping and thus reloading labels is
* allowed; when set to false, returns
ERR_PTR(-ECHILD)
when the label is
* allowed; when set to false, returns
-ECHILD
when the label is
* invalid. The @opt_dentry parameter should be set to a dentry of the inode;
* when no dentry is available, set it to NULL instead.
*/
...
...
@@ -1100,11 +1101,12 @@ static int selinux_parse_opts_str(char *options,
}
rc
=
-
ENOMEM
;
opts
->
mnt_opts
=
kcalloc
(
NUM_SEL_MNT_OPTS
,
sizeof
(
char
*
),
GFP_
ATOMIC
);
opts
->
mnt_opts
=
kcalloc
(
NUM_SEL_MNT_OPTS
,
sizeof
(
char
*
),
GFP_
KERNEL
);
if
(
!
opts
->
mnt_opts
)
goto
out_err
;
opts
->
mnt_opts_flags
=
kcalloc
(
NUM_SEL_MNT_OPTS
,
sizeof
(
int
),
GFP_ATOMIC
);
opts
->
mnt_opts_flags
=
kcalloc
(
NUM_SEL_MNT_OPTS
,
sizeof
(
int
),
GFP_KERNEL
);
if
(
!
opts
->
mnt_opts_flags
)
{
kfree
(
opts
->
mnt_opts
);
goto
out_err
;
...
...
@@ -1380,7 +1382,8 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
{
struct
superblock_security_struct
*
sbsec
=
NULL
;
struct
inode_security_struct
*
isec
=
inode
->
i_security
;
u32
sid
;
u32
task_sid
,
sid
=
0
;
u16
sclass
;
struct
dentry
*
dentry
;
#define INITCONTEXTLEN 255
char
*
context
=
NULL
;
...
...
@@ -1388,12 +1391,15 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
int
rc
=
0
;
if
(
isec
->
initialized
==
LABEL_INITIALIZED
)
goto
out
;
return
0
;
mutex
_lock
(
&
isec
->
lock
);
spin
_lock
(
&
isec
->
lock
);
if
(
isec
->
initialized
==
LABEL_INITIALIZED
)
goto
out_unlock
;
if
(
isec
->
sclass
==
SECCLASS_FILE
)
isec
->
sclass
=
inode_mode_to_security_class
(
inode
->
i_mode
);
sbsec
=
inode
->
i_sb
->
s_security
;
if
(
!
(
sbsec
->
flags
&
SE_SBINITIALIZED
))
{
/* Defer initialization until selinux_complete_init,
...
...
@@ -1406,12 +1412,18 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
goto
out_unlock
;
}
sclass
=
isec
->
sclass
;
task_sid
=
isec
->
task_sid
;
sid
=
isec
->
sid
;
isec
->
initialized
=
LABEL_PENDING
;
spin_unlock
(
&
isec
->
lock
);
switch
(
sbsec
->
behavior
)
{
case
SECURITY_FS_USE_NATIVE
:
break
;
case
SECURITY_FS_USE_XATTR
:
if
(
!
(
inode
->
i_opflags
&
IOP_XATTR
))
{
isec
->
sid
=
sbsec
->
def_sid
;
sid
=
sbsec
->
def_sid
;
break
;
}
/* Need a dentry, since the xattr API requires one.
...
...
@@ -1433,7 +1445,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
* inode_doinit with a dentry, before these inodes could
* be used again by userspace.
*/
goto
out
_unlock
;
goto
out
;
}
len
=
INITCONTEXTLEN
;
...
...
@@ -1441,7 +1453,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
if
(
!
context
)
{
rc
=
-
ENOMEM
;
dput
(
dentry
);
goto
out
_unlock
;
goto
out
;
}
context
[
len
]
=
'\0'
;
rc
=
__vfs_getxattr
(
dentry
,
inode
,
XATTR_NAME_SELINUX
,
context
,
len
);
...
...
@@ -1452,14 +1464,14 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
rc
=
__vfs_getxattr
(
dentry
,
inode
,
XATTR_NAME_SELINUX
,
NULL
,
0
);
if
(
rc
<
0
)
{
dput
(
dentry
);
goto
out
_unlock
;
goto
out
;
}
len
=
rc
;
context
=
kmalloc
(
len
+
1
,
GFP_NOFS
);
if
(
!
context
)
{
rc
=
-
ENOMEM
;
dput
(
dentry
);
goto
out
_unlock
;
goto
out
;
}
context
[
len
]
=
'\0'
;
rc
=
__vfs_getxattr
(
dentry
,
inode
,
XATTR_NAME_SELINUX
,
context
,
len
);
...
...
@@ -1471,7 +1483,7 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
"%d for dev=%s ino=%ld
\n
"
,
__func__
,
-
rc
,
inode
->
i_sb
->
s_id
,
inode
->
i_ino
);
kfree
(
context
);
goto
out
_unlock
;
goto
out
;
}
/* Map ENODATA to the default file SID */
sid
=
sbsec
->
def_sid
;
...
...
@@ -1501,29 +1513,25 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
}
}
kfree
(
context
);
isec
->
sid
=
sid
;
break
;
case
SECURITY_FS_USE_TASK
:
isec
->
sid
=
isec
->
task_sid
;
sid
=
task_sid
;
break
;
case
SECURITY_FS_USE_TRANS
:
/* Default to the fs SID. */
isec
->
sid
=
sbsec
->
sid
;
sid
=
sbsec
->
sid
;
/* Try to obtain a transition SID. */
isec
->
sclass
=
inode_mode_to_security_class
(
inode
->
i_mode
);
rc
=
security_transition_sid
(
isec
->
task_sid
,
sbsec
->
sid
,
isec
->
sclass
,
NULL
,
&
sid
);
rc
=
security_transition_sid
(
task_sid
,
sid
,
sclass
,
NULL
,
&
sid
);
if
(
rc
)
goto
out_unlock
;
isec
->
sid
=
sid
;
goto
out
;
break
;
case
SECURITY_FS_USE_MNTPOINT
:
isec
->
sid
=
sbsec
->
mntpoint_sid
;
sid
=
sbsec
->
mntpoint_sid
;
break
;
default:
/* Default to the fs superblock SID. */
isec
->
sid
=
sbsec
->
sid
;
sid
=
sbsec
->
sid
;
if
((
sbsec
->
flags
&
SE_SBGENFS
)
&&
!
S_ISLNK
(
inode
->
i_mode
))
{
/* We must have a dentry to determine the label on
...
...
@@ -1546,25 +1554,30 @@ static int inode_doinit_with_dentry(struct inode *inode, struct dentry *opt_dent
* could be used again by userspace.
*/
if
(
!
dentry
)
goto
out_unlock
;
isec
->
sclass
=
inode_mode_to_security_class
(
inode
->
i_mode
);
rc
=
selinux_genfs_get_sid
(
dentry
,
isec
->
sclass
,
goto
out
;
rc
=
selinux_genfs_get_sid
(
dentry
,
sclass
,
sbsec
->
flags
,
&
sid
);
dput
(
dentry
);
if
(
rc
)
goto
out_unlock
;
isec
->
sid
=
sid
;
goto
out
;
}
break
;
}
isec
->
initialized
=
LABEL_INITIALIZED
;
out:
spin_lock
(
&
isec
->
lock
);
if
(
isec
->
initialized
==
LABEL_PENDING
)
{
if
(
!
sid
||
rc
)
{
isec
->
initialized
=
LABEL_INVALID
;
goto
out_unlock
;
}
isec
->
initialized
=
LABEL_INITIALIZED
;
isec
->
sid
=
sid
;
}
out_unlock:
mutex_unlock
(
&
isec
->
lock
);
out:
if
(
isec
->
sclass
==
SECCLASS_FILE
)
isec
->
sclass
=
inode_mode_to_security_class
(
inode
->
i_mode
);
spin_unlock
(
&
isec
->
lock
);
return
rc
;
}
...
...
@@ -3195,9 +3208,11 @@ static void selinux_inode_post_setxattr(struct dentry *dentry, const char *name,
}
isec
=
backing_inode_security
(
dentry
);
spin_lock
(
&
isec
->
lock
);
isec
->
sclass
=
inode_mode_to_security_class
(
inode
->
i_mode
);
isec
->
sid
=
newsid
;
isec
->
initialized
=
LABEL_INITIALIZED
;
spin_unlock
(
&
isec
->
lock
);
return
;
}
...
...
@@ -3290,9 +3305,11 @@ static int selinux_inode_setsecurity(struct inode *inode, const char *name,
if
(
rc
)
return
rc
;
spin_lock
(
&
isec
->
lock
);
isec
->
sclass
=
inode_mode_to_security_class
(
inode
->
i_mode
);
isec
->
sid
=
newsid
;
isec
->
initialized
=
LABEL_INITIALIZED
;
spin_unlock
(
&
isec
->
lock
);
return
0
;
}
...
...
@@ -3953,8 +3970,11 @@ static void selinux_task_to_inode(struct task_struct *p,
struct
inode_security_struct
*
isec
=
inode
->
i_security
;
u32
sid
=
task_sid
(
p
);
spin_lock
(
&
isec
->
lock
);
isec
->
sclass
=
inode_mode_to_security_class
(
inode
->
i_mode
);
isec
->
sid
=
sid
;
isec
->
initialized
=
LABEL_INITIALIZED
;
spin_unlock
(
&
isec
->
lock
);
}
/* Returns error only if unable to parse addresses */
...
...
@@ -4273,24 +4293,24 @@ static int selinux_socket_post_create(struct socket *sock, int family,
const
struct
task_security_struct
*
tsec
=
current_security
();
struct
inode_security_struct
*
isec
=
inode_security_novalidate
(
SOCK_INODE
(
sock
));
struct
sk_security_struct
*
sksec
;
u16
sclass
=
socket_type_to_security_class
(
family
,
type
,
protocol
);
u32
sid
=
SECINITSID_KERNEL
;
int
err
=
0
;
isec
->
sclass
=
socket_type_to_security_class
(
family
,
type
,
protocol
);
if
(
kern
)
isec
->
sid
=
SECINITSID_KERNEL
;
else
{
err
=
socket_sockcreate_sid
(
tsec
,
isec
->
sclass
,
&
(
isec
->
sid
));
if
(
!
kern
)
{
err
=
socket_sockcreate_sid
(
tsec
,
sclass
,
&
sid
);
if
(
err
)
return
err
;
}
isec
->
sclass
=
sclass
;
isec
->
sid
=
sid
;
isec
->
initialized
=
LABEL_INITIALIZED
;
if
(
sock
->
sk
)
{
sksec
=
sock
->
sk
->
sk_security
;
sksec
->
s
id
=
isec
->
sid
;
sksec
->
s
class
=
isec
->
sclass
;
sksec
->
s
class
=
sclass
;
sksec
->
s
id
=
sid
;
err
=
selinux_netlbl_socket_post_create
(
sock
->
sk
,
family
);
}
...
...
@@ -4466,16 +4486,22 @@ static int selinux_socket_accept(struct socket *sock, struct socket *newsock)
int
err
;
struct
inode_security_struct
*
isec
;
struct
inode_security_struct
*
newisec
;
u16
sclass
;
u32
sid
;
err
=
sock_has_perm
(
current
,
sock
->
sk
,
SOCKET__ACCEPT
);
if
(
err
)
return
err
;
newisec
=
inode_security_novalidate
(
SOCK_INODE
(
newsock
));
isec
=
inode_security_novalidate
(
SOCK_INODE
(
sock
));
newisec
->
sclass
=
isec
->
sclass
;
newisec
->
sid
=
isec
->
sid
;
spin_lock
(
&
isec
->
lock
);
sclass
=
isec
->
sclass
;
sid
=
isec
->
sid
;
spin_unlock
(
&
isec
->
lock
);
newisec
=
inode_security_novalidate
(
SOCK_INODE
(
newsock
));
newisec
->
sclass
=
sclass
;
newisec
->
sid
=
sid
;
newisec
->
initialized
=
LABEL_INITIALIZED
;
return
0
;
...
...
@@ -5978,9 +6004,9 @@ static void selinux_inode_invalidate_secctx(struct inode *inode)
{
struct
inode_security_struct
*
isec
=
inode
->
i_security
;
mutex
_lock
(
&
isec
->
lock
);
spin
_lock
(
&
isec
->
lock
);
isec
->
initialized
=
LABEL_INVALID
;
mutex
_unlock
(
&
isec
->
lock
);
spin
_unlock
(
&
isec
->
lock
);
}
/*
...
...
security/selinux/include/classmap.h
View file @
0821e30c
...
...
@@ -24,6 +24,10 @@
#define COMMON_CAP2_PERMS "mac_override", "mac_admin", "syslog", \
"wake_alarm", "block_suspend", "audit_read"
#if CAP_LAST_CAP > CAP_AUDIT_READ
#error New capability defined, please update COMMON_CAP2_PERMS.
#endif
/*
* Note: The name for any socket class should be suffixed by "socket",
* and doesn't contain more than one substr of "socket".
...
...
security/selinux/include/objsec.h
View file @
0821e30c
...
...
@@ -39,7 +39,8 @@ struct task_security_struct {
enum
label_initialized
{
LABEL_INVALID
,
/* invalid or not initialized */
LABEL_INITIALIZED
/* initialized */
LABEL_INITIALIZED
,
/* initialized */
LABEL_PENDING
};
struct
inode_security_struct
{
...
...
@@ -52,7 +53,7 @@ struct inode_security_struct {
u32
sid
;
/* SID of this object */
u16
sclass
;
/* security class of this object */
unsigned
char
initialized
;
/* initialization flag */
s
truct
mutex
lock
;
s
pinlock_t
lock
;
};
struct
file_security_struct
{
...
...
security/selinux/selinuxfs.c
View file @
0821e30c
...
...
@@ -163,6 +163,8 @@ static ssize_t sel_write_enforce(struct file *file, const char __user *buf,
if
(
sscanf
(
page
,
"%d"
,
&
new_value
)
!=
1
)
goto
out
;
new_value
=
!!
new_value
;
if
(
new_value
!=
selinux_enforcing
)
{
length
=
task_has_security
(
current
,
SECURITY__SETENFORCE
);
if
(
length
)
...
...
@@ -1301,7 +1303,7 @@ static int sel_make_bools(void)
goto
out
;
isec
->
sid
=
sid
;
isec
->
initialized
=
1
;
isec
->
initialized
=
LABEL_INITIALIZED
;
inode
->
i_fop
=
&
sel_bool_ops
;
inode
->
i_ino
=
i
|
SEL_BOOL_INO_OFFSET
;
d_add
(
dentry
,
inode
);
...
...
@@ -1834,7 +1836,7 @@ static int sel_fill_super(struct super_block *sb, void *data, int silent)
isec
=
(
struct
inode_security_struct
*
)
inode
->
i_security
;
isec
->
sid
=
SECINITSID_DEVNULL
;
isec
->
sclass
=
SECCLASS_CHR_FILE
;
isec
->
initialized
=
1
;
isec
->
initialized
=
LABEL_INITIALIZED
;
init_special_inode
(
inode
,
S_IFCHR
|
S_IRUGO
|
S_IWUGO
,
MKDEV
(
MEM_MAJOR
,
3
));
d_add
(
dentry
,
inode
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment