diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2011-05-24 16:48:51 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2011-05-26 21:13:57 -0400 |
commit | f01e1af445fac107e91d62a2d59dd535f633810b (patch) | |
tree | f5da7e4162f0a6f4bb50e4cb41f6a06c672f66b0 /security/selinux/avc.c | |
parent | bc9bc72e2f9bb07384c00604d1a40d0b5f62be6c (diff) |
selinux: don't pass in NULL avd to avc_has_perm_noaudit
Right now security_get_user_sids() will pass in a NULL avd pointer to
avc_has_perm_noaudit(), which then forces that function to have a dummy
entry for that case and just generally test it.
Don't do it. The normal callers all pass a real avd pointer, and this
helper function is incredibly hot. So don't make avc_has_perm_noaudit()
do conditional stuff that isn't needed for the common case.
This also avoids some duplicated stack space.
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'security/selinux/avc.c')
-rw-r--r-- | security/selinux/avc.c | 12 |
1 files changed, 2 insertions, 10 deletions
diff --git a/security/selinux/avc.c b/security/selinux/avc.c index fcb89cb0f223..d515b2128a4e 100644 --- a/security/selinux/avc.c +++ b/security/selinux/avc.c | |||
@@ -752,10 +752,9 @@ int avc_ss_reset(u32 seqno) | |||
752 | int avc_has_perm_noaudit(u32 ssid, u32 tsid, | 752 | int avc_has_perm_noaudit(u32 ssid, u32 tsid, |
753 | u16 tclass, u32 requested, | 753 | u16 tclass, u32 requested, |
754 | unsigned flags, | 754 | unsigned flags, |
755 | struct av_decision *in_avd) | 755 | struct av_decision *avd) |
756 | { | 756 | { |
757 | struct avc_node *node; | 757 | struct avc_node *node; |
758 | struct av_decision avd_entry, *avd; | ||
759 | int rc = 0; | 758 | int rc = 0; |
760 | u32 denied; | 759 | u32 denied; |
761 | 760 | ||
@@ -766,18 +765,11 @@ int avc_has_perm_noaudit(u32 ssid, u32 tsid, | |||
766 | node = avc_lookup(ssid, tsid, tclass); | 765 | node = avc_lookup(ssid, tsid, tclass); |
767 | if (unlikely(!node)) { | 766 | if (unlikely(!node)) { |
768 | rcu_read_unlock(); | 767 | rcu_read_unlock(); |
769 | |||
770 | if (in_avd) | ||
771 | avd = in_avd; | ||
772 | else | ||
773 | avd = &avd_entry; | ||
774 | |||
775 | security_compute_av(ssid, tsid, tclass, avd); | 768 | security_compute_av(ssid, tsid, tclass, avd); |
776 | rcu_read_lock(); | 769 | rcu_read_lock(); |
777 | node = avc_insert(ssid, tsid, tclass, avd); | 770 | node = avc_insert(ssid, tsid, tclass, avd); |
778 | } else { | 771 | } else { |
779 | if (in_avd) | 772 | memcpy(avd, &node->ae.avd, sizeof(*avd)); |
780 | memcpy(in_avd, &node->ae.avd, sizeof(*in_avd)); | ||
781 | avd = &node->ae.avd; | 773 | avd = &node->ae.avd; |
782 | } | 774 | } |
783 | 775 | ||