aboutsummaryrefslogtreecommitdiffstats
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorJames Morris <james.l.morris@oracle.com>2014-05-26 08:38:46 -0400
committerJames Morris <james.l.morris@oracle.com>2014-05-26 08:38:46 -0400
commit92953ff38ba59b4f7b1a54ab28b84be35fafaecc (patch)
tree235ddd61f28c3030838ebbe5655fccfd1468042c /security/selinux/hooks.c
parent2fd4e6698f0863f47558e63b67c7c3a026513541 (diff)
parent47dd0b76ace953bd2c0479076db0d3e3b9594003 (diff)
Merge branch 'next' of git://git.infradead.org/users/pcmoore/selinux into next
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r--security/selinux/hooks.c11
1 files changed, 7 insertions, 4 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 6ab22720c277..d4cbf7d16f07 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -2123,11 +2123,13 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm)
2123 new_tsec->exec_sid = 0; 2123 new_tsec->exec_sid = 0;
2124 2124
2125 /* 2125 /*
2126 * Minimize confusion: if no_new_privs and a transition is 2126 * Minimize confusion: if no_new_privs or nosuid and a
2127 * explicitly requested, then fail the exec. 2127 * transition is explicitly requested, then fail the exec.
2128 */ 2128 */
2129 if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) 2129 if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS)
2130 return -EPERM; 2130 return -EPERM;
2131 if (bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID)
2132 return -EACCES;
2131 } else { 2133 } else {
2132 /* Check for a default transition on this program. */ 2134 /* Check for a default transition on this program. */
2133 rc = security_transition_sid(old_tsec->sid, isec->sid, 2135 rc = security_transition_sid(old_tsec->sid, isec->sid,
@@ -2770,6 +2772,7 @@ static int selinux_inode_follow_link(struct dentry *dentry, struct nameidata *na
2770 2772
2771static noinline int audit_inode_permission(struct inode *inode, 2773static noinline int audit_inode_permission(struct inode *inode,
2772 u32 perms, u32 audited, u32 denied, 2774 u32 perms, u32 audited, u32 denied,
2775 int result,
2773 unsigned flags) 2776 unsigned flags)
2774{ 2777{
2775 struct common_audit_data ad; 2778 struct common_audit_data ad;
@@ -2780,7 +2783,7 @@ static noinline int audit_inode_permission(struct inode *inode,
2780 ad.u.inode = inode; 2783 ad.u.inode = inode;
2781 2784
2782 rc = slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms, 2785 rc = slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms,
2783 audited, denied, &ad, flags); 2786 audited, denied, result, &ad, flags);
2784 if (rc) 2787 if (rc)
2785 return rc; 2788 return rc;
2786 return 0; 2789 return 0;
@@ -2822,7 +2825,7 @@ static int selinux_inode_permission(struct inode *inode, int mask)
2822 if (likely(!audited)) 2825 if (likely(!audited))
2823 return rc; 2826 return rc;
2824 2827
2825 rc2 = audit_inode_permission(inode, perms, audited, denied, flags); 2828 rc2 = audit_inode_permission(inode, perms, audited, denied, rc, flags);
2826 if (rc2) 2829 if (rc2)
2827 return rc2; 2830 return rc2;
2828 return rc; 2831 return rc;