diff options
| -rw-r--r-- | security/selinux/hooks.c | 20 | ||||
| -rw-r--r-- | security/selinux/include/objsec.h | 5 |
2 files changed, 22 insertions, 3 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 6625699f497c..57b0b49f4e6e 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
| @@ -234,6 +234,14 @@ static int inode_alloc_security(struct inode *inode) | |||
| 234 | return 0; | 234 | return 0; |
| 235 | } | 235 | } |
| 236 | 236 | ||
| 237 | static void inode_free_rcu(struct rcu_head *head) | ||
| 238 | { | ||
| 239 | struct inode_security_struct *isec; | ||
| 240 | |||
| 241 | isec = container_of(head, struct inode_security_struct, rcu); | ||
| 242 | kmem_cache_free(sel_inode_cache, isec); | ||
| 243 | } | ||
| 244 | |||
| 237 | static void inode_free_security(struct inode *inode) | 245 | static void inode_free_security(struct inode *inode) |
| 238 | { | 246 | { |
| 239 | struct inode_security_struct *isec = inode->i_security; | 247 | struct inode_security_struct *isec = inode->i_security; |
| @@ -244,8 +252,16 @@ static void inode_free_security(struct inode *inode) | |||
| 244 | list_del_init(&isec->list); | 252 | list_del_init(&isec->list); |
| 245 | spin_unlock(&sbsec->isec_lock); | 253 | spin_unlock(&sbsec->isec_lock); |
| 246 | 254 | ||
| 247 | inode->i_security = NULL; | 255 | /* |
| 248 | kmem_cache_free(sel_inode_cache, isec); | 256 | * The inode may still be referenced in a path walk and |
| 257 | * a call to selinux_inode_permission() can be made | ||
| 258 | * after inode_free_security() is called. Ideally, the VFS | ||
| 259 | * wouldn't do this, but fixing that is a much harder | ||
| 260 | * job. For now, simply free the i_security via RCU, and | ||
| 261 | * leave the current inode->i_security pointer intact. | ||
| 262 | * The inode will be freed after the RCU grace period too. | ||
| 263 | */ | ||
| 264 | call_rcu(&isec->rcu, inode_free_rcu); | ||
| 249 | } | 265 | } |
| 250 | 266 | ||
| 251 | static int file_alloc_security(struct file *file) | 267 | static int file_alloc_security(struct file *file) |
diff --git a/security/selinux/include/objsec.h b/security/selinux/include/objsec.h index b1dfe1049450..078e553f52f2 100644 --- a/security/selinux/include/objsec.h +++ b/security/selinux/include/objsec.h | |||
| @@ -38,7 +38,10 @@ struct task_security_struct { | |||
| 38 | 38 | ||
| 39 | struct inode_security_struct { | 39 | struct inode_security_struct { |
| 40 | struct inode *inode; /* back pointer to inode object */ | 40 | struct inode *inode; /* back pointer to inode object */ |
| 41 | struct list_head list; /* list of inode_security_struct */ | 41 | union { |
| 42 | struct list_head list; /* list of inode_security_struct */ | ||
| 43 | struct rcu_head rcu; /* for freeing the inode_security_struct */ | ||
| 44 | }; | ||
| 42 | u32 task_sid; /* SID of creating task */ | 45 | u32 task_sid; /* SID of creating task */ |
| 43 | u32 sid; /* SID of this object */ | 46 | u32 sid; /* SID of this object */ |
| 44 | u16 sclass; /* security class of this object */ | 47 | u16 sclass; /* security class of this object */ |
