diff options
author | James Morris <jmorris@namei.org> | 2008-12-18 19:41:10 -0500 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2008-12-19 17:03:39 -0500 |
commit | 74192246910ff4fb95309ba1a683215644beeb62 (patch) | |
tree | ff6daed6c494ac83afad70049a28f20ec5770b44 | |
parent | 12204e24b1330428c3062faee10a0d80b8a5cb61 (diff) |
SELinux: don't check permissions for kernel mounts
Don't bother checking permissions when the kernel performs an
internal mount, as this should always be allowed.
Signed-off-by: James Morris <jmorris@namei.org>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
-rw-r--r-- | security/selinux/hooks.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 7465d713b531..853b58c8b2cb 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -2484,6 +2484,10 @@ static int selinux_sb_kern_mount(struct super_block *sb, int flags, void *data) | |||
2484 | if (rc) | 2484 | if (rc) |
2485 | return rc; | 2485 | return rc; |
2486 | 2486 | ||
2487 | /* Allow all mounts performed by the kernel */ | ||
2488 | if (flags & MS_KERNMOUNT) | ||
2489 | return 0; | ||
2490 | |||
2487 | AVC_AUDIT_DATA_INIT(&ad, FS); | 2491 | AVC_AUDIT_DATA_INIT(&ad, FS); |
2488 | ad.u.fs.path.dentry = sb->s_root; | 2492 | ad.u.fs.path.dentry = sb->s_root; |
2489 | return superblock_has_perm(cred, sb, FILESYSTEM__MOUNT, &ad); | 2493 | return superblock_has_perm(cred, sb, FILESYSTEM__MOUNT, &ad); |