diff options
author | Casey Schaufler <casey@schaufler-ca.com> | 2012-04-17 21:55:46 -0400 |
---|---|---|
committer | James Morris <james.l.morris@oracle.com> | 2012-04-17 22:02:28 -0400 |
commit | 86812bb0de1a3758dc6c7aa01a763158a7c0638a (patch) | |
tree | 41cb41cd7fe52730a3fe8c88ca298c2494f9040a /security/smack/smack_lsm.c | |
parent | 592fe8980688e7cba46897685d014c7fb3018a67 (diff) |
Smack: move label list initialization
A kernel with Smack enabled will fail if tmpfs has xattr support.
Move the initialization of predefined Smack label
list entries to the LSM initialization from the
smackfs setup. This became an issue when tmpfs
acquired xattr support, but was never correct.
Signed-off-by: Casey Schaufler <casey@schaufler-ca.com>
Signed-off-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'security/smack/smack_lsm.c')
-rw-r--r-- | security/smack/smack_lsm.c | 44 |
1 files changed, 33 insertions, 11 deletions
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index 10056f2f6df3..45c32f074166 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
@@ -3640,8 +3640,38 @@ struct security_operations smack_ops = { | |||
3640 | }; | 3640 | }; |
3641 | 3641 | ||
3642 | 3642 | ||
3643 | static __init void init_smack_know_list(void) | 3643 | static __init void init_smack_known_list(void) |
3644 | { | 3644 | { |
3645 | /* | ||
3646 | * Initialize CIPSO locks | ||
3647 | */ | ||
3648 | spin_lock_init(&smack_known_huh.smk_cipsolock); | ||
3649 | spin_lock_init(&smack_known_hat.smk_cipsolock); | ||
3650 | spin_lock_init(&smack_known_star.smk_cipsolock); | ||
3651 | spin_lock_init(&smack_known_floor.smk_cipsolock); | ||
3652 | spin_lock_init(&smack_known_invalid.smk_cipsolock); | ||
3653 | spin_lock_init(&smack_known_web.smk_cipsolock); | ||
3654 | /* | ||
3655 | * Initialize rule list locks | ||
3656 | */ | ||
3657 | mutex_init(&smack_known_huh.smk_rules_lock); | ||
3658 | mutex_init(&smack_known_hat.smk_rules_lock); | ||
3659 | mutex_init(&smack_known_floor.smk_rules_lock); | ||
3660 | mutex_init(&smack_known_star.smk_rules_lock); | ||
3661 | mutex_init(&smack_known_invalid.smk_rules_lock); | ||
3662 | mutex_init(&smack_known_web.smk_rules_lock); | ||
3663 | /* | ||
3664 | * Initialize rule lists | ||
3665 | */ | ||
3666 | INIT_LIST_HEAD(&smack_known_huh.smk_rules); | ||
3667 | INIT_LIST_HEAD(&smack_known_hat.smk_rules); | ||
3668 | INIT_LIST_HEAD(&smack_known_star.smk_rules); | ||
3669 | INIT_LIST_HEAD(&smack_known_floor.smk_rules); | ||
3670 | INIT_LIST_HEAD(&smack_known_invalid.smk_rules); | ||
3671 | INIT_LIST_HEAD(&smack_known_web.smk_rules); | ||
3672 | /* | ||
3673 | * Create the known labels list | ||
3674 | */ | ||
3645 | list_add(&smack_known_huh.list, &smack_known_list); | 3675 | list_add(&smack_known_huh.list, &smack_known_list); |
3646 | list_add(&smack_known_hat.list, &smack_known_list); | 3676 | list_add(&smack_known_hat.list, &smack_known_list); |
3647 | list_add(&smack_known_star.list, &smack_known_list); | 3677 | list_add(&smack_known_star.list, &smack_known_list); |
@@ -3676,16 +3706,8 @@ static __init int smack_init(void) | |||
3676 | cred = (struct cred *) current->cred; | 3706 | cred = (struct cred *) current->cred; |
3677 | cred->security = tsp; | 3707 | cred->security = tsp; |
3678 | 3708 | ||
3679 | /* initialize the smack_know_list */ | 3709 | /* initialize the smack_known_list */ |
3680 | init_smack_know_list(); | 3710 | init_smack_known_list(); |
3681 | /* | ||
3682 | * Initialize locks | ||
3683 | */ | ||
3684 | spin_lock_init(&smack_known_huh.smk_cipsolock); | ||
3685 | spin_lock_init(&smack_known_hat.smk_cipsolock); | ||
3686 | spin_lock_init(&smack_known_star.smk_cipsolock); | ||
3687 | spin_lock_init(&smack_known_floor.smk_cipsolock); | ||
3688 | spin_lock_init(&smack_known_invalid.smk_cipsolock); | ||
3689 | 3711 | ||
3690 | /* | 3712 | /* |
3691 | * Register with LSM | 3713 | * Register with LSM |