diff options
author | Jiri Kosina <jkosina@suse.cz> | 2010-06-16 12:08:13 -0400 |
---|---|---|
committer | Jiri Kosina <jkosina@suse.cz> | 2010-06-16 12:08:13 -0400 |
commit | f1bbbb6912662b9f6070c5bfc4ca9eb1f06a9d5b (patch) | |
tree | c2c130a74be25b0b2dff992e1a195e2728bdaadd /security | |
parent | fd0961ff67727482bb20ca7e8ea97b83e9de2ddb (diff) | |
parent | 7e27d6e778cd87b6f2415515d7127eba53fe5d02 (diff) |
Merge branch 'master' into for-next
Diffstat (limited to 'security')
-rw-r--r-- | security/keys/internal.h | 1 | ||||
-rw-r--r-- | security/keys/keyctl.c | 2 | ||||
-rw-r--r-- | security/keys/keyring.c | 6 | ||||
-rw-r--r-- | security/keys/process_keys.c | 3 | ||||
-rw-r--r-- | security/keys/request_key.c | 32 | ||||
-rw-r--r-- | security/selinux/hooks.c | 55 | ||||
-rw-r--r-- | security/selinux/include/objsec.h | 1 |
7 files changed, 46 insertions, 54 deletions
diff --git a/security/keys/internal.h b/security/keys/internal.h index 5d4402a1161a..38783dcf6c61 100644 --- a/security/keys/internal.h +++ b/security/keys/internal.h | |||
@@ -124,6 +124,7 @@ extern struct key *find_keyring_by_name(const char *name, bool skip_perm_check); | |||
124 | extern int install_user_keyrings(void); | 124 | extern int install_user_keyrings(void); |
125 | extern int install_thread_keyring_to_cred(struct cred *); | 125 | extern int install_thread_keyring_to_cred(struct cred *); |
126 | extern int install_process_keyring_to_cred(struct cred *); | 126 | extern int install_process_keyring_to_cred(struct cred *); |
127 | extern int install_session_keyring_to_cred(struct cred *, struct key *); | ||
127 | 128 | ||
128 | extern struct key *request_key_and_link(struct key_type *type, | 129 | extern struct key *request_key_and_link(struct key_type *type, |
129 | const char *description, | 130 | const char *description, |
diff --git a/security/keys/keyctl.c b/security/keys/keyctl.c index 8f4dce1987c4..13074b454743 100644 --- a/security/keys/keyctl.c +++ b/security/keys/keyctl.c | |||
@@ -1269,7 +1269,7 @@ long keyctl_session_to_parent(void) | |||
1269 | goto not_permitted; | 1269 | goto not_permitted; |
1270 | 1270 | ||
1271 | /* the parent must be single threaded */ | 1271 | /* the parent must be single threaded */ |
1272 | if (atomic_read(&parent->signal->count) != 1) | 1272 | if (!thread_group_empty(parent)) |
1273 | goto not_permitted; | 1273 | goto not_permitted; |
1274 | 1274 | ||
1275 | /* the parent and the child must have different session keyrings or | 1275 | /* the parent and the child must have different session keyrings or |
diff --git a/security/keys/keyring.c b/security/keys/keyring.c index ef03a82a0135..d37f713e73ce 100644 --- a/security/keys/keyring.c +++ b/security/keys/keyring.c | |||
@@ -669,7 +669,7 @@ static void keyring_unlink_rcu_disposal(struct rcu_head *rcu) | |||
669 | struct keyring_list *klist = | 669 | struct keyring_list *klist = |
670 | container_of(rcu, struct keyring_list, rcu); | 670 | container_of(rcu, struct keyring_list, rcu); |
671 | 671 | ||
672 | if (klist->delkey != USHORT_MAX) | 672 | if (klist->delkey != USHRT_MAX) |
673 | key_put(klist->keys[klist->delkey]); | 673 | key_put(klist->keys[klist->delkey]); |
674 | kfree(klist); | 674 | kfree(klist); |
675 | } | 675 | } |
@@ -746,7 +746,7 @@ int __key_link_begin(struct key *keyring, const struct key_type *type, | |||
746 | max += klist->maxkeys; | 746 | max += klist->maxkeys; |
747 | 747 | ||
748 | ret = -ENFILE; | 748 | ret = -ENFILE; |
749 | if (max > USHORT_MAX - 1) | 749 | if (max > USHRT_MAX - 1) |
750 | goto error_quota; | 750 | goto error_quota; |
751 | size = sizeof(*klist) + sizeof(struct key *) * max; | 751 | size = sizeof(*klist) + sizeof(struct key *) * max; |
752 | if (size > PAGE_SIZE) | 752 | if (size > PAGE_SIZE) |
@@ -763,7 +763,7 @@ int __key_link_begin(struct key *keyring, const struct key_type *type, | |||
763 | sizeof(struct key *) * klist->nkeys); | 763 | sizeof(struct key *) * klist->nkeys); |
764 | nklist->delkey = klist->nkeys; | 764 | nklist->delkey = klist->nkeys; |
765 | nklist->nkeys = klist->nkeys + 1; | 765 | nklist->nkeys = klist->nkeys + 1; |
766 | klist->delkey = USHORT_MAX; | 766 | klist->delkey = USHRT_MAX; |
767 | } else { | 767 | } else { |
768 | nklist->nkeys = 1; | 768 | nklist->nkeys = 1; |
769 | nklist->delkey = 0; | 769 | nklist->delkey = 0; |
diff --git a/security/keys/process_keys.c b/security/keys/process_keys.c index 20a38fed61b1..6b8e4ff4cc68 100644 --- a/security/keys/process_keys.c +++ b/security/keys/process_keys.c | |||
@@ -216,8 +216,7 @@ static int install_process_keyring(void) | |||
216 | /* | 216 | /* |
217 | * install a session keyring directly to a credentials struct | 217 | * install a session keyring directly to a credentials struct |
218 | */ | 218 | */ |
219 | static int install_session_keyring_to_cred(struct cred *cred, | 219 | int install_session_keyring_to_cred(struct cred *cred, struct key *keyring) |
220 | struct key *keyring) | ||
221 | { | 220 | { |
222 | unsigned long flags; | 221 | unsigned long flags; |
223 | struct key *old; | 222 | struct key *old; |
diff --git a/security/keys/request_key.c b/security/keys/request_key.c index f656e9c069e3..f5ec9ac5d57c 100644 --- a/security/keys/request_key.c +++ b/security/keys/request_key.c | |||
@@ -58,6 +58,38 @@ void complete_request_key(struct key_construction *cons, int error) | |||
58 | } | 58 | } |
59 | EXPORT_SYMBOL(complete_request_key); | 59 | EXPORT_SYMBOL(complete_request_key); |
60 | 60 | ||
61 | static int umh_keys_init(struct subprocess_info *info) | ||
62 | { | ||
63 | struct cred *cred = (struct cred*)current_cred(); | ||
64 | struct key *keyring = info->data; | ||
65 | /* | ||
66 | * This is called in context of freshly forked kthread before | ||
67 | * kernel_execve(), we can just change our ->session_keyring. | ||
68 | */ | ||
69 | return install_session_keyring_to_cred(cred, keyring); | ||
70 | } | ||
71 | |||
72 | static void umh_keys_cleanup(struct subprocess_info *info) | ||
73 | { | ||
74 | struct key *keyring = info->data; | ||
75 | key_put(keyring); | ||
76 | } | ||
77 | |||
78 | static int call_usermodehelper_keys(char *path, char **argv, char **envp, | ||
79 | struct key *session_keyring, enum umh_wait wait) | ||
80 | { | ||
81 | gfp_t gfp_mask = (wait == UMH_NO_WAIT) ? GFP_ATOMIC : GFP_KERNEL; | ||
82 | struct subprocess_info *info = | ||
83 | call_usermodehelper_setup(path, argv, envp, gfp_mask); | ||
84 | |||
85 | if (!info) | ||
86 | return -ENOMEM; | ||
87 | |||
88 | call_usermodehelper_setfns(info, umh_keys_init, umh_keys_cleanup, | ||
89 | key_get(session_keyring)); | ||
90 | return call_usermodehelper_exec(info, wait); | ||
91 | } | ||
92 | |||
61 | /* | 93 | /* |
62 | * request userspace finish the construction of a key | 94 | * request userspace finish the construction of a key |
63 | * - execute "/sbin/request-key <op> <key> <uid> <gid> <keyring> <keyring> <keyring>" | 95 | * - execute "/sbin/request-key <op> <key> <uid> <gid> <keyring> <keyring> <keyring>" |
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index a03fd74602b4..5c9f25ba1c95 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -126,11 +126,6 @@ __setup("selinux=", selinux_enabled_setup); | |||
126 | int selinux_enabled = 1; | 126 | int selinux_enabled = 1; |
127 | #endif | 127 | #endif |
128 | 128 | ||
129 | /* Lists of inode and superblock security structures initialized | ||
130 | before the policy was loaded. */ | ||
131 | static LIST_HEAD(superblock_security_head); | ||
132 | static DEFINE_SPINLOCK(sb_security_lock); | ||
133 | |||
134 | static struct kmem_cache *sel_inode_cache; | 129 | static struct kmem_cache *sel_inode_cache; |
135 | 130 | ||
136 | /** | 131 | /** |
@@ -266,7 +261,6 @@ static int superblock_alloc_security(struct super_block *sb) | |||
266 | return -ENOMEM; | 261 | return -ENOMEM; |
267 | 262 | ||
268 | mutex_init(&sbsec->lock); | 263 | mutex_init(&sbsec->lock); |
269 | INIT_LIST_HEAD(&sbsec->list); | ||
270 | INIT_LIST_HEAD(&sbsec->isec_head); | 264 | INIT_LIST_HEAD(&sbsec->isec_head); |
271 | spin_lock_init(&sbsec->isec_lock); | 265 | spin_lock_init(&sbsec->isec_lock); |
272 | sbsec->sb = sb; | 266 | sbsec->sb = sb; |
@@ -281,12 +275,6 @@ static int superblock_alloc_security(struct super_block *sb) | |||
281 | static void superblock_free_security(struct super_block *sb) | 275 | static void superblock_free_security(struct super_block *sb) |
282 | { | 276 | { |
283 | struct superblock_security_struct *sbsec = sb->s_security; | 277 | struct superblock_security_struct *sbsec = sb->s_security; |
284 | |||
285 | spin_lock(&sb_security_lock); | ||
286 | if (!list_empty(&sbsec->list)) | ||
287 | list_del_init(&sbsec->list); | ||
288 | spin_unlock(&sb_security_lock); | ||
289 | |||
290 | sb->s_security = NULL; | 278 | sb->s_security = NULL; |
291 | kfree(sbsec); | 279 | kfree(sbsec); |
292 | } | 280 | } |
@@ -612,10 +600,6 @@ static int selinux_set_mnt_opts(struct super_block *sb, | |||
612 | /* Defer initialization until selinux_complete_init, | 600 | /* Defer initialization until selinux_complete_init, |
613 | after the initial policy is loaded and the security | 601 | after the initial policy is loaded and the security |
614 | server is ready to handle calls. */ | 602 | server is ready to handle calls. */ |
615 | spin_lock(&sb_security_lock); | ||
616 | if (list_empty(&sbsec->list)) | ||
617 | list_add(&sbsec->list, &superblock_security_head); | ||
618 | spin_unlock(&sb_security_lock); | ||
619 | goto out; | 603 | goto out; |
620 | } | 604 | } |
621 | rc = -EINVAL; | 605 | rc = -EINVAL; |
@@ -806,16 +790,10 @@ static void selinux_sb_clone_mnt_opts(const struct super_block *oldsb, | |||
806 | 790 | ||
807 | /* | 791 | /* |
808 | * if the parent was able to be mounted it clearly had no special lsm | 792 | * if the parent was able to be mounted it clearly had no special lsm |
809 | * mount options. thus we can safely put this sb on the list and deal | 793 | * mount options. thus we can safely deal with this superblock later |
810 | * with it later | ||
811 | */ | 794 | */ |
812 | if (!ss_initialized) { | 795 | if (!ss_initialized) |
813 | spin_lock(&sb_security_lock); | ||
814 | if (list_empty(&newsbsec->list)) | ||
815 | list_add(&newsbsec->list, &superblock_security_head); | ||
816 | spin_unlock(&sb_security_lock); | ||
817 | return; | 796 | return; |
818 | } | ||
819 | 797 | ||
820 | /* how can we clone if the old one wasn't set up?? */ | 798 | /* how can we clone if the old one wasn't set up?? */ |
821 | BUG_ON(!(oldsbsec->flags & SE_SBINITIALIZED)); | 799 | BUG_ON(!(oldsbsec->flags & SE_SBINITIALIZED)); |
@@ -5680,35 +5658,18 @@ static __init int selinux_init(void) | |||
5680 | return 0; | 5658 | return 0; |
5681 | } | 5659 | } |
5682 | 5660 | ||
5661 | static void delayed_superblock_init(struct super_block *sb, void *unused) | ||
5662 | { | ||
5663 | superblock_doinit(sb, NULL); | ||
5664 | } | ||
5665 | |||
5683 | void selinux_complete_init(void) | 5666 | void selinux_complete_init(void) |
5684 | { | 5667 | { |
5685 | printk(KERN_DEBUG "SELinux: Completing initialization.\n"); | 5668 | printk(KERN_DEBUG "SELinux: Completing initialization.\n"); |
5686 | 5669 | ||
5687 | /* Set up any superblocks initialized prior to the policy load. */ | 5670 | /* Set up any superblocks initialized prior to the policy load. */ |
5688 | printk(KERN_DEBUG "SELinux: Setting up existing superblocks.\n"); | 5671 | printk(KERN_DEBUG "SELinux: Setting up existing superblocks.\n"); |
5689 | spin_lock(&sb_lock); | 5672 | iterate_supers(delayed_superblock_init, NULL); |
5690 | spin_lock(&sb_security_lock); | ||
5691 | next_sb: | ||
5692 | if (!list_empty(&superblock_security_head)) { | ||
5693 | struct superblock_security_struct *sbsec = | ||
5694 | list_entry(superblock_security_head.next, | ||
5695 | struct superblock_security_struct, | ||
5696 | list); | ||
5697 | struct super_block *sb = sbsec->sb; | ||
5698 | sb->s_count++; | ||
5699 | spin_unlock(&sb_security_lock); | ||
5700 | spin_unlock(&sb_lock); | ||
5701 | down_read(&sb->s_umount); | ||
5702 | if (sb->s_root) | ||
5703 | superblock_doinit(sb, NULL); | ||
5704 | drop_super(sb); | ||
5705 | spin_lock(&sb_lock); | ||
5706 | spin_lock(&sb_security_lock); | ||
5707 | list_del_init(&sbsec->list); | ||
5708 | goto next_sb; | ||
5709 | } | ||
5710 | spin_unlock(&sb_security_lock); | ||
5711 | spin_unlock(&sb_lock); | ||
5712 | } | 5673 | } |
5713 | 5674 | ||
5714 | /* SELinux requires early initialization in order to label | 5675 | /* SELinux requires early initialization in order to label |
diff --git a/security/selinux/include/objsec.h b/security/selinux/include/objsec.h index c4e062336ef3..26c7eee1c309 100644 --- a/security/selinux/include/objsec.h +++ b/security/selinux/include/objsec.h | |||
@@ -55,7 +55,6 @@ struct file_security_struct { | |||
55 | 55 | ||
56 | struct superblock_security_struct { | 56 | struct superblock_security_struct { |
57 | struct super_block *sb; /* back pointer to sb object */ | 57 | struct super_block *sb; /* back pointer to sb object */ |
58 | struct list_head list; /* list of superblock_security_struct */ | ||
59 | u32 sid; /* SID of file system superblock */ | 58 | u32 sid; /* SID of file system superblock */ |
60 | u32 def_sid; /* default SID for labeling */ | 59 | u32 def_sid; /* default SID for labeling */ |
61 | u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */ | 60 | u32 mntpoint_sid; /* SECURITY_FS_USE_MNTPOINT context for files */ |