diff options
Diffstat (limited to 'security/selinux/hooks.c')
-rw-r--r-- | security/selinux/hooks.c | 11 |
1 files changed, 7 insertions, 4 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 2c7341dbc5d6..336f0a04450e 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -2123,11 +2123,13 @@ static int selinux_bprm_set_creds(struct linux_binprm *bprm) | |||
2123 | new_tsec->exec_sid = 0; | 2123 | new_tsec->exec_sid = 0; |
2124 | 2124 | ||
2125 | /* | 2125 | /* |
2126 | * Minimize confusion: if no_new_privs and a transition is | 2126 | * Minimize confusion: if no_new_privs or nosuid and a |
2127 | * explicitly requested, then fail the exec. | 2127 | * transition is explicitly requested, then fail the exec. |
2128 | */ | 2128 | */ |
2129 | if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) | 2129 | if (bprm->unsafe & LSM_UNSAFE_NO_NEW_PRIVS) |
2130 | return -EPERM; | 2130 | return -EPERM; |
2131 | if (bprm->file->f_path.mnt->mnt_flags & MNT_NOSUID) | ||
2132 | return -EACCES; | ||
2131 | } else { | 2133 | } else { |
2132 | /* Check for a default transition on this program. */ | 2134 | /* Check for a default transition on this program. */ |
2133 | rc = security_transition_sid(old_tsec->sid, isec->sid, | 2135 | rc = security_transition_sid(old_tsec->sid, isec->sid, |
@@ -2770,6 +2772,7 @@ static int selinux_inode_follow_link(struct dentry *dentry, struct nameidata *na | |||
2770 | 2772 | ||
2771 | static noinline int audit_inode_permission(struct inode *inode, | 2773 | static noinline int audit_inode_permission(struct inode *inode, |
2772 | u32 perms, u32 audited, u32 denied, | 2774 | u32 perms, u32 audited, u32 denied, |
2775 | int result, | ||
2773 | unsigned flags) | 2776 | unsigned flags) |
2774 | { | 2777 | { |
2775 | struct common_audit_data ad; | 2778 | struct common_audit_data ad; |
@@ -2780,7 +2783,7 @@ static noinline int audit_inode_permission(struct inode *inode, | |||
2780 | ad.u.inode = inode; | 2783 | ad.u.inode = inode; |
2781 | 2784 | ||
2782 | rc = slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms, | 2785 | rc = slow_avc_audit(current_sid(), isec->sid, isec->sclass, perms, |
2783 | audited, denied, &ad, flags); | 2786 | audited, denied, result, &ad, flags); |
2784 | if (rc) | 2787 | if (rc) |
2785 | return rc; | 2788 | return rc; |
2786 | return 0; | 2789 | return 0; |
@@ -2822,7 +2825,7 @@ static int selinux_inode_permission(struct inode *inode, int mask) | |||
2822 | if (likely(!audited)) | 2825 | if (likely(!audited)) |
2823 | return rc; | 2826 | return rc; |
2824 | 2827 | ||
2825 | rc2 = audit_inode_permission(inode, perms, audited, denied, flags); | 2828 | rc2 = audit_inode_permission(inode, perms, audited, denied, rc, flags); |
2826 | if (rc2) | 2829 | if (rc2) |
2827 | return rc2; | 2830 | return rc2; |
2828 | return rc; | 2831 | return rc; |