diff options
Diffstat (limited to 'security')
-rw-r--r-- | security/commoncap.c | 13 | ||||
-rw-r--r-- | security/selinux/netlabel.c | 7 | ||||
-rw-r--r-- | security/selinux/ss/services.c | 2 |
3 files changed, 15 insertions, 7 deletions
diff --git a/security/commoncap.c b/security/commoncap.c index 5bc1895f3f9c..ea61bc73f6d3 100644 --- a/security/commoncap.c +++ b/security/commoncap.c | |||
@@ -59,6 +59,12 @@ int cap_netlink_recv(struct sk_buff *skb, int cap) | |||
59 | 59 | ||
60 | EXPORT_SYMBOL(cap_netlink_recv); | 60 | EXPORT_SYMBOL(cap_netlink_recv); |
61 | 61 | ||
62 | /* | ||
63 | * NOTE WELL: cap_capable() cannot be used like the kernel's capable() | ||
64 | * function. That is, it has the reverse semantics: cap_capable() | ||
65 | * returns 0 when a task has a capability, but the kernel's capable() | ||
66 | * returns 1 for this case. | ||
67 | */ | ||
62 | int cap_capable (struct task_struct *tsk, int cap) | 68 | int cap_capable (struct task_struct *tsk, int cap) |
63 | { | 69 | { |
64 | /* Derived from include/linux/sched.h:capable. */ | 70 | /* Derived from include/linux/sched.h:capable. */ |
@@ -107,10 +113,11 @@ static inline int cap_block_setpcap(struct task_struct *target) | |||
107 | static inline int cap_inh_is_capped(void) | 113 | static inline int cap_inh_is_capped(void) |
108 | { | 114 | { |
109 | /* | 115 | /* |
110 | * return 1 if changes to the inheritable set are limited | 116 | * Return 1 if changes to the inheritable set are limited |
111 | * to the old permitted set. | 117 | * to the old permitted set. That is, if the current task |
118 | * does *not* possess the CAP_SETPCAP capability. | ||
112 | */ | 119 | */ |
113 | return !cap_capable(current, CAP_SETPCAP); | 120 | return (cap_capable(current, CAP_SETPCAP) != 0); |
114 | } | 121 | } |
115 | 122 | ||
116 | #else /* ie., ndef CONFIG_SECURITY_FILE_CAPABILITIES */ | 123 | #else /* ie., ndef CONFIG_SECURITY_FILE_CAPABILITIES */ |
diff --git a/security/selinux/netlabel.c b/security/selinux/netlabel.c index d243ddc723a5..66e013d6f6f6 100644 --- a/security/selinux/netlabel.c +++ b/security/selinux/netlabel.c | |||
@@ -53,10 +53,11 @@ static int selinux_netlbl_sock_setsid(struct sock *sk, u32 sid) | |||
53 | struct sk_security_struct *sksec = sk->sk_security; | 53 | struct sk_security_struct *sksec = sk->sk_security; |
54 | struct netlbl_lsm_secattr secattr; | 54 | struct netlbl_lsm_secattr secattr; |
55 | 55 | ||
56 | netlbl_secattr_init(&secattr); | ||
57 | |||
56 | rc = security_netlbl_sid_to_secattr(sid, &secattr); | 58 | rc = security_netlbl_sid_to_secattr(sid, &secattr); |
57 | if (rc != 0) | 59 | if (rc != 0) |
58 | return rc; | 60 | goto sock_setsid_return; |
59 | |||
60 | rc = netlbl_sock_setattr(sk, &secattr); | 61 | rc = netlbl_sock_setattr(sk, &secattr); |
61 | if (rc == 0) { | 62 | if (rc == 0) { |
62 | spin_lock_bh(&sksec->nlbl_lock); | 63 | spin_lock_bh(&sksec->nlbl_lock); |
@@ -64,6 +65,8 @@ static int selinux_netlbl_sock_setsid(struct sock *sk, u32 sid) | |||
64 | spin_unlock_bh(&sksec->nlbl_lock); | 65 | spin_unlock_bh(&sksec->nlbl_lock); |
65 | } | 66 | } |
66 | 67 | ||
68 | sock_setsid_return: | ||
69 | netlbl_secattr_destroy(&secattr); | ||
67 | return rc; | 70 | return rc; |
68 | } | 71 | } |
69 | 72 | ||
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index d572dc908f31..f83b19daed16 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c | |||
@@ -2606,8 +2606,6 @@ int security_netlbl_sid_to_secattr(u32 sid, struct netlbl_lsm_secattr *secattr) | |||
2606 | int rc = -ENOENT; | 2606 | int rc = -ENOENT; |
2607 | struct context *ctx; | 2607 | struct context *ctx; |
2608 | 2608 | ||
2609 | netlbl_secattr_init(secattr); | ||
2610 | |||
2611 | if (!ss_initialized) | 2609 | if (!ss_initialized) |
2612 | return 0; | 2610 | return 0; |
2613 | 2611 | ||