mirror of
https://github.com/tbsdtv/linux_media.git
synced 2025-07-23 20:51:03 +02:00
selinux: fix residual uses of current_security() for the SELinux blob
We need to use selinux_cred() to fetch the SELinux cred blob instead
of directly using current->security or current_security(). There
were a couple of lingering uses of current_security() in the SELinux code
that were apparently missed during the earlier conversions. IIUC, this
would only manifest as a bug if multiple security modules including
SELinux are enabled and SELinux is not first in the lsm order. After
this change, there appear to be no other users of current_security()
in-tree; perhaps we should remove it altogether.
Fixes: bbd3662a83
("Infrastructure management of the cred security blob")
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Acked-by: Casey Schaufler <casey@schaufler-ca.com>
Reviewed-by: James Morris <jamorris@linux.microsoft.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
committed by
Paul Moore
parent
116f21bb96
commit
169ce0c081
@@ -3435,7 +3435,7 @@ static int selinux_inode_copy_up_xattr(const char *name)
|
|||||||
static int selinux_kernfs_init_security(struct kernfs_node *kn_dir,
|
static int selinux_kernfs_init_security(struct kernfs_node *kn_dir,
|
||||||
struct kernfs_node *kn)
|
struct kernfs_node *kn)
|
||||||
{
|
{
|
||||||
const struct task_security_struct *tsec = current_security();
|
const struct task_security_struct *tsec = selinux_cred(current_cred());
|
||||||
u32 parent_sid, newsid, clen;
|
u32 parent_sid, newsid, clen;
|
||||||
int rc;
|
int rc;
|
||||||
char *context;
|
char *context;
|
||||||
|
@@ -40,16 +40,6 @@ struct task_security_struct {
|
|||||||
u32 sockcreate_sid; /* fscreate SID */
|
u32 sockcreate_sid; /* fscreate SID */
|
||||||
};
|
};
|
||||||
|
|
||||||
/*
|
|
||||||
* get the subjective security ID of the current task
|
|
||||||
*/
|
|
||||||
static inline u32 current_sid(void)
|
|
||||||
{
|
|
||||||
const struct task_security_struct *tsec = current_security();
|
|
||||||
|
|
||||||
return tsec->sid;
|
|
||||||
}
|
|
||||||
|
|
||||||
enum label_initialized {
|
enum label_initialized {
|
||||||
LABEL_INVALID, /* invalid or not initialized */
|
LABEL_INVALID, /* invalid or not initialized */
|
||||||
LABEL_INITIALIZED, /* initialized */
|
LABEL_INITIALIZED, /* initialized */
|
||||||
@@ -188,4 +178,14 @@ static inline struct ipc_security_struct *selinux_ipc(
|
|||||||
return ipc->security + selinux_blob_sizes.lbs_ipc;
|
return ipc->security + selinux_blob_sizes.lbs_ipc;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* get the subjective security ID of the current task
|
||||||
|
*/
|
||||||
|
static inline u32 current_sid(void)
|
||||||
|
{
|
||||||
|
const struct task_security_struct *tsec = selinux_cred(current_cred());
|
||||||
|
|
||||||
|
return tsec->sid;
|
||||||
|
}
|
||||||
|
|
||||||
#endif /* _SELINUX_OBJSEC_H_ */
|
#endif /* _SELINUX_OBJSEC_H_ */
|
||||||
|
Reference in New Issue
Block a user