Skip to content

Commit

Permalink
---
Browse files Browse the repository at this point in the history
yaml
---
r: 16667
b: refs/heads/master
c: 5f8ac64
h: refs/heads/master
i:
  16665: 2be0c1c
  16663: 0a6c2ab
v: v3
  • Loading branch information
Trent Jaeger authored and David S. Miller committed Jan 6, 2006
1 parent 2e79d9c commit 151e156
Show file tree
Hide file tree
Showing 5 changed files with 5 additions and 12 deletions.
2 changes: 1 addition & 1 deletion [refs]
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
---
refs/heads/master: 69549ddd2f894c4cead50ee2b60cc02990c389ad
refs/heads/master: 5f8ac64b15172c7ced7d7990eb28342092bc751b
1 change: 1 addition & 0 deletions trunk/net/xfrm/xfrm_user.c
Original file line number Diff line number Diff line change
Expand Up @@ -802,6 +802,7 @@ static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh, void **xfr
excl = nlh->nlmsg_type == XFRM_MSG_NEWPOLICY;
err = xfrm_policy_insert(p->dir, xp, excl);
if (err) {
security_xfrm_policy_free(xp);
kfree(xp);
return err;
}
Expand Down
3 changes: 1 addition & 2 deletions trunk/security/selinux/include/av_perm_to_string.h
Original file line number Diff line number Diff line change
Expand Up @@ -238,5 +238,4 @@
S_(SECCLASS_NSCD, NSCD__SHMEMHOST, "shmemhost")
S_(SECCLASS_ASSOCIATION, ASSOCIATION__SENDTO, "sendto")
S_(SECCLASS_ASSOCIATION, ASSOCIATION__RECVFROM, "recvfrom")
S_(SECCLASS_ASSOCIATION, ASSOCIATION__RELABELFROM, "relabelfrom")
S_(SECCLASS_ASSOCIATION, ASSOCIATION__RELABELTO, "relabelto")
S_(SECCLASS_ASSOCIATION, ASSOCIATION__SETCONTEXT, "setcontext")
3 changes: 1 addition & 2 deletions trunk/security/selinux/include/av_permissions.h
Original file line number Diff line number Diff line change
Expand Up @@ -908,8 +908,7 @@

#define ASSOCIATION__SENDTO 0x00000001UL
#define ASSOCIATION__RECVFROM 0x00000002UL
#define ASSOCIATION__RELABELFROM 0x00000004UL
#define ASSOCIATION__RELABELTO 0x00000008UL
#define ASSOCIATION__SETCONTEXT 0x00000004UL

#define NETLINK_KOBJECT_UEVENT_SOCKET__IOCTL 0x00000001UL
#define NETLINK_KOBJECT_UEVENT_SOCKET__READ 0x00000002UL
Expand Down
8 changes: 1 addition & 7 deletions trunk/security/selinux/xfrm.c
Original file line number Diff line number Diff line change
Expand Up @@ -137,15 +137,9 @@ static int selinux_xfrm_sec_ctx_alloc(struct xfrm_sec_ctx **ctxp, struct xfrm_us
* Must be permitted to relabel from default socket type (process type)
* to specified context
*/
rc = avc_has_perm(tsec->sid, tsec->sid,
SECCLASS_ASSOCIATION,
ASSOCIATION__RELABELFROM, NULL);
if (rc)
goto out;

rc = avc_has_perm(tsec->sid, ctx->ctx_sid,
SECCLASS_ASSOCIATION,
ASSOCIATION__RELABELTO, NULL);
ASSOCIATION__SETCONTEXT, NULL);
if (rc)
goto out;

Expand Down

0 comments on commit 151e156

Please sign in to comment.