Skip to content

Commit

Permalink
selinux: load the initial SIDs upon every policy load
Browse files Browse the repository at this point in the history
Always load the initial SIDs, even in the case of a policy
reload and not just at the initial policy load. This comes
particularly handy after the introduction of a recent
patch for enabling runtime switching between different
policy types, although this patch is in theory independent
from that feature.

Signed-off-by: Guido Trentalancia <guido@trentalancia.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
  • Loading branch information
Guido Trentalancia authored and James Morris committed Feb 3, 2010
1 parent b6cac5a commit 42596ea
Showing 1 changed file with 12 additions and 4 deletions.
16 changes: 12 additions & 4 deletions security/selinux/ss/services.c
Original file line number Diff line number Diff line change
Expand Up @@ -1506,7 +1506,10 @@ static int clone_sid(u32 sid,
{
struct sidtab *s = arg;

return sidtab_insert(s, sid, context);
if (sid > SECINITSID_NUM)
return sidtab_insert(s, sid, context);
else
return 0;
}

static inline int convert_context_handle_invalid_context(struct context *context)
Expand Down Expand Up @@ -1552,7 +1555,10 @@ static int convert_context(u32 key,
struct user_datum *usrdatum;
char *s;
u32 len;
int rc;
int rc = 0;

if (key <= SECINITSID_NUM)
goto out;

args = p;

Expand Down Expand Up @@ -1712,9 +1718,11 @@ int security_load_policy(void *data, size_t len)
if (policydb_read(&newpolicydb, fp))
return -EINVAL;

if (sidtab_init(&newsidtab)) {
rc = policydb_load_isids(&newpolicydb, &newsidtab);
if (rc) {
printk(KERN_ERR "SELinux: unable to load the initial SIDs\n");
policydb_destroy(&newpolicydb);
return -ENOMEM;
return rc;
}

if (selinux_set_mapping(&newpolicydb, secclass_map,
Expand Down

0 comments on commit 42596ea

Please sign in to comment.