diff options
author | Paul Moore <paul@paul-moore.com> | 2017-12-05 17:17:43 -0500 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2018-02-25 11:07:49 +0100 |
commit | ca181454e726e47434566d9a126e9cfc29db48ae (patch) | |
tree | 2ee79b67920eb2d46fc8cc55474e34b877a1e7ac /security | |
parent | 116df867dbc12297d0e04cd6540ecad401f4c060 (diff) | |
download | linux-stable-ca181454e726e47434566d9a126e9cfc29db48ae.tar.gz linux-stable-ca181454e726e47434566d9a126e9cfc29db48ae.tar.bz2 linux-stable-ca181454e726e47434566d9a126e9cfc29db48ae.zip |
selinux: skip bounded transition processing if the policy isn't loaded
commit 4b14752ec4e0d87126e636384cf37c8dd9df157c upstream.
We can't do anything reasonable in security_bounded_transition() if we
don't have a policy loaded, and in fact we could run into problems
with some of the code inside expecting a policy. Fix these problems
like we do many others in security/selinux/ss/services.c by checking
to see if the policy is loaded (ss_initialized) and returning quickly
if it isn't.
Reported-by: syzbot <syzkaller-bugs@googlegroups.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Reviewed-by: James Morris <james.l.morris@oracle.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security')
-rw-r--r-- | security/selinux/ss/services.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 338af05e06fa..c9c031e3d1ae 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -867,6 +867,9 @@ int security_bounded_transition(u32 old_sid, u32 new_sid) int index; int rc; + if (!ss_initialized) + return 0; + read_lock(&policy_rwlock); rc = -EINVAL; |