diff options
author | Paul Moore <paul@paul-moore.com> | 2017-12-05 23:17:43 +0100 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2017-12-05 23:17:43 +0100 |
commit | 4b14752ec4e0d87126e636384cf37c8dd9df157c (patch) | |
tree | 9811c34d3e0d68b05f87e4069e911bee1ba32ce2 /security/selinux | |
parent | selinux: ensure the context is NUL terminated in security_context_to_sid_core() (diff) | |
download | linux-4b14752ec4e0d87126e636384cf37c8dd9df157c.tar.xz linux-4b14752ec4e0d87126e636384cf37c8dd9df157c.zip |
selinux: skip bounded transition processing if the policy isn't loaded
We can't do anything reasonable in security_bounded_transition() if we
don't have a policy loaded, and in fact we could run into problems
with some of the code inside expecting a policy. Fix these problems
like we do many others in security/selinux/ss/services.c by checking
to see if the policy is loaded (ss_initialized) and returning quickly
if it isn't.
Reported-by: syzbot <syzkaller-bugs@googlegroups.com>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
Reviewed-by: James Morris <james.l.morris@oracle.com>
Diffstat (limited to 'security/selinux')
-rw-r--r-- | security/selinux/ss/services.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index d05496deb229..8900ea5cbabf 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -867,6 +867,9 @@ int security_bounded_transition(u32 old_sid, u32 new_sid) int index; int rc; + if (!ss_initialized) + return 0; + read_lock(&policy_rwlock); rc = -EINVAL; |