diff options
author | John Johansen <john.johansen@canonical.com> | 2018-06-05 05:44:59 +0300 |
---|---|---|
committer | John Johansen <john.johansen@canonical.com> | 2018-06-07 11:50:49 +0300 |
commit | a4c3f89c9b5a9fab5a8e4ea05399acd6e23072df (patch) | |
tree | 7a92b037adce16071b0ca0207115b7d8f434c5c6 /security/apparmor/secid.c | |
parent | 99cc45e486786c7215a7e39824c3bbaf7cf2fc08 (diff) | |
download | linux-a4c3f89c9b5a9fab5a8e4ea05399acd6e23072df.tar.xz |
apparmor: fixup secid map conversion to using IDR
The IDR conversion did not handle an error case for when allocating a
mapping fails, and it did not ensure that mappings did not allocate or
use a 0 value, which is used as an invalid secid. Which is used when a
mapping fails.
Fixes: 3ae7eb49a2be ("apparmor: Use an IDR to allocate apparmor secids")
Signed-off-by: John Johansen <john.johansen@canonical.com>
Diffstat (limited to 'security/apparmor/secid.c')
-rw-r--r-- | security/apparmor/secid.c | 28 |
1 files changed, 23 insertions, 5 deletions
diff --git a/security/apparmor/secid.c b/security/apparmor/secid.c index 3ad94b2ffbb2..f2f22d00db18 100644 --- a/security/apparmor/secid.c +++ b/security/apparmor/secid.c @@ -33,6 +33,8 @@ * properly updating/freeing them */ +#define AA_FIRST_SECID 1 + static DEFINE_IDR(aa_secids); static DEFINE_SPINLOCK(secid_lock); @@ -120,20 +122,31 @@ void apparmor_release_secctx(char *secdata, u32 seclen) /** * aa_alloc_secid - allocate a new secid for a profile + * @label: the label to allocate a secid for + * @gfp: memory allocation flags + * + * Returns: 0 with @label->secid initialized + * <0 returns error with @label->secid set to AA_SECID_INVALID */ -u32 aa_alloc_secid(struct aa_label *label, gfp_t gfp) +int aa_alloc_secid(struct aa_label *label, gfp_t gfp) { unsigned long flags; - u32 secid; + int ret; idr_preload(gfp); spin_lock_irqsave(&secid_lock, flags); - secid = idr_alloc(&aa_secids, label, 0, 0, GFP_ATOMIC); - /* XXX: Can return -ENOMEM */ + ret = idr_alloc(&aa_secids, label, AA_FIRST_SECID, 0, GFP_ATOMIC); spin_unlock_irqrestore(&secid_lock, flags); idr_preload_end(); - return secid; + if (ret < 0) { + label->secid = AA_SECID_INVALID; + return ret; + } + + AA_BUG(ret == AA_SECID_INVALID); + label->secid = ret; + return 0; } /** @@ -148,3 +161,8 @@ void aa_free_secid(u32 secid) idr_remove(&aa_secids, secid); spin_unlock_irqrestore(&secid_lock, flags); } + +void aa_secids_init(void) +{ + idr_init_base(&aa_secids, AA_FIRST_SECID); +} |