summaryrefslogtreecommitdiff
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorAl Viro <viro@zeniv.linux.org.uk>2018-12-11 01:30:41 +0300
committerAl Viro <viro@zeniv.linux.org.uk>2018-12-21 19:47:19 +0300
commit6a0440e5b7562512c021aa1b5a706fcc545773db (patch)
tree1949ceff7d2c7d417d8927420bb3b966e6d9cdbf /security/selinux/hooks.c
parenta65001e8a4d465693d0191297a6fd864c96b3147 (diff)
downloadlinux-6a0440e5b7562512c021aa1b5a706fcc545773db.tar.xz
nfs_remount(): don't leak, don't ignore LSM options quietly
* if mount(2) passes something like "context=foo" with MS_REMOUNT in flags (/sbin/mount.nfs will _not_ do that - you need to issue the syscall manually), you'll get leaked copies for LSM options. The reason is that instead of nfs_{alloc,free}_parsed_mount_data() nfs_remount() uses kzalloc/kfree, which lacks the needed cleanup. * selinux options are not changed on remount (as for any other fs), but in case of NFS the failure is quiet - they are not compared to what we used to have, with complaint in case of attempted changes. Trivially fixed by converting to use of security_sb_remount(). Reviewed-by: David Howells <dhowells@redhat.com> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions