diff options
author | Stephen Smalley <sds@tycho.nsa.gov> | 2019-11-22 20:22:44 +0300 |
---|---|---|
committer | Paul Moore <paul@paul-moore.com> | 2019-12-10 02:28:56 +0300 |
commit | 1a37079c236d55fb31ebbf4b59945dab8ec8764c (patch) | |
tree | 7981c80629949905c03d4ca9618c6448e0983236 /security/selinux/include | |
parent | 59438b46471ae6cdfb761afc8c9beaf1e428a331 (diff) | |
download | linux-1a37079c236d55fb31ebbf4b59945dab8ec8764c.tar.xz |
selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"
This reverts commit e46e01eebbbc ("selinux: stop passing MAY_NOT_BLOCK
to the AVC upon follow_link"). The correct fix is to instead fall
back to ref-walk if audit is required irrespective of the specific
audit data type. This is done in the next commit.
Fixes: e46e01eebbbc ("selinux: stop passing MAY_NOT_BLOCK to the AVC upon follow_link")
Reported-by: Will Deacon <will@kernel.org>
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security/selinux/include')
-rw-r--r-- | security/selinux/include/avc.h | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/security/selinux/include/avc.h b/security/selinux/include/avc.h index 7be0e1e90e8b..74ea50977c20 100644 --- a/security/selinux/include/avc.h +++ b/security/selinux/include/avc.h @@ -153,6 +153,11 @@ int avc_has_perm(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata); +int avc_has_perm_flags(struct selinux_state *state, + u32 ssid, u32 tsid, + u16 tclass, u32 requested, + struct common_audit_data *auditdata, + int flags); int avc_has_extended_perms(struct selinux_state *state, u32 ssid, u32 tsid, u16 tclass, u32 requested, |