On Tue, 2008-03-11 at 14:19 -0400, Eric Paris wrote: > This patch turns the case where we have a call into avc_has_perm with no > requested permissions into a BUG_ON. All callers to this should be in > the kernel and thus should be a function we need to fix if we ever hit > this. The /selinux/access permission checking it done directly in the > security server and not through the avc, so those requests which we > cannot control from userspace should not be able to trigger this BUG_ON. > > Signed-off-by: Eric Paris <eparis@xxxxxxxxxx> Acked-by: Stephen D. Smalley <sds@xxxxxxxxxxxxx> > > --- > > security/selinux/avc.c | 4 +++- > 1 files changed, 3 insertions(+), 1 deletion(-) > > diff --git a/security/selinux/avc.c b/security/selinux/avc.c > index 187964e..cb3f0ce 100644 > --- a/security/selinux/avc.c > +++ b/security/selinux/avc.c > @@ -871,6 +871,8 @@ int avc_has_perm_noaudit(u32 ssid, u32 tsid, > int rc = 0; > u32 denied; > > + BUG_ON(!requested); > + > rcu_read_lock(); > > node = avc_lookup(ssid, tsid, tclass, requested); > @@ -890,7 +892,7 @@ int avc_has_perm_noaudit(u32 ssid, u32 tsid, > > denied = requested & ~(p_ae->avd.allowed); > > - if (!requested || denied) { > + if (denied) { > if (selinux_enforcing || (flags & AVC_STRICT)) > rc = -EACCES; > else -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.