[patch] selinux: handle files opened with flags 3 by checking ioctl permission

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2008-03-17 at 08:41 +1100, James Morris wrote:
> On Fri, 14 Mar 2008, Stephen Smalley wrote:
> 
> > Alternatively, we could default to returning FILE__IOCTL from
> > file_to_av() if the f_mode has neither FMODE_READ nor FMODE_WRITE, and
> > thus check ioctl permission on exec or transfer, thereby validating such
> > descriptors early as with normal r/w descriptors and catching leaks of
> > them prior to attempted usage.
> 
> I think this sounds like a good plan.

Handle files opened with flags 3 by checking ioctl permission.

Signed-off-by:  Stephen Smalley <sds@xxxxxxxxxxxxx>

---

 security/selinux/hooks.c |    6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 4bf4807..7d82aa2 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -1629,6 +1629,12 @@ static inline u32 file_to_av(struct file *file)
 		else
 			av |= FILE__WRITE;
 	}
+	if (!av) {
+		/*
+		 * Special file opened with flags 3 for ioctl-only use.
+		 */
+		av = FILE__IOCTL;
+	}
 
 	return av;
 }



-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux