mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-04 16:35:02 +01:00
93 lines
3.2 KiB
Diff
93 lines
3.2 KiB
Diff
Pass struct vfsmount to the inode_rmdir LSM hook
|
|
|
|
Signed-off-by: Tony Jones <tonyj@suse.de>
|
|
Signed-off-by: Andreas Gruenbacher <agruen@suse.de>
|
|
|
|
Index: b/fs/namei.c
|
|
===================================================================
|
|
--- a/fs/namei.c
|
|
+++ b/fs/namei.c
|
|
@@ -2023,7 +2023,7 @@ int vfs_rmdir(struct inode *dir, struct
|
|
if (d_mountpoint(dentry))
|
|
error = -EBUSY;
|
|
else {
|
|
- error = security_inode_rmdir(dir, dentry);
|
|
+ error = security_inode_rmdir(dir, dentry, mnt);
|
|
if (!error) {
|
|
error = dir->i_op->rmdir(dir, dentry);
|
|
if (!error)
|
|
Index: b/include/linux/security.h
|
|
===================================================================
|
|
--- a/include/linux/security.h
|
|
+++ b/include/linux/security.h
|
|
@@ -318,6 +318,7 @@ struct request_sock;
|
|
* Check the permission to remove a directory.
|
|
* @dir contains the inode structure of parent of the directory to be removed.
|
|
* @dentry contains the dentry structure of directory to be removed.
|
|
+ * @mnt is the vfsmount corresponding to @dentry (may be NULL).
|
|
* Return 0 if permission is granted.
|
|
* @inode_mknod:
|
|
* Check permissions when creating a special file (or a socket or a fifo
|
|
@@ -1222,7 +1223,8 @@ struct security_operations {
|
|
struct vfsmount *mnt, const char *old_name);
|
|
int (*inode_mkdir) (struct inode *dir, struct dentry *dentry,
|
|
struct vfsmount *mnt, int mode);
|
|
- int (*inode_rmdir) (struct inode *dir, struct dentry *dentry);
|
|
+ int (*inode_rmdir) (struct inode *dir, struct dentry *dentry,
|
|
+ struct vfsmount *mnt);
|
|
int (*inode_mknod) (struct inode *dir, struct dentry *dentry,
|
|
struct vfsmount *mnt, int mode, dev_t dev);
|
|
int (*inode_rename) (struct inode *old_dir, struct dentry *old_dentry,
|
|
@@ -1671,11 +1673,12 @@ static inline int security_inode_mkdir (
|
|
}
|
|
|
|
static inline int security_inode_rmdir (struct inode *dir,
|
|
- struct dentry *dentry)
|
|
+ struct dentry *dentry,
|
|
+ struct vfsmount *mnt)
|
|
{
|
|
if (unlikely (IS_PRIVATE (dentry->d_inode)))
|
|
return 0;
|
|
- return security_ops->inode_rmdir (dir, dentry);
|
|
+ return security_ops->inode_rmdir (dir, dentry, mnt);
|
|
}
|
|
|
|
static inline int security_inode_mknod (struct inode *dir,
|
|
@@ -2396,7 +2399,8 @@ static inline int security_inode_mkdir (
|
|
}
|
|
|
|
static inline int security_inode_rmdir (struct inode *dir,
|
|
- struct dentry *dentry)
|
|
+ struct dentry *dentry,
|
|
+ struct vfsmount *mnt)
|
|
{
|
|
return 0;
|
|
}
|
|
Index: b/security/dummy.c
|
|
===================================================================
|
|
--- a/security/dummy.c
|
|
+++ b/security/dummy.c
|
|
@@ -295,7 +295,8 @@ static int dummy_inode_mkdir (struct ino
|
|
return 0;
|
|
}
|
|
|
|
-static int dummy_inode_rmdir (struct inode *inode, struct dentry *dentry)
|
|
+static int dummy_inode_rmdir (struct inode *inode, struct dentry *dentry,
|
|
+ struct vfsmount *mnt)
|
|
{
|
|
return 0;
|
|
}
|
|
Index: b/security/selinux/hooks.c
|
|
===================================================================
|
|
--- a/security/selinux/hooks.c
|
|
+++ b/security/selinux/hooks.c
|
|
@@ -2221,7 +2221,8 @@ static int selinux_inode_mkdir(struct in
|
|
return may_create(dir, dentry, SECCLASS_DIR);
|
|
}
|
|
|
|
-static int selinux_inode_rmdir(struct inode *dir, struct dentry *dentry)
|
|
+static int selinux_inode_rmdir(struct inode *dir, struct dentry *dentry,
|
|
+ struct vfsmount *mnt)
|
|
{
|
|
return may_link(dir, dentry, MAY_RMDIR);
|
|
}
|