android_kernel_samsung_a7y1.../security
Ondrej Mosnacek c62a3ee57d selinux: never allow relabeling on context mounts
commit a83d6ddaebe541570291205cb538e35ad4ff94f9 upstream.

In the SECURITY_FS_USE_MNTPOINT case we never want to allow relabeling
files/directories, so we should never set the SBLABEL_MNT flag. The
'special handling' in selinux_is_sblabel_mnt() is only intended for when
the behavior is set to SECURITY_FS_USE_GENFS.

While there, make the logic in selinux_is_sblabel_mnt() more explicit
and add a BUILD_BUG_ON() to make sure that introducing a new
SECURITY_FS_USE_* forces a review of the logic.

Fixes: d5f3a5f6e7e7 ("selinux: add security in-core xattr support for pstore and debugfs")
Signed-off-by: Ondrej Mosnacek <omosnace@redhat.com>
Reviewed-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-04-06 16:42:43 +02:00
..
apparmor
defex_lsm Revert "security: defex: set Defex to Permissive status" 2020-04-06 19:40:02 +05:30
dsms
integrity
keys
mstdrv
proca
samsung
sdp
selinux selinux: never allow relabeling on context mounts 2020-04-06 16:42:43 +02:00
smack
tima_uevent
tomoyo
tz_iccc
yama
commoncap.c
device_cgroup.c device_cgroup: fix RCU imbalance in error case 2020-04-06 15:57:12 +02:00
inode.c
Kconfig
lsm_audit.c
Makefile
min_addr.c
security.c