kernel-ark/security/selinux
David S. Miller 3610cda53f af_unix: Avoid socket->sk NULL OOPS in stream connect security hooks.
unix_release() can asynchornously set socket->sk to NULL, and
it does so without holding the unix_state_lock() on "other"
during stream connects.

However, the reverse mapping, sk->sk_socket, is only transitioned
to NULL under the unix_state_lock().

Therefore make the security hooks follow the reverse mapping instead
of the forward mapping.

Reported-by: Jeremy Fitzhardinge <jeremy@goop.org>
Reported-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2011-01-05 15:38:53 -08:00
..
include SELinux: allow userspace to read policy back out of the kernel 2010-10-21 10:12:58 +11:00
ss selinux: include vmalloc.h for vmalloc_user 2010-10-21 10:13:01 +11:00
.gitignore
avc.c SELinux: special dontaudit for access checks 2010-08-02 15:35:07 +10:00
exports.c secmark: make secmark object handling generic 2010-10-21 10:12:48 +11:00
hooks.c af_unix: Avoid socket->sk NULL OOPS in stream connect security hooks. 2011-01-05 15:38:53 -08:00
Kconfig
Makefile selinux: change to new flag variable 2010-10-21 10:12:40 +11:00
netif.c
netlabel.c
netlink.c
netnode.c selinux: remove all rcu head initializations 2010-08-02 15:33:35 +10:00
netport.c
nlmsgtab.c
selinuxfs.c convert get_sb_single() users 2010-10-29 04:16:28 -04:00
xfrm.c