linux-sg2042/security/selinux
Stephen Smalley 4c443d1b55 [PATCH] selinux: fix avc_alloc_node() oom with no policy loaded
This patch should fix the avc_alloc_node() oom condition that Andrew
reported when no policy is loaded in SELinux.

Prior to this patch, when no policy was loaded, the SELinux "security
server" (policy engine) was only returning allowed decisions for the
requested permissions for each access check.  This caused the cache to
thrash when trying to use SELinux for real work with no policy loaded
(typically, the no policy loaded state is only for bootstrapping to the
point where we can load an initial policy).

This patch changes the SELinux security server to return the complete
allowed access vector at once, and then to reset the cache after the
initial policy load to flush the initial cache state created during
bootstrapping.

Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@redhat.com>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-05-17 07:59:20 -07:00
..
include [PATCH] SELinux: add finer grained permissions to Netlink audit processing 2005-05-01 08:58:40 -07:00
ss [PATCH] selinux: fix avc_alloc_node() oom with no policy loaded 2005-05-17 07:59:20 -07:00
Kconfig Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
Makefile Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
avc.c [PATCH] SELinux: fix deadlock on dcache lock 2005-04-18 10:47:35 -07:00
hooks.c [PATCH] SELinux: cleanup ipc_has_perm 2005-05-01 08:58:39 -07:00
netif.c Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
netlink.c Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00
nlmsgtab.c [PATCH] SELinux: add finer grained permissions to Netlink audit processing 2005-05-01 08:58:40 -07:00
selinuxfs.c Linux-2.6.12-rc2 2005-04-16 15:20:36 -07:00