[PATCH 2/3] UBUNTU: [Upstream] AppArmor: Fix locking from removal of profile namespace
John Johansen
john.johansen at canonical.com
Wed Sep 15 17:16:05 UTC 2010
BugLink: http://bugs.launchpad.net/bugs/615947
upstream commit: 74b1f2cea78bcb3dc084148cbcdff63de8fafd6e
The locking for profile namespace removal is wrong, when removing a
profile namespace, it needs to be removed from its parent's list.
Lock the parent of namespace list instead of the namespace being removed.
Signed-off-by: John Johansen <john.johansen at canonical.com>
Signed-off-by: James Morris <jmorris at namei.org>
---
security/apparmor/policy.c | 6 ++++--
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/security/apparmor/policy.c b/security/apparmor/policy.c
index e3020ed..3b5da44 100644
--- a/security/apparmor/policy.c
+++ b/security/apparmor/policy.c
@@ -1152,12 +1152,14 @@ ssize_t aa_remove_profiles(char *fqname, size_t size)
/* released below */
ns = aa_get_namespace(root);
- write_lock(&ns->lock);
if (!name) {
/* remove namespace - can only happen if fqname[0] == ':' */
+ write_lock(&ns->parent->lock);
__remove_namespace(ns);
+ write_unlock(&ns->parent->lock);
} else {
/* remove profile */
+ write_lock(&ns->lock);
profile = aa_get_profile(__lookup_profile(&ns->base, name));
if (!profile) {
error = -ENOENT;
@@ -1166,8 +1168,8 @@ ssize_t aa_remove_profiles(char *fqname, size_t size)
}
name = profile->base.hname;
__remove_profile(profile);
+ write_unlock(&ns->lock);
}
- write_unlock(&ns->lock);
/* don't fail removal if audit fails */
(void) audit_policy(OP_PROF_RM, GFP_KERNEL, name, info, error);
--
1.7.1
More information about the kernel-team
mailing list