[PATCH 4.4 011/193] selinux: skip bounded transition processing if the policy isnt loaded

2018-02-23 Thread Greg Kroah-Hartman
4.4-stable review patch.  If anyone has any objections, please let me know.

--

From: Paul Moore 

commit 4b14752ec4e0d87126e636384cf37c8dd9df157c upstream.

We can't do anything reasonable in security_bounded_transition() if we
don't have a policy loaded, and in fact we could run into problems
with some of the code inside expecting a policy.  Fix these problems
like we do many others in security/selinux/ss/services.c by checking
to see if the policy is loaded (ss_initialized) and returning quickly
if it isn't.

Reported-by: syzbot 
Signed-off-by: Paul Moore 
Acked-by: Stephen Smalley 
Reviewed-by: James Morris 
Signed-off-by: Greg Kroah-Hartman 

---
 security/selinux/ss/services.c |3 +++
 1 file changed, 3 insertions(+)

--- a/security/selinux/ss/services.c
+++ b/security/selinux/ss/services.c
@@ -860,6 +860,9 @@ int security_bounded_transition(u32 old_
int index;
int rc;
 
+   if (!ss_initialized)
+   return 0;
+
read_lock(_rwlock);
 
rc = -EINVAL;




[PATCH 4.4 011/193] selinux: skip bounded transition processing if the policy isnt loaded

2018-02-23 Thread Greg Kroah-Hartman
4.4-stable review patch.  If anyone has any objections, please let me know.

--

From: Paul Moore 

commit 4b14752ec4e0d87126e636384cf37c8dd9df157c upstream.

We can't do anything reasonable in security_bounded_transition() if we
don't have a policy loaded, and in fact we could run into problems
with some of the code inside expecting a policy.  Fix these problems
like we do many others in security/selinux/ss/services.c by checking
to see if the policy is loaded (ss_initialized) and returning quickly
if it isn't.

Reported-by: syzbot 
Signed-off-by: Paul Moore 
Acked-by: Stephen Smalley 
Reviewed-by: James Morris 
Signed-off-by: Greg Kroah-Hartman 

---
 security/selinux/ss/services.c |3 +++
 1 file changed, 3 insertions(+)

--- a/security/selinux/ss/services.c
+++ b/security/selinux/ss/services.c
@@ -860,6 +860,9 @@ int security_bounded_transition(u32 old_
int index;
int rc;
 
+   if (!ss_initialized)
+   return 0;
+
read_lock(_rwlock);
 
rc = -EINVAL;