In Noble Ubuntu-6.8.0-64.67, the function selinux_dentry_init_security()
looks like this:
static int selinux_dentry_init_security(struct dentry *dentry, int mode,
const struct qstr *name,
const char **xattr_name,
struct lsmcontext *cp)
{
u32 newsid;
int rc;
rc = selinux_determine_inode_label(selinux_cred(current_cred()),
d_inode(dentry->d_parent), name,
inode_mode_to_security_class(mode),
&newsid);
if (rc)
return rc;
if (xattr_name)
*xattr_name = XATTR_NAME_SELINUX;
cp->id = LSM_ID_SELINUX;
return security_sid_to_context(newsid, (char **)cp->context,
&cp->len);
}
From your last comment I see that using the following patch completely
solves the problem:
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 35e763fa6aa5..98eacf8ce4a3 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -2909,8 +2909,7 @@ static int selinux_dentry_init_security(struct dentry
*dentry, int mode,
*xattr_name = XATTR_NAME_SELINUX;
cp->id = LSM_ID_SELINUX;
- return security_sid_to_context(newsid, (char **)cp->context,
- &cp->len);
+ return security_sid_to_context(newsid, &cp->context, &cp->len);
}
static int selinux_dentry_create_files_as(struct dentry *dentry, int mode,
Am I right?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2115447
Title:
Ubuntu 24.04.2: NULL pointer dereference with Ceph and selinux
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2115447/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs