forked from luck/tmp_suning_uos_patched
selinux: propagate error codes in cond_read_list()
These are passed back when the security module gets loaded. The original code always returned -1 (-EPERM) on error but after this patch it can return -EINVAL, or -ENOMEM or propagate the error code from cond_read_node(). cond_read_node() still returns -1 all the time, but I fix that in a later patch. Signed-off-by: Dan Carpenter <error27@gmail.com> Acked-by: Stephen D. Smalley <sds@tycho.nsa.gov> Signed-off-by: James Morris <jmorris@namei.org>
This commit is contained in:
parent
9e0bd4cba4
commit
5241c1074f
@ -445,8 +445,8 @@ int cond_read_list(struct policydb *p, void *fp)
|
||||
int rc;
|
||||
|
||||
rc = next_entry(buf, fp, sizeof buf);
|
||||
if (rc < 0)
|
||||
return -1;
|
||||
if (rc)
|
||||
return rc;
|
||||
|
||||
len = le32_to_cpu(buf[0]);
|
||||
|
||||
@ -455,11 +455,13 @@ int cond_read_list(struct policydb *p, void *fp)
|
||||
goto err;
|
||||
|
||||
for (i = 0; i < len; i++) {
|
||||
rc = -ENOMEM;
|
||||
node = kzalloc(sizeof(struct cond_node), GFP_KERNEL);
|
||||
if (!node)
|
||||
goto err;
|
||||
|
||||
if (cond_read_node(p, node, fp) != 0)
|
||||
rc = cond_read_node(p, node, fp);
|
||||
if (rc)
|
||||
goto err;
|
||||
|
||||
if (i == 0)
|
||||
@ -472,7 +474,7 @@ int cond_read_list(struct policydb *p, void *fp)
|
||||
err:
|
||||
cond_list_destroy(p->cond_list);
|
||||
p->cond_list = NULL;
|
||||
return -1;
|
||||
return rc;
|
||||
}
|
||||
|
||||
/* Determine whether additional permissions are granted by the conditional
|
||||
|
Loading…
Reference in New Issue
Block a user