selinux: use default proc sid on symlinks
authorStephen Smalley <sds@tycho.nsa.gov>
Mon, 22 Sep 2008 19:41:19 +0000 (15:41 -0400)
committerGreg Kroah-Hartman <gregkh@suse.de>
Thu, 26 Aug 2010 23:40:12 +0000 (16:40 -0700)
commit5a91177ccf6e429ec66b4f977fc92c105bd909a7
tree80f9b78bcb2a54e79900153b2b91ece3cff4600c
parent5981f194641d4bcbff7e80adf393035b113f5022
selinux: use default proc sid on symlinks

commit ea6b184f7d521a503ecab71feca6e4057562252b upstream.

As we are not concerned with fine-grained control over reading of
symlinks in proc, always use the default proc SID for all proc symlinks.
This should help avoid permission issues upon changes to the proc tree
as in the /proc/net -> /proc/self/net example.
This does not alter labeling of symlinks within /proc/pid directories.
ls -Zd /proc/net output before and after the patch should show the difference.

Signed-off-by: Stephen D. Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
Cc: Florian Mickler <florian@mickler.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
security/selinux/hooks.c