selinux: reject setexeccon() on MNT_NOSUID applications with -EACCES
authorPaul Moore <pmoore@redhat.com>
Thu, 15 May 2014 15:16:06 +0000 (11:16 -0400)
committerPaul Moore <pmoore@redhat.com>
Thu, 15 May 2014 15:16:06 +0000 (11:16 -0400)
commit4f189988a0a5890db597ec48fc0e8b09922f290a
treeb3160fdb38bc7ab16a603ed69d737be2b1b7d5d2
parent626b9740fa73cad043e136bfb3b6fca68a4f8a7c
selinux: reject setexeccon() on MNT_NOSUID applications with -EACCES

We presently prevent processes from using setexecon() to set the
security label of exec()'d processes when NO_NEW_PRIVS is enabled by
returning an error; however, we silently ignore setexeccon() when
exec()'ing from a nosuid mounted filesystem.  This patch makes things
a bit more consistent by returning an error in the setexeccon()/nosuid
case.

Signed-off-by: Paul Moore <pmoore@redhat.com>
Acked-by: Andy Lutomirski <luto@amacapital.net>
Acked-by: Stephen Smalley <sds@tycho.nsa.gov>
security/selinux/hooks.c