diff options
author | 2020-09-09 20:05:58 +0900 | |
---|---|---|
committer | 2020-09-09 20:05:58 +0900 | |
commit | 5384d92e4e02661d2b08e9e20c7b2cd3b0b82db6 (patch) | |
tree | 400f0328ef79bf6647b195d117fa20f82fbb4c0d /tools/perf/scripts/python/export-to-postgresql.py | |
parent | Linux 5.9-rc4 (diff) | |
download | wireguard-linux-5384d92e4e02661d2b08e9e20c7b2cd3b0b82db6.tar.xz wireguard-linux-5384d92e4e02661d2b08e9e20c7b2cd3b0b82db6.zip |
tomoyo: Loosen pathname/domainname validation.
Since commit e2dc9bf3f5275ca3 ("umd: Transform fork_usermode_blob into
fork_usermode_driver") started calling execve() on a program written in
a local mount which is not connected to mount tree,
tomoyo_realpath_from_path() started returning a pathname in
"$fsname:/$pathname" format which violates TOMOYO's domainname rule that
it must start with "<$namespace>" followed by zero or more repetitions of
pathnames which start with '/'.
Since $fsname must not contain '.' since commit 79c0b2df79eb56fc ("add
filesystem subtype support"), tomoyo_correct_path() can recognize a token
which appears '/' before '.' appears (e.g. proc:/self/exe ) as a pathname
while rejecting a token which appears '.' before '/' appears (e.g.
exec.realpath="/bin/bash" ) as a condition parameter.
Therefore, accept domainnames which contain pathnames which do not start
with '/' but contain '/' before '.' (e.g. <kernel> tmpfs:/bpfilter_umh ).
Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions