RE: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: Selinux [mailto:selinux-bounces@xxxxxxxxxxxxx] On Behalf Of Roberts,
> William C
> Sent: Monday, November 14, 2016 10:44 AM
> To: Stephen Smalley <sds@xxxxxxxxxxxxx>; selinux@xxxxxxxxxxxxx
> Subject: RE: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
> 
> 
> 
> > -----Original Message-----
> > From: Selinux [mailto:selinux-bounces@xxxxxxxxxxxxx] On Behalf Of
> > Stephen Smalley
> > Sent: Monday, November 14, 2016 9:48 AM
> > To: selinux@xxxxxxxxxxxxx
> > Cc: Stephen Smalley <sds@xxxxxxxxxxxxx>
> > Subject: [PATCH v2] libsepol: fix checkpolicy dontaudit compiler bug
> >
> > The combining logic for dontaudit rules was wrong, causing a dontaudit
> > A B:C *; rule to be clobbered by a dontaudit A B:C p; rule.
> >
> > Reported-by: Nick Kralevich <nnk@xxxxxxxxxx>
> > Signed-off-by: Stephen Smalley <sds@xxxxxxxxxxxxx>
> > ---
> >  libsepol/src/expand.c | 16 ++++++++++++----
> >  1 file changed, 12 insertions(+), 4 deletions(-)
> >
> > diff --git a/libsepol/src/expand.c b/libsepol/src/expand.c index
> > 004a029..d7adbf8
> > 100644
> > --- a/libsepol/src/expand.c
> > +++ b/libsepol/src/expand.c
> > @@ -1604,7 +1604,8 @@ static int expand_range_trans(expand_state_t *
> > state, static avtab_ptr_t find_avtab_node(sepol_handle_t * handle,
> >  				   avtab_t * avtab, avtab_key_t * key,
> >  				   cond_av_list_t ** cond,
> > -				   av_extended_perms_t *xperms)
> > +				   av_extended_perms_t *xperms,
> > +				   char *alloced)
> >  {
> >  	avtab_ptr_t node;
> >  	avtab_datum_t avdatum;
> > @@ -1658,6 +1659,11 @@ static avtab_ptr_t
> > find_avtab_node(sepol_handle_t * handle,
> >  			nl->next = *cond;
> >  			*cond = nl;
> >  		}
> > +		if (alloced)
> > +			*alloced = 1;
> > +	} else {
> > +		if (alloced)
> > +			*alloced = 0;
> >  	}
> >
> >  	return node;
> > @@ -1750,7 +1756,7 @@ static int expand_terule_helper(sepol_handle_t *
> > handle,
> >  			return EXPAND_RULE_CONFLICT;
> >  		}
> >
> > -		node = find_avtab_node(handle, avtab, &avkey, cond, NULL);
> > +		node = find_avtab_node(handle, avtab, &avkey, cond, NULL,
> > NULL);
> >  		if (!node)
> >  			return -1;
> >  		if (enabled) {
> > @@ -1790,6 +1796,7 @@ static int expand_avrule_helper(sepol_handle_t *
> > handle,
> >  	class_perm_node_t *cur;
> >  	uint32_t spec = 0;
> >  	unsigned int i;
> > +	char alloced;
> >
> >  	if (specified & AVRULE_ALLOWED) {
> >  		spec = AVTAB_ALLOWED;
> > @@ -1824,7 +1831,8 @@ static int expand_avrule_helper(sepol_handle_t *
> > handle,
> >  		avkey.target_class = cur->tclass;
> >  		avkey.specified = spec;
> >
> > -		node = find_avtab_node(handle, avtab, &avkey, cond,
> > extended_perms);
> > +		node = find_avtab_node(handle, avtab, &avkey, cond,
> > +				       extended_perms, &alloced);
> >  		if (!node)
> >  			return EXPAND_RULE_ERROR;
> >  		if (enabled) {
> > @@ -1850,7 +1858,7 @@ static int expand_avrule_helper(sepol_handle_t *
> > handle,
> >  			 */
> >  			avdatump->data &= cur->data;
> >  		} else if (specified & AVRULE_DONTAUDIT) {
> > -			if (avdatump->data)
> > +			if (!alloced)
> >  				avdatump->data &= ~cur->data;
> >  			else
> >  				avdatump->data = ~cur->data;
> 
> This seems awkward to me. If the insertion created a new empty node why
> wouldn't !avdump->data be true (note the addition of the not operator)?

I misstated that a bit, but the !avdump->data was the else case. I am really
saying why didn't this work before? In my mind, we don't care if its allocated
we care if it's set or not.

> 
> Or perhaps a mechanism to actual set the data on allocation, this way the logic is
> Just &=.
> 
> > --
> > 2.7.4
> >
> > _______________________________________________
> > Selinux mailing list
> > Selinux@xxxxxxxxxxxxx
> > To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> > To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.
> 
> _______________________________________________
> Selinux mailing list
> Selinux@xxxxxxxxxxxxx
> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux