Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/15/2016 03:11 PM, Stephen Smalley wrote:
> On 11/15/2016 02:40 PM, william.c.roberts@xxxxxxxxx wrote:
>> From: Stephen Smalley <sds@xxxxxxxxxxxxx>

Also, you don't have to keep me as the author as the patch is a rewrite
after a revert.

>>
>> The combining logic for dontaudit rules was wrong, causing
>> a dontaudit A B:C *; rule to be clobbered by a dontaudit A B:C p;
>> rule.
>>
>> This is a reimplimation of 6201bb5e2 that avoids the cumbersome
>> pointer assignments on alloced.

s/reimplimation/reimplementation/
s/6201bb532/commit 6201bb5e258e2b5bcc04d502d6fbc05c69d21d71 ("libsepol:
fix checkpolicy dontaudit compiler bug")/

>>
>> Reported-by: Nick Kralevich <nnk@xxxxxxxxxx>
>> Signed-off-by: William Roberts <william.c.roberts@xxxxxxxxx>
>> ---
>>  libsepol/src/expand.c | 21 ++++++++++++++-------
>>  1 file changed, 14 insertions(+), 7 deletions(-)
>>
>> diff --git a/libsepol/src/expand.c b/libsepol/src/expand.c
>> index 004a029..ef04908 100644
>> --- a/libsepol/src/expand.c
>> +++ b/libsepol/src/expand.c
>> @@ -1604,7 +1604,8 @@ static int expand_range_trans(expand_state_t * state,
>>  static avtab_ptr_t find_avtab_node(sepol_handle_t * handle,
>>  				   avtab_t * avtab, avtab_key_t * key,
>>  				   cond_av_list_t ** cond,
>> -				   av_extended_perms_t *xperms)
>> +				   av_extended_perms_t *xperms,
>> +				   uint32_t init_data)
>>  {
>>  	avtab_ptr_t node;
>>  	avtab_datum_t avdatum;
>> @@ -1640,6 +1641,7 @@ static avtab_ptr_t find_avtab_node(sepol_handle_t * handle,
>>  
>>  	if (!node) {
>>  		memset(&avdatum, 0, sizeof avdatum);
>> +		avdatum.data = init_data;
>>  		/* this is used to get the node - insertion is actually unique */
>>  		node = avtab_insert_nonunique(avtab, key, &avdatum);
>>  		if (!node) {
>> @@ -1750,7 +1752,7 @@ static int expand_terule_helper(sepol_handle_t * handle,
>>  			return EXPAND_RULE_CONFLICT;
>>  		}
>>  
>> -		node = find_avtab_node(handle, avtab, &avkey, cond, NULL);
>> +		node = find_avtab_node(handle, avtab, &avkey, cond, NULL, 0);
>>  		if (!node)
>>  			return -1;
>>  		if (enabled) {
>> @@ -1824,7 +1826,15 @@ static int expand_avrule_helper(sepol_handle_t * handle,
>>  		avkey.target_class = cur->tclass;
>>  		avkey.specified = spec;
>>  
>> -		node = find_avtab_node(handle, avtab, &avkey, cond, extended_perms);
>> +		node = find_avtab_node(handle, avtab, &avkey, cond,
>> +				       extended_perms,
>> +				       /*
>> +					* dontaudit rules need to be
>> +					* initialized on creation, others can
>> +					* be 0.
>> +					*/
>> +				       specified & AVRULE_DONTAUDIT
>> +					    ? ~cur->data : 0);
> 
> There seems to be a lack of symmetry here.  Either we should initialize
> them all to the proper value (including AUDITDENY, which I think might
> be broken too, although no one uses it anymore since the transition to
> DONTAUDIT), or we should initialize the ones that are ORed to 0 and the
> ones that are ANDed to ~0 and then let the subsequent OR'ing or AND'ing
> adjust appropriately.
> 
>>  		if (!node)
>>  			return EXPAND_RULE_ERROR;
>>  		if (enabled) {
>> @@ -1850,10 +1860,7 @@ static int expand_avrule_helper(sepol_handle_t * handle,
>>  			 */
>>  			avdatump->data &= cur->data;
>>  		} else if (specified & AVRULE_DONTAUDIT) {
>> -			if (avdatump->data)
>> -				avdatump->data &= ~cur->data;
>> -			else
>> -				avdatump->data = ~cur->data;
>> +			avdatump->data &= ~cur->data;
>>  		} else if (specified & AVRULE_XPERMS) {
>>  			xperms = avdatump->xperms;
>>  			if (!xperms) {
>>
> 

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux