Re: [PATCH 2/2] libsepol: fix checkpolicy dontaudit compiler bug

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Nov 15, 2016 12:12, "Stephen Smalley" <sds@xxxxxxxxxxxxx> wrote:
>
> On 11/15/2016 03:11 PM, Stephen Smalley wrote:
> > On 11/15/2016 02:40 PM, william.c.roberts@xxxxxxxxx wrote:
> >> From: Stephen Smalley <sds@xxxxxxxxxxxxx>
>
> Also, you don't have to keep me as the author as the patch is a rewrite
> after a revert.

I didn't realize -C kept the author on git commit.

>
> >>
> >> The combining logic for dontaudit rules was wrong, causing
> >> a dontaudit A B:C *; rule to be clobbered by a dontaudit A B:C p;
> >> rule.
> >>
> >> This is a reimplimation of 6201bb5e2 that avoids the cumbersome
> >> pointer assignments on alloced.
>
> s/reimplimation/reimplementation/
> s/6201bb532/commit 6201bb5e258e2b5bcc04d502d6fbc05c69d21d71 ("libsepol:
> fix checkpolicy dontaudit compiler bug")/
>
> >>
> >> Reported-by: Nick Kralevich <nnk@xxxxxxxxxx>
> >> Signed-off-by: William Roberts <william.c.roberts@xxxxxxxxx>
> >> ---
> >>  libsepol/src/expand.c | 21 ++++++++++++++-------
> >>  1 file changed, 14 insertions(+), 7 deletions(-)
> >>
> >> diff --git a/libsepol/src/expand.c b/libsepol/src/expand.c
> >> index 004a029..ef04908 100644
> >> --- a/libsepol/src/expand.c
> >> +++ b/libsepol/src/expand.c
> >> @@ -1604,7 +1604,8 @@ static int expand_range_trans(expand_state_t * state,
> >>  static avtab_ptr_t find_avtab_node(sepol_handle_t * handle,
> >>                                 avtab_t * avtab, avtab_key_t * key,
> >>                                 cond_av_list_t ** cond,
> >> -                               av_extended_perms_t *xperms)
> >> +                               av_extended_perms_t *xperms,
> >> +                               uint32_t init_data)
> >>  {
> >>      avtab_ptr_t node;
> >>      avtab_datum_t avdatum;
> >> @@ -1640,6 +1641,7 @@ static avtab_ptr_t find_avtab_node(sepol_handle_t * handle,
> >>
> >>      if (!node) {
> >>              memset(&avdatum, 0, sizeof avdatum);
> >> +            avdatum.data = ""> > >>              /* this is used to get the node - insertion is actually unique */
> >>              node = avtab_insert_nonunique(avtab, key, &avdatum);
> >>              if (!node) {
> >> @@ -1750,7 +1752,7 @@ static int expand_terule_helper(sepol_handle_t * handle,
> >>                      return EXPAND_RULE_CONFLICT;
> >>              }
> >>
> >> -            node = find_avtab_node(handle, avtab, &avkey, cond, NULL);
> >> +            node = find_avtab_node(handle, avtab, &avkey, cond, NULL, 0);
> >>              if (!node)
> >>                      return -1;
> >>              if (enabled) {
> >> @@ -1824,7 +1826,15 @@ static int expand_avrule_helper(sepol_handle_t * handle,
> >>              avkey.target_class = cur->tclass;
> >>              avkey.specified = spec;
> >>
> >> -            node = find_avtab_node(handle, avtab, &avkey, cond, extended_perms);
> >> +            node = find_avtab_node(handle, avtab, &avkey, cond,
> >> +                                   extended_perms,
> >> +                                   /*
> >> +                                    * dontaudit rules need to be
> >> +                                    * initialized on creation, others can
> >> +                                    * be 0.
> >> +                                    */
> >> +                                   specified & AVRULE_DONTAUDIT
> >> +                                        ? ~cur->data : 0);
> >
> > There seems to be a lack of symmetry here.  Either we should initialize
> > them all to the proper value (including AUDITDENY, which I think might
> > be broken too, although no one uses it anymore since the transition to
> > DONTAUDIT), or we should initialize the ones that are ORed to 0 and the
> > ones that are ANDed to ~0 and then let the subsequent OR'ing or AND'ing
> > adjust appropriately.
> >
> >>              if (!node)
> >>                      return EXPAND_RULE_ERROR;
> >>              if (enabled) {
> >> @@ -1850,10 +1860,7 @@ static int expand_avrule_helper(sepol_handle_t * handle,
> >>                       */
> >>                      avdatump->data &= cur->data;
> >>              } else if (specified & AVRULE_DONTAUDIT) {
> >> -                    if (avdatump->data)
> >> -                            avdatump->data &= ~cur->data;
> >> -                    else
> >> -                            avdatump->data = ""> > >> +                    avdatump->data &= ~cur->data;
> >>              } else if (specified & AVRULE_XPERMS) {
> >>                      xperms = avdatump->xperms;
> >>                      if (!xperms) {
> >>
> >
>
> _______________________________________________
> Selinux mailing list
> Selinux@xxxxxxxxxxxxx
> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux