On Tue, Nov 15, 2016 at 3:21 PM, William Roberts <bill.c.roberts@xxxxxxxxx> wrote: > On Tue, Nov 15, 2016 at 1:53 PM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote: >> On 11/15/2016 04:42 PM, william.c.roberts@xxxxxxxxx wrote: >>> From: William Roberts <william.c.roberts@xxxxxxxxx> >>> >>> The combining logic for dontaudit rules was wrong, causing >>> a dontaudit A B:C *; rule to be clobbered by a dontaudit A B:C p; >>> rule. >>> >>> This is a reimplementation of: >>> >>> /commit 6201bb5e258e2b5bcc04d502d6fbc05c69d21d71 ("libsepol: >>> fix checkpolicy dontaudit compiler bug") >> >> extraneous / and whitespace >> >>> >>> that avoids the cumbersome pointer assignments on alloced. >>> >>> Reported-by: Nick Kralevich <nnk@xxxxxxxxxx> >>> Signed-off-by: William Roberts <william.c.roberts@xxxxxxxxx> >>> --- >>> libsepol/src/expand.c | 18 +++++++++++------- >>> 1 file changed, 11 insertions(+), 7 deletions(-) >>> >>> diff --git a/libsepol/src/expand.c b/libsepol/src/expand.c >>> index 004a029..78905d9 100644 >>> --- a/libsepol/src/expand.c >>> +++ b/libsepol/src/expand.c >>> @@ -1604,7 +1604,8 @@ static int expand_range_trans(expand_state_t * state, >>> static avtab_ptr_t find_avtab_node(sepol_handle_t * handle, >>> avtab_t * avtab, avtab_key_t * key, >>> cond_av_list_t ** cond, >>> - av_extended_perms_t *xperms) >>> + av_extended_perms_t *xperms, >>> + uint32_t spec) >> >> Sorry, it occurred to me belatedly that you already have the spec value >> via key->specified (it is the avtab value, so it is the right one). No >> need for an additional argument. > > That's ideal, I saw its usage for XPERMS, but it's unclear why spec, > key->specified and > specified all exist within those call paths, seems clunky to me. > > It's likely not normalized so will need to bitwise and out the > DONTAUDIT and AUDITDENY > masks for the initialization value branch. So its assigned to the normalized spec around line 1831: avkey.specified = spec; This means, couldn't the if/else nightmare below go to a switch, so then the |= and &= just share a case? Also the spec intermediary could go away with a little massaging. Why does this need to be normalized, is their a case were the passed in specified has more than one bit set? > >> >>> { >>> avtab_ptr_t node; >>> avtab_datum_t avdatum; >>> @@ -1640,6 +1641,11 @@ static avtab_ptr_t find_avtab_node(sepol_handle_t * handle, >>> >>> if (!node) { >>> memset(&avdatum, 0, sizeof avdatum); >>> + /* >>> + * AUDITDENY, aka DONTAUDIT, is &= assigned, versus != for others. >>> + * Initialize data accordingly. >>> + */ >>> + avdatum.data = (spec == AVRULE_AUDITDENY) ? ~0 : 0; >>> /* this is used to get the node - insertion is actually unique */ >>> node = avtab_insert_nonunique(avtab, key, &avdatum); >>> if (!node) { >>> @@ -1750,7 +1756,7 @@ static int expand_terule_helper(sepol_handle_t * handle, >>> return EXPAND_RULE_CONFLICT; >>> } >>> >>> - node = find_avtab_node(handle, avtab, &avkey, cond, NULL); >>> + node = find_avtab_node(handle, avtab, &avkey, cond, NULL, 0); >>> if (!node) >>> return -1; >>> if (enabled) { >>> @@ -1824,7 +1830,8 @@ static int expand_avrule_helper(sepol_handle_t * handle, >>> avkey.target_class = cur->tclass; >>> avkey.specified = spec; >>> >>> - node = find_avtab_node(handle, avtab, &avkey, cond, extended_perms); >>> + node = find_avtab_node(handle, avtab, &avkey, cond, >>> + extended_perms, spec); >>> if (!node) >>> return EXPAND_RULE_ERROR; >>> if (enabled) { >>> @@ -1850,10 +1857,7 @@ static int expand_avrule_helper(sepol_handle_t * handle, >>> */ >>> avdatump->data &= cur->data; >>> } else if (specified & AVRULE_DONTAUDIT) { >>> - if (avdatump->data) >>> - avdatump->data &= ~cur->data; >>> - else >>> - avdatump->data = ~cur->data; >>> + avdatump->data &= ~cur->data; >>> } else if (specified & AVRULE_XPERMS) { >>> xperms = avdatump->xperms; >>> if (!xperms) { >>> >> >> _______________________________________________ >> Selinux mailing list >> Selinux@xxxxxxxxxxxxx >> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. >> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx. > > > > -- > Respectfully, > > William C Roberts -- Respectfully, William C Roberts _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.