On Tue, Nov 27, 2018 at 8:45 PM Ondrej Mosnacek <omosnace@xxxxxxxxxx> wrote: > On Tue, Nov 27, 2018 at 5:58 PM Stephen Smalley <sds@xxxxxxxxxxxxx> wrote: > > On 11/27/18 5:36 AM, Ondrej Mosnacek wrote: > > > This patch is kept separate only for review. Eventually it will be > > > folded into the previous patch. > > > > This one triggers a lot of warnings (security_compute_av: unrecognized > > SID 0, security_sid_to_context_core: unrecognized SID 0) and some > > failures during selinux-testsuite inet_socket tests. While the policy > > doesn't provide an entry for SECSID_NULL, the sidtab search logic was > > remapping it to the unlabeled context and that was apparently being > > relied upon by the labeled networking code IIUC. > > You're right, I made a mistake in the sidtab_search_core() function - > it shouldn't just return NULL when sid == 0, but instead skip to the > default-to-unlabeled fallback. This will be easy to fix. > > Thanks for testing! > > I wonder why I didn't get any inet_socket failures when running the > testsuite myself... I will have to look at it closer tomorrow. Hmm... I must have been accidentally testing a wrong kernel build. I am now able to reproduce both the failures and the hang. I am now building a new kernel with this and the convert_context issues fixed. > > > > > > > > > > > Signed-off-by: Ondrej Mosnacek <omosnace@xxxxxxxxxx> > > > --- > > > security/selinux/ss/policydb.c | 2 +- > > > security/selinux/ss/sidtab.c | 25 ++++++++++++++++--------- > > > security/selinux/ss/sidtab.h | 3 ++- > > > 3 files changed, 19 insertions(+), 11 deletions(-) > > > > > > diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c > > > index 59359fa0bd74..a50d625e7946 100644 > > > --- a/security/selinux/ss/policydb.c > > > +++ b/security/selinux/ss/policydb.c > > > @@ -912,7 +912,7 @@ int policydb_load_isids(struct policydb *p, struct sidtab *s) > > > sidtab_destroy(s); > > > goto out; > > > } > > > - if (c->sid[0] > SECINITSID_NUM) { > > > + if (c->sid[0] == SECSID_NULL || c->sid[0] > SECINITSID_NUM) { > > > pr_err("SELinux: Initial SID %s out of range.\n", > > > c->u.name); > > > sidtab_destroy(s); > > > diff --git a/security/selinux/ss/sidtab.c b/security/selinux/ss/sidtab.c > > > index fd8115b211a6..e157d8240cf1 100644 > > > --- a/security/selinux/ss/sidtab.c > > > +++ b/security/selinux/ss/sidtab.c > > > @@ -23,7 +23,7 @@ int sidtab_init(struct sidtab *s) > > > if (!s->htable) > > > return -ENOMEM; > > > > > > - for (i = 0; i <= SECINITSID_NUM; i++) > > > + for (i = 0; i < SECINITSID_NUM; i++) > > > s->isids[i].set = 0; > > > > > > for (i = 0; i < SIDTAB_SIZE; i++) > > > @@ -86,8 +86,15 @@ static int sidtab_insert(struct sidtab *s, u32 sid, struct context *context) > > > > > > int sidtab_set_initial(struct sidtab *s, u32 sid, struct context *context) > > > { > > > - struct sidtab_isid_entry *entry = &s->isids[sid]; > > > - int rc = context_cpy(&entry->context, context); > > > + struct sidtab_isid_entry *entry; > > > + int rc; > > > + > > > + if (sid == 0 || sid > SECINITSID_NUM) > > > + return -EINVAL; > > > + > > > + entry = &s->isids[sid - 1]; > > > + > > > + rc = context_cpy(&entry->context, context); > > > if (rc) > > > return rc; > > > > > > @@ -116,19 +123,19 @@ static struct context *sidtab_search_core(struct sidtab *s, u32 sid, int force) > > > struct context *context; > > > struct sidtab_isid_entry *entry; > > > > > > - if (!s) > > > + if (!s || sid == 0) > > > return NULL; > > > > > > if (sid > SECINITSID_NUM) { > > > context = sidtab_lookup(s, sid - (SECINITSID_NUM + 1)); > > > } else { > > > - entry = &s->isids[sid]; > > > + entry = &s->isids[sid - 1]; > > > context = entry->set ? &entry->context : NULL; > > > } > > > if (context && (!context->len || force)) > > > return context; > > > > > > - entry = &s->isids[SECINITSID_UNLABELED]; > > > + entry = &s->isids[SECINITSID_UNLABELED - 1]; > > > return entry->set ? &entry->context : NULL; > > > } > > > > > > @@ -283,11 +290,11 @@ int sidtab_context_to_sid(struct sidtab *s, struct context *context, u32 *sid) > > > int rc; > > > u32 i; > > > > > > - for (i = 0; i <= SECINITSID_NUM; i++) { > > > + for (i = 0; i < SECINITSID_NUM; i++) { > > > struct sidtab_isid_entry *entry = &s->isids[i]; > > > > > > if (entry->set && context_cmp(context, &entry->context)) { > > > - *sid = i; > > > + *sid = i + 1; > > > return 0; > > > } > > > } > > > @@ -334,7 +341,7 @@ void sidtab_destroy(struct sidtab *s) > > > if (!s) > > > return; > > > > > > - for (i = 0; i <= SECINITSID_NUM; i++) > > > + for (i = 0; i < SECINITSID_NUM; i++) > > > if (s->isids[i].set) > > > context_destroy(&s->isids[i].context); > > > > > > diff --git a/security/selinux/ss/sidtab.h b/security/selinux/ss/sidtab.h > > > index dc0a80bc8894..e657ae6bf996 100644 > > > --- a/security/selinux/ss/sidtab.h > > > +++ b/security/selinux/ss/sidtab.h > > > @@ -36,7 +36,8 @@ struct sidtab { > > > struct sidtab_node *cache[SIDTAB_CACHE_LEN]; > > > spinlock_t lock; > > > > > > - struct sidtab_isid_entry isids[SECINITSID_NUM + 1]; > > > + /* index == SID - 1 (no entry for SECSID_NULL) */ > > > + struct sidtab_isid_entry isids[SECINITSID_NUM]; > > > }; > > > > > > int sidtab_init(struct sidtab *s); > > > > > > > -- > Ondrej Mosnacek <omosnace at redhat dot com> > Associate Software Engineer, Security Technologies > Red Hat, Inc. -- Ondrej Mosnacek <omosnace at redhat dot com> Associate Software Engineer, Security Technologies Red Hat, Inc.