Commit 60144b23 authored by Linus Torvalds's avatar Linus Torvalds

Merge tag 'selinux-pr-20210409' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux

Pull selinux fixes from Paul Moore:
 "Three SELinux fixes.

  These fix known problems relating to (re)loading SELinux policy or
  changing the policy booleans, and pass our test suite without problem"

* tag 'selinux-pr-20210409' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux:
  selinux: fix race between old and new sidtab
  selinux: fix cond_list corruption when changing booleans
  selinux: make nslot handling in avtab more robust
parents 189fefc7 9ad6e9cb
...@@ -109,7 +109,7 @@ static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_dat ...@@ -109,7 +109,7 @@ static int avtab_insert(struct avtab *h, struct avtab_key *key, struct avtab_dat
struct avtab_node *prev, *cur, *newnode; struct avtab_node *prev, *cur, *newnode;
u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD); u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD);
if (!h) if (!h || !h->nslot)
return -EINVAL; return -EINVAL;
hvalue = avtab_hash(key, h->mask); hvalue = avtab_hash(key, h->mask);
...@@ -154,7 +154,7 @@ avtab_insert_nonunique(struct avtab *h, struct avtab_key *key, struct avtab_datu ...@@ -154,7 +154,7 @@ avtab_insert_nonunique(struct avtab *h, struct avtab_key *key, struct avtab_datu
struct avtab_node *prev, *cur; struct avtab_node *prev, *cur;
u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD); u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD);
if (!h) if (!h || !h->nslot)
return NULL; return NULL;
hvalue = avtab_hash(key, h->mask); hvalue = avtab_hash(key, h->mask);
for (prev = NULL, cur = h->htable[hvalue]; for (prev = NULL, cur = h->htable[hvalue];
...@@ -184,7 +184,7 @@ struct avtab_datum *avtab_search(struct avtab *h, struct avtab_key *key) ...@@ -184,7 +184,7 @@ struct avtab_datum *avtab_search(struct avtab *h, struct avtab_key *key)
struct avtab_node *cur; struct avtab_node *cur;
u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD); u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD);
if (!h) if (!h || !h->nslot)
return NULL; return NULL;
hvalue = avtab_hash(key, h->mask); hvalue = avtab_hash(key, h->mask);
...@@ -220,7 +220,7 @@ avtab_search_node(struct avtab *h, struct avtab_key *key) ...@@ -220,7 +220,7 @@ avtab_search_node(struct avtab *h, struct avtab_key *key)
struct avtab_node *cur; struct avtab_node *cur;
u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD); u16 specified = key->specified & ~(AVTAB_ENABLED|AVTAB_ENABLED_OLD);
if (!h) if (!h || !h->nslot)
return NULL; return NULL;
hvalue = avtab_hash(key, h->mask); hvalue = avtab_hash(key, h->mask);
...@@ -295,6 +295,7 @@ void avtab_destroy(struct avtab *h) ...@@ -295,6 +295,7 @@ void avtab_destroy(struct avtab *h)
} }
kvfree(h->htable); kvfree(h->htable);
h->htable = NULL; h->htable = NULL;
h->nel = 0;
h->nslot = 0; h->nslot = 0;
h->mask = 0; h->mask = 0;
} }
...@@ -303,88 +304,52 @@ void avtab_init(struct avtab *h) ...@@ -303,88 +304,52 @@ void avtab_init(struct avtab *h)
{ {
h->htable = NULL; h->htable = NULL;
h->nel = 0; h->nel = 0;
h->nslot = 0;
h->mask = 0;
} }
int avtab_alloc(struct avtab *h, u32 nrules) static int avtab_alloc_common(struct avtab *h, u32 nslot)
{ {
u32 mask = 0; if (!nslot)
u32 shift = 0; return 0;
u32 work = nrules;
u32 nslot = 0;
if (nrules == 0)
goto avtab_alloc_out;
while (work) {
work = work >> 1;
shift++;
}
if (shift > 2)
shift = shift - 2;
nslot = 1 << shift;
if (nslot > MAX_AVTAB_HASH_BUCKETS)
nslot = MAX_AVTAB_HASH_BUCKETS;
mask = nslot - 1;
h->htable = kvcalloc(nslot, sizeof(void *), GFP_KERNEL); h->htable = kvcalloc(nslot, sizeof(void *), GFP_KERNEL);
if (!h->htable) if (!h->htable)
return -ENOMEM; return -ENOMEM;
avtab_alloc_out:
h->nel = 0;
h->nslot = nslot; h->nslot = nslot;
h->mask = mask; h->mask = nslot - 1;
pr_debug("SELinux: %d avtab hash slots, %d rules.\n",
h->nslot, nrules);
return 0; return 0;
} }
int avtab_duplicate(struct avtab *new, struct avtab *orig) int avtab_alloc(struct avtab *h, u32 nrules)
{ {
int i; int rc;
struct avtab_node *node, *tmp, *tail; u32 nslot = 0;
memset(new, 0, sizeof(*new));
new->htable = kvcalloc(orig->nslot, sizeof(void *), GFP_KERNEL); if (nrules != 0) {
if (!new->htable) u32 shift = 1;
return -ENOMEM; u32 work = nrules >> 3;
new->nslot = orig->nslot; while (work) {
new->mask = orig->mask; work >>= 1;
shift++;
for (i = 0; i < orig->nslot; i++) {
tail = NULL;
for (node = orig->htable[i]; node; node = node->next) {
tmp = kmem_cache_zalloc(avtab_node_cachep, GFP_KERNEL);
if (!tmp)
goto error;
tmp->key = node->key;
if (tmp->key.specified & AVTAB_XPERMS) {
tmp->datum.u.xperms =
kmem_cache_zalloc(avtab_xperms_cachep,
GFP_KERNEL);
if (!tmp->datum.u.xperms) {
kmem_cache_free(avtab_node_cachep, tmp);
goto error;
}
tmp->datum.u.xperms = node->datum.u.xperms;
} else
tmp->datum.u.data = node->datum.u.data;
if (tail)
tail->next = tmp;
else
new->htable[i] = tmp;
tail = tmp;
new->nel++;
} }
nslot = 1 << shift;
if (nslot > MAX_AVTAB_HASH_BUCKETS)
nslot = MAX_AVTAB_HASH_BUCKETS;
rc = avtab_alloc_common(h, nslot);
if (rc)
return rc;
} }
pr_debug("SELinux: %d avtab hash slots, %d rules.\n", nslot, nrules);
return 0; return 0;
error: }
avtab_destroy(new);
return -ENOMEM; int avtab_alloc_dup(struct avtab *new, const struct avtab *orig)
{
return avtab_alloc_common(new, orig->nslot);
} }
void avtab_hash_eval(struct avtab *h, char *tag) void avtab_hash_eval(struct avtab *h, char *tag)
......
...@@ -89,7 +89,7 @@ struct avtab { ...@@ -89,7 +89,7 @@ struct avtab {
void avtab_init(struct avtab *h); void avtab_init(struct avtab *h);
int avtab_alloc(struct avtab *, u32); int avtab_alloc(struct avtab *, u32);
int avtab_duplicate(struct avtab *new, struct avtab *orig); int avtab_alloc_dup(struct avtab *new, const struct avtab *orig);
struct avtab_datum *avtab_search(struct avtab *h, struct avtab_key *k); struct avtab_datum *avtab_search(struct avtab *h, struct avtab_key *k);
void avtab_destroy(struct avtab *h); void avtab_destroy(struct avtab *h);
void avtab_hash_eval(struct avtab *h, char *tag); void avtab_hash_eval(struct avtab *h, char *tag);
......
...@@ -605,7 +605,6 @@ static int cond_dup_av_list(struct cond_av_list *new, ...@@ -605,7 +605,6 @@ static int cond_dup_av_list(struct cond_av_list *new,
struct cond_av_list *orig, struct cond_av_list *orig,
struct avtab *avtab) struct avtab *avtab)
{ {
struct avtab_node *avnode;
u32 i; u32 i;
memset(new, 0, sizeof(*new)); memset(new, 0, sizeof(*new));
...@@ -615,10 +614,11 @@ static int cond_dup_av_list(struct cond_av_list *new, ...@@ -615,10 +614,11 @@ static int cond_dup_av_list(struct cond_av_list *new,
return -ENOMEM; return -ENOMEM;
for (i = 0; i < orig->len; i++) { for (i = 0; i < orig->len; i++) {
avnode = avtab_search_node(avtab, &orig->nodes[i]->key); new->nodes[i] = avtab_insert_nonunique(avtab,
if (WARN_ON(!avnode)) &orig->nodes[i]->key,
return -EINVAL; &orig->nodes[i]->datum);
new->nodes[i] = avnode; if (!new->nodes[i])
return -ENOMEM;
new->len++; new->len++;
} }
...@@ -630,7 +630,7 @@ static int duplicate_policydb_cond_list(struct policydb *newp, ...@@ -630,7 +630,7 @@ static int duplicate_policydb_cond_list(struct policydb *newp,
{ {
int rc, i, j; int rc, i, j;
rc = avtab_duplicate(&newp->te_cond_avtab, &origp->te_cond_avtab); rc = avtab_alloc_dup(&newp->te_cond_avtab, &origp->te_cond_avtab);
if (rc) if (rc)
return rc; return rc;
......
This diff is collapsed.
...@@ -39,6 +39,7 @@ int sidtab_init(struct sidtab *s) ...@@ -39,6 +39,7 @@ int sidtab_init(struct sidtab *s)
for (i = 0; i < SECINITSID_NUM; i++) for (i = 0; i < SECINITSID_NUM; i++)
s->isids[i].set = 0; s->isids[i].set = 0;
s->frozen = false;
s->count = 0; s->count = 0;
s->convert = NULL; s->convert = NULL;
hash_init(s->context_to_sid); hash_init(s->context_to_sid);
...@@ -281,6 +282,15 @@ int sidtab_context_to_sid(struct sidtab *s, struct context *context, ...@@ -281,6 +282,15 @@ int sidtab_context_to_sid(struct sidtab *s, struct context *context,
if (*sid) if (*sid)
goto out_unlock; goto out_unlock;
if (unlikely(s->frozen)) {
/*
* This sidtab is now frozen - tell the caller to abort and
* get the new one.
*/
rc = -ESTALE;
goto out_unlock;
}
count = s->count; count = s->count;
convert = s->convert; convert = s->convert;
...@@ -474,6 +484,17 @@ void sidtab_cancel_convert(struct sidtab *s) ...@@ -474,6 +484,17 @@ void sidtab_cancel_convert(struct sidtab *s)
spin_unlock_irqrestore(&s->lock, flags); spin_unlock_irqrestore(&s->lock, flags);
} }
void sidtab_freeze_begin(struct sidtab *s, unsigned long *flags) __acquires(&s->lock)
{
spin_lock_irqsave(&s->lock, *flags);
s->frozen = true;
s->convert = NULL;
}
void sidtab_freeze_end(struct sidtab *s, unsigned long *flags) __releases(&s->lock)
{
spin_unlock_irqrestore(&s->lock, *flags);
}
static void sidtab_destroy_entry(struct sidtab_entry *entry) static void sidtab_destroy_entry(struct sidtab_entry *entry)
{ {
context_destroy(&entry->context); context_destroy(&entry->context);
......
...@@ -86,6 +86,7 @@ struct sidtab { ...@@ -86,6 +86,7 @@ struct sidtab {
u32 count; u32 count;
/* access only under spinlock */ /* access only under spinlock */
struct sidtab_convert_params *convert; struct sidtab_convert_params *convert;
bool frozen;
spinlock_t lock; spinlock_t lock;
#if CONFIG_SECURITY_SELINUX_SID2STR_CACHE_SIZE > 0 #if CONFIG_SECURITY_SELINUX_SID2STR_CACHE_SIZE > 0
...@@ -125,6 +126,9 @@ int sidtab_convert(struct sidtab *s, struct sidtab_convert_params *params); ...@@ -125,6 +126,9 @@ int sidtab_convert(struct sidtab *s, struct sidtab_convert_params *params);
void sidtab_cancel_convert(struct sidtab *s); void sidtab_cancel_convert(struct sidtab *s);
void sidtab_freeze_begin(struct sidtab *s, unsigned long *flags) __acquires(&s->lock);
void sidtab_freeze_end(struct sidtab *s, unsigned long *flags) __releases(&s->lock);
int sidtab_context_to_sid(struct sidtab *s, struct context *context, u32 *sid); int sidtab_context_to_sid(struct sidtab *s, struct context *context, u32 *sid);
void sidtab_destroy(struct sidtab *s); void sidtab_destroy(struct sidtab *s);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment