From patchwork Mon Nov 12 11:44:26 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ondrej Mosnacek X-Patchwork-Id: 10678521 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 27CA3139B for ; Mon, 12 Nov 2018 11:45:38 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 1554A29EAA for ; Mon, 12 Nov 2018 11:45:38 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 0965229EB0; Mon, 12 Nov 2018 11:45:38 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.2 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from USFB19PA11.eemsg.mail.mil (uphb19pa08.eemsg.mail.mil [214.24.26.82]) (using TLSv1.2 with cipher DHE-RSA-AES256-SHA256 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 1044729EAA for ; Mon, 12 Nov 2018 11:45:36 +0000 (UTC) X-EEMSG-check-008: 88692282|USFB19PA11_EEMSG_MP7.csd.disa.mil Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.3]) by USFB19PA11.eemsg.mail.mil with ESMTP/TLS/DHE-RSA-AES256-SHA256; 12 Nov 2018 11:45:34 +0000 X-IronPort-AV: E=Sophos;i="5.54,495,1534809600"; d="scan'208";a="20516335" IronPort-PHdr: 9a23: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 X-IPAS-Result: A2C9AACXZulb/wHyM5BiHAEBAQQBAQcEAQGBVAQBAQsBggADgWgnjG+LG4siiSmFC4FfEgEBGBMBh2oiNwoNAQMBAQEBAQECAWwogjYkAYJnAiQTFCALAwMJAkAICAMBLQMBBQELFwEHCwUYBIMAgXUNAwGdZzyMCTOFPoRaEodEhCoXgUA/gRGHXQESARKFaAKJEoY0kAkJhjiKWgsYgViHbjaGdCyXJQYCCQcPIYE4ImRxTSMVO4JsgiQajh1xgQUBAYpEDReCJwEB Received: from tarius.tycho.ncsc.mil ([144.51.242.1]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 12 Nov 2018 11:45:32 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id wACBinqs029045; Mon, 12 Nov 2018 06:44:58 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id wACBii7U018455 for ; Mon, 12 Nov 2018 06:44:44 -0500 Received: from goalie.tycho.ncsc.mil (goalie.tycho.ncsc.mil [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id wACBiftq029041 for ; Mon, 12 Nov 2018 06:44:44 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1AnAADIZulblywYGNZiHAEBAQQBAQcEAQGBVAQBAQsBggCBayeMb4sbiyKJKYZxCwEBhGyDKiI3Cg0BAwEBAQEBAQIUAQEBAQEGGAaGQFKBFQEFASIBEoMhgXUNAwGdaDyMCTOKGBKHRIQqF4FAP4ERiAOFaAKJEpY9CYY4iloLGIFYh242hnQslyUGAgkHDyGBOIF3TSMVgyeCJBEJjh1AMYtLgksBAQ X-IPAS-Result: A1AnAADIZulblywYGNZiHAEBAQQBAQcEAQGBVAQBAQsBggCBayeMb4sbiyKJKYZxCwEBhGyDKiI3Cg0BAwEBAQEBAQIUAQEBAQEGGAaGQFKBFQEFASIBEoMhgXUNAwGdaDyMCTOKGBKHRIQqF4FAP4ERiAOFaAKJEpY9CYY4iloLGIFYh242hnQslyUGAgkHDyGBOIF3TSMVgyeCJBEJjh1AMYtLgksBAQ X-IronPort-AV: E=Sophos;i="5.54,495,1534824000"; d="scan'208";a="411780" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.35]) by goalie.tycho.ncsc.mil with ESMTP; 12 Nov 2018 06:44:41 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AeAACXZulblywYGNZiHAEBAQQBAQcEAQGBVAQBAQsBggCBayeMb4sbiyKJKYZxCwEBhGyDKiI3Cg0BAwEBAQEBAQIBEwEBAQEBBhgGWII2JAGDDVKBFQEFASIBEoMhgXUNAwGdZzyMCTOKGBKHRIQqF4FAP4ERiAOFaAKJEpY9CYY4iloLGIFYh242hnQslyUGAgkHDyGBOIF3TSMVgyeCJBEJjh0/MotLgksBAQ X-IPAS-Result: A0AeAACXZulblywYGNZiHAEBAQQBAQcEAQGBVAQBAQsBggCBayeMb4sbiyKJKYZxCwEBhGyDKiI3Cg0BAwEBAQEBAQIBEwEBAQEBBhgGWII2JAGDDVKBFQEFASIBEoMhgXUNAwGdZzyMCTOKGBKHRIQqF4FAP4ERiAOFaAKJEpY9CYY4iloLGIFYh242hnQslyUGAgkHDyGBOIF3TSMVgyeCJBEJjh0/MotLgksBAQ X-IronPort-AV: E=Sophos;i="5.54,495,1534809600"; d="scan'208";a="20516328" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from ucol3cpa06.eemsg.mail.mil ([214.24.24.44]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 12 Nov 2018 11:44:40 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;49129b89-cd5c-437b-a2cc-c30f88fde9d0 Authentication-Results: UCOL3CPA05.eemsg.mail.mil; dkim=none (message not signed) header.i=none; spf=None smtp.pra=omosnace@redhat.com; spf=Pass smtp.mailfrom=omosnace@redhat.com; spf=None smtp.helo=postmaster@mail-wr1-f65.google.com; dmarc=pass (p=none dis=none) d=redhat.com X-EEMSG-check-008: 347573376|UCOL3CPA05_EEMSG_MP20.csd.disa.mil X-EEMSG-SBRS: 2.7 X-EEMSG-ORIG-IP: 209.85.221.65 X-EEMSG-check-002: true X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0B9AACXZulbf0HdVdFiHAEBAQQBAQcEAQGBVAQBAQsBhBKMb4sbiyKJKYZxCwEBE4RZgyoaBwEEMwoNAQMBAQEBAQEBAQETAQEJCwsIGwwxgjYkAYMNUoEVAQUBIgESgyGBdQ0EnWc8jAkzihgJAQiHRIQqF4FAP4ERiAOFaAKJEpY9CYY4iloLGIFYh242hnQslyUGAgkHDyGBOIF3TSMVgyeCJBqOHT4zi0uCSwEB X-IPAS-Result: A0B9AACXZulbf0HdVdFiHAEBAQQBAQcEAQGBVAQBAQsBhBKMb4sbiyKJKYZxCwEBE4RZgyoaBwEEMwoNAQMBAQEBAQEBAQETAQEJCwsIGwwxgjYkAYMNUoEVAQUBIgESgyGBdQ0EnWc8jAkzihgJAQiHRIQqF4FAP4ERiAOFaAKJEpY9CYY4iloLGIFYh242hnQslyUGAgkHDyGBOIF3TSMVgyeCJBqOHT4zi0uCSwEB Received: from mail-wr1-f65.google.com ([209.85.221.65]) by UCOL3CPA05.eemsg.mail.mil with ESMTP/TLS/AES128-SHA; 12 Nov 2018 11:44:37 +0000 Received: by mail-wr1-f65.google.com with SMTP id y3-v6so8949096wrh.10 for ; Mon, 12 Nov 2018 03:44:37 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=+nsE4vVL3vZpy1Qd2om+IK2FjkUr7v1NauHREs0Vl8c=; b=mmvQfEYD6Ox4+6x1FdwNnD60sQGzCMoCR1MeSA7LRva97IRbZsr/26GZ1l9LLu4Bty 0nbLJFAO9fuXf+ybFSVhCqAp32LtbIMB2UE/XJztleTJeiU8GKLqNE6QZoVUDl7mEwfm K/CCjChZrZZVNaMwTj2wSPDq1vNqvFy6ldlmueQ3IwoTbGQpDXSaWGTyQvBZHvdW/rfg 6pZlhT3fbYUOxMwMetaNMCGoNR+/N6ED2IN6F69ggyTPgbgCKkcMn0yxqS+0lBppSoXw eUVSj3PicG2UZX5dc15cei/BH8b01TQkLjpgM4GWm2zXLyCa2e6Zz8CgkMKufP+8rlQc QE4A== X-Gm-Message-State: AGRZ1gKBWkwuisrfizRk4UfMIA0U0Jq9ZdeqXTONFtUqMYAInVkD+Amt +DevxjzOE5EiJjNqpaNSvHaODw== X-Google-Smtp-Source: AJdET5f25q7GTL4ixUz/tBtUrGZxaMsnJYQKqg8usUUoQI7qqC2Uw1ec3SSEAjrE4m40KWBUWHjWyQ== X-Received: by 2002:a5d:408c:: with SMTP id o12-v6mr673918wrp.90.1542023076376; Mon, 12 Nov 2018 03:44:36 -0800 (PST) Received: from localhost.localdomain.com (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id i73-v6sm8699303wmd.10.2018.11.12.03.44.35 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 12 Nov 2018 03:44:35 -0800 (PST) X-EEMSG-check-009: 444-444 From: Ondrej Mosnacek To: selinux@vger.kernel.org, Paul Moore Date: Mon, 12 Nov 2018 12:44:26 +0100 Message-Id: <20181112114426.20887-1-omosnace@redhat.com> X-Mailer: git-send-email 2.17.2 Subject: [PATCH v3] selinux: simplify mls_context_to_sid() X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: Stephen Smalley , selinux@tycho.nsa.gov MIME-Version: 1.0 Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP This function has only two callers, but only one of them actually needs the special logic at the beginning. Factoring this logic out into string_to_context_struct() allows us to drop the arguments 'oldc', 's', and 'def_sid'. Signed-off-by: Ondrej Mosnacek --- Changes in v3: - correct the comment about policy read lock Changes in v2: - also drop unneeded #include's from mls.c security/selinux/ss/mls.c | 49 +++++----------------------------- security/selinux/ss/mls.h | 5 +--- security/selinux/ss/services.c | 32 +++++++++++++++++++--- 3 files changed, 36 insertions(+), 50 deletions(-) diff --git a/security/selinux/ss/mls.c b/security/selinux/ss/mls.c index 2fe459df3c85..d1da928a7e77 100644 --- a/security/selinux/ss/mls.c +++ b/security/selinux/ss/mls.c @@ -24,10 +24,7 @@ #include #include #include -#include "sidtab.h" #include "mls.h" -#include "policydb.h" -#include "services.h" /* * Return the length in bytes for the MLS fields of the @@ -223,20 +220,12 @@ int mls_context_isvalid(struct policydb *p, struct context *c) * This function modifies the string in place, inserting * NULL characters to terminate the MLS fields. * - * If a def_sid is provided and no MLS field is present, - * copy the MLS field of the associated default context. - * Used for upgraded to MLS systems where objects may lack - * MLS fields. - * - * Policy read-lock must be held for sidtab lookup. + * Policy read-lock must be held for policy data lookup. * */ int mls_context_to_sid(struct policydb *pol, - char oldc, char *scontext, - struct context *context, - struct sidtab *s, - u32 def_sid) + struct context *context) { char *sensitivity, *cur_cat, *next_cat, *rngptr; struct level_datum *levdatum; @@ -244,29 +233,6 @@ int mls_context_to_sid(struct policydb *pol, int l, rc, i; char *rangep[2]; - if (!pol->mls_enabled) { - if ((def_sid != SECSID_NULL && oldc) || (*scontext) == '\0') - return 0; - return -EINVAL; - } - - /* - * No MLS component to the security context, try and map to - * default if provided. - */ - if (!oldc) { - struct context *defcon; - - if (def_sid == SECSID_NULL) - return -EINVAL; - - defcon = sidtab_search(s, def_sid); - if (!defcon) - return -EINVAL; - - return mls_context_cpy(context, defcon); - } - /* * If we're dealing with a range, figure out where the two parts * of the range begin. @@ -364,14 +330,11 @@ int mls_from_string(struct policydb *p, char *str, struct context *context, return -EINVAL; tmpstr = kstrdup(str, gfp_mask); - if (!tmpstr) { - rc = -ENOMEM; - } else { - rc = mls_context_to_sid(p, ':', tmpstr, context, - NULL, SECSID_NULL); - kfree(tmpstr); - } + if (!tmpstr) + return -ENOMEM; + rc = mls_context_to_sid(p, tmpstr, context); + kfree(tmpstr); return rc; } diff --git a/security/selinux/ss/mls.h b/security/selinux/ss/mls.h index 67093647576d..e2498f78e100 100644 --- a/security/selinux/ss/mls.h +++ b/security/selinux/ss/mls.h @@ -33,11 +33,8 @@ int mls_range_isvalid(struct policydb *p, struct mls_range *r); int mls_level_isvalid(struct policydb *p, struct mls_level *l); int mls_context_to_sid(struct policydb *p, - char oldc, char *scontext, - struct context *context, - struct sidtab *s, - u32 def_sid); + struct context *context); int mls_from_string(struct policydb *p, char *str, struct context *context, gfp_t gfp_mask); diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 12e414394530..ccad4334f99d 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -1425,9 +1425,35 @@ static int string_to_context_struct(struct policydb *pol, ctx->type = typdatum->value; - rc = mls_context_to_sid(pol, oldc, p, ctx, sidtabp, def_sid); - if (rc) - goto out; + if (!pol->mls_enabled) { + rc = -EINVAL; + if ((def_sid == SECSID_NULL || !oldc) && (*p) != '\0') + goto out; + } else if (!oldc) { + /* + * If a def_sid is provided and no MLS field is present, + * copy the MLS field of the associated default context. + * Used for upgrading to MLS systems where objects may lack + * MLS fields. + */ + struct context *defcon; + + rc = -EINVAL; + if (def_sid == SECSID_NULL) + goto out; + + defcon = sidtab_search(sidtabp, def_sid); + if (!defcon) + goto out; + + rc = mls_context_cpy(ctx, defcon); + if (rc) + goto out; + } else { + rc = mls_context_to_sid(pol, p, ctx); + if (rc) + goto out; + } /* Check the validity of the new context. */ rc = -EINVAL;