Skip to content
  1. Feb 18, 2020
  2. Feb 07, 2020
  3. Feb 05, 2020
    • Ondrej Mosnacek's avatar
      selinux: fix sidtab string cache locking · 39a706fb
      Ondrej Mosnacek authored
      Avoiding taking a lock in an IRQ context is not enough to prevent
      deadlocks, as discovered by syzbot:
      
      ===
      WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected
      5.5.0-syzkaller #0 Not tainted
      -----------------------------------------------------
      syz-executor.0/8927 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire:
      ffff888027c94098 (&(&s->cache_lock)->rlock){+.+.}, at: spin_lock include/linux/spinlock.h:338 [inline]
      ffff888027c94098 (&(&s->cache_lock)->rlock){+.+.}, at: sidtab_sid2str_put.part.0+0x36/0x880 security/selinux/ss/sidtab.c:533
      
      and this task is already holding:
      ffffffff898639b0 (&(&nf_conntrack_locks[i])->rlock){+.-.}, at: spin_lock include/linux/spinlock.h:338 [inline]
      ffffffff898639b0 (&(&nf_conntrack_locks[i])->rlock){+.-.}, at: nf_conntrack_lock+0x17/0x70 net/netfilter/nf_conntrack_core.c:91
      which would create a new lock dependency:
       (&(&nf_conntrack_locks[i])->rlock){+.-.} -> (&(&s->cache_lock)->rlock){+.+.}
      
      but this new dependency connects a SOFTIRQ-irq-safe lock:
       (&(&nf_conntrack_locks[i])->rlock){+.-.}
      
      [...]
      
      other info that might help us debug this:
      
       Possible interrupt unsafe locking scenario:
      
             CPU0                    CPU1
             ----                    ----
        lock(&(&s->cache_lock)->rlock);
                                     local_irq_disable();
                                     lock(&(&nf_conntrack_locks[i])->rlock);
                                     lock(&(&s->cache_lock)->rlock);
        <Interrupt>
          lock(&(&nf_conntrack_locks[i])->rlock);
      
       *** DEADLOCK ***
      [...]
      ===
      
      Fix this by simply locking with irqsave/irqrestore and stop giving up on
      !in_task(). It makes the locking a bit slower, but it shouldn't make a
      big difference in real workloads. Under the scenario from [1] (only
      cache hits) it only increased the runtime overhead from the
      security_secid_to_secctx() function from ~2% to ~3% (it was ~5-65%
      before introducing the cache).
      
      [1] https://bugzilla.redhat.com/show_bug.cgi?id=1733259
      
      
      
      Fixes: d97bd23c ("selinux: cache the SID -> context string translation")
      Reported-by: default avatar <syzbot+61cba5033e2072d61806@syzkaller.appspotmail.com>
      Signed-off-by: default avatarOndrej Mosnacek <omosnace@redhat.com>
      Acked-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      39a706fb
    • Hridya Valsaraju's avatar
      selinux: fix typo in filesystem name · a20456ae
      Hridya Valsaraju authored
      
      
      Correct the filesystem name to "binder" to enable genfscon per-file
      labelling for binderfs.
      
      Fixes: 7a4b5194 ("selinux: allow per-file labelling for binderfs")
      Signed-off-by: default avatarHridya Valsaraju <hridya@google.com>
      Acked-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      [PM: slight style changes to the subj/description]
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      a20456ae
    • Casey Schaufler's avatar
      broken ping to ipv6 linklocal addresses on debian buster · 87fbfffc
      Casey Schaufler authored
      
      
      I am seeing ping failures to IPv6 linklocal addresses with Debian
      buster. Easiest example to reproduce is:
      
      $ ping -c1 -w1 ff02::1%eth1
      connect: Invalid argument
      
      $ ping -c1 -w1 ff02::1%eth1
      PING ff02::01%eth1(ff02::1%eth1) 56 data bytes
      64 bytes from fe80::e0:f9ff:fe0c:37%eth1: icmp_seq=1 ttl=64 time=0.059 ms
      
      git bisect traced the failure to
      commit b9ef5513 ("smack: Check address length before reading address family")
      
      Arguably ping is being stupid since the buster version is not setting
      the address family properly (ping on stretch for example does):
      
      $ strace -e connect ping6 -c1 -w1 ff02::1%eth1
      connect(5, {sa_family=AF_UNSPEC,
      sa_data="\4\1\0\0\0\0\377\2\0\0\0\0\0\0\0\0\0\0\0\0\0\1\3\0\0\0"}, 28)
      = -1 EINVAL (Invalid argument)
      
      but the command works fine on kernels prior to this commit, so this is
      breakage which goes against the Linux paradigm of "don't break userspace"
      
      Cc: stable@vger.kernel.org
      Reported-by: default avatarDavid Ahern <dsahern@gmail.com>
      Suggested-by: default avatarTetsuo Handa <penguin-kernel@i-love.sakura.ne.jp>
      Signed-off-by: default avatarCasey Schaufler <casey@schaufler-ca.com>
      
       security/smack/smack_lsm.c | 41 +++++++++++++++++++----------------------
       1 file changed, 19 insertions(+), 22 deletions(-)
      87fbfffc
  4. Jan 27, 2020
  5. Jan 23, 2020
    • Lakshmi Ramasubramanian's avatar
      IMA: Defined delayed workqueue to free the queued keys · 5b3014b9
      Lakshmi Ramasubramanian authored
      
      
      Keys queued for measurement should be freed if a custom IMA policy
      was not loaded.  Otherwise, the keys will remain queued forever
      consuming kernel memory.
      
      This patch defines a delayed workqueue to handle the above scenario.
      The workqueue handler is setup to execute 5 minutes after IMA
      initialization is completed.
      
      If a custom IMA policy is loaded before the workqueue handler is
      scheduled to execute, the workqueue task is cancelled and any queued keys
      are processed for measurement.  But if a custom policy was not loaded then
      the queued keys are just freed when the delayed workqueue handler is run.
      
      Signed-off-by: default avatarLakshmi Ramasubramanian <nramas@linux.microsoft.com>
      Reported-by: kernel test robot <rong.a.chen@intel.com> # sleeping
      function called from invalid context
      Reported-by: kbuild test robot <lkp@intel.com> # redefinition of
      ima_init_key_queue() function.
      Signed-off-by: default avatarMimi Zohar <zohar@linux.ibm.com>
      5b3014b9
    • Lakshmi Ramasubramanian's avatar
      IMA: Call workqueue functions to measure queued keys · 450d0fd5
      Lakshmi Ramasubramanian authored
      
      
      Measuring keys requires a custom IMA policy to be loaded.  Keys should
      be queued for measurement if a custom IMA policy is not yet loaded.
      Keys queued for measurement, if any, should be processed when a custom
      policy is loaded.
      
      This patch updates the IMA hook function ima_post_key_create_or_update()
      to queue the key if a custom IMA policy has not yet been loaded.  And,
      ima_update_policy() function, which is called when a custom IMA policy
      is loaded, is updated to process queued keys.
      
      Signed-off-by: default avatarLakshmi Ramasubramanian <nramas@linux.microsoft.com>
      Signed-off-by: default avatarMimi Zohar <zohar@linux.ibm.com>
      450d0fd5
    • Lakshmi Ramasubramanian's avatar
      IMA: Define workqueue for early boot key measurements · 9f81a2ed
      Lakshmi Ramasubramanian authored
      
      
      Measuring keys requires a custom IMA policy to be loaded.  Keys created
      or updated before a custom IMA policy is loaded should be queued and
      will be processed after a custom policy is loaded.
      
      This patch defines a workqueue for queuing keys when a custom IMA policy
      has not yet been loaded.  An intermediate Kconfig boolean option namely
      IMA_QUEUE_EARLY_BOOT_KEYS is used to declare the workqueue functions.
      
      A flag namely ima_process_keys is used to check if the key should be
      queued or should be processed immediately.
      
      Signed-off-by: default avatarLakshmi Ramasubramanian <nramas@linux.microsoft.com>
      Signed-off-by: default avatarMimi Zohar <zohar@linux.ibm.com>
      9f81a2ed
  6. Jan 22, 2020
  7. Jan 20, 2020
    • Stephen Smalley's avatar
      selinux: fix regression introduced by move_mount(2) syscall · 98aa0034
      Stephen Smalley authored
      
      
      commit 2db154b3 ("vfs: syscall: Add move_mount(2) to move mounts around")
      introduced a new move_mount(2) system call and a corresponding new LSM
      security_move_mount hook but did not implement this hook for any existing
      LSM.  This creates a regression for SELinux with respect to consistent
      checking of mounts; the existing selinux_mount hook checks mounton
      permission to the mount point path.  Provide a SELinux hook
      implementation for move_mount that applies this same check for
      consistency.  In the future we may wish to add a new move_mount
      filesystem permission and check as well, but this addresses
      the immediate regression.
      
      Fixes: 2db154b3 ("vfs: syscall: Add move_mount(2) to move mounts around")
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      Reviewed-by: default avatarOndrej Mosnacek <omosnace@redhat.com>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      98aa0034
  8. Jan 16, 2020
    • Ondrej Mosnacek's avatar
      selinux: do not allocate ancillary buffer on first load · dd89b9d9
      Ondrej Mosnacek authored
      
      
      In security_load_policy(), we can defer allocating the newpolicydb
      ancillary array to after checking state->initialized, thereby avoiding
      the pointless allocation when loading policy the first time.
      
      Signed-off-by: default avatarOndrej Mosnacek <omosnace@redhat.com>
      [PM: merged portions by hand]
      Reviewed-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      dd89b9d9
    • Paul Moore's avatar
      selinux: remove redundant allocation and helper functions · cb89e246
      Paul Moore authored
      
      
      This patch removes the inode, file, and superblock security blob
      allocation functions and moves the associated code into the
      respective LSM hooks.  This patch also removes the inode_doinit()
      function as it was a trivial wrapper around
      inode_doinit_with_dentry() and called from one location in the code.
      
      Reviewed-by: default avatarCasey Schaufler <casey@schaufler-ca.com>
      Acked-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      cb89e246
    • Huaisheng Ye's avatar
      selinux: remove redundant selinux_nlmsg_perm · df4779b5
      Huaisheng Ye authored
      
      
      selinux_nlmsg_perm is used for only by selinux_netlink_send. Remove
      the redundant function to simplify the code.
      
      Fix a typo by suggestion from Stephen.
      
      Signed-off-by: default avatarHuaisheng Ye <yehs1@lenovo.com>
      Acked-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      df4779b5
    • Ondrej Mosnacek's avatar
      selinux: fix wrong buffer types in policydb.c · ae3d8c2e
      Ondrej Mosnacek authored
      
      
      Two places used u32 where there should have been __le32.
      
      Fixes sparse warnings:
        CHECK   [...]/security/selinux/ss/services.c
      [...]/security/selinux/ss/policydb.c:2669:16: warning: incorrect type in assignment (different base types)
      [...]/security/selinux/ss/policydb.c:2669:16:    expected unsigned int
      [...]/security/selinux/ss/policydb.c:2669:16:    got restricted __le32 [usertype]
      [...]/security/selinux/ss/policydb.c:2674:24: warning: incorrect type in assignment (different base types)
      [...]/security/selinux/ss/policydb.c:2674:24:    expected unsigned int
      [...]/security/selinux/ss/policydb.c:2674:24:    got restricted __le32 [usertype]
      [...]/security/selinux/ss/policydb.c:2675:24: warning: incorrect type in assignment (different base types)
      [...]/security/selinux/ss/policydb.c:2675:24:    expected unsigned int
      [...]/security/selinux/ss/policydb.c:2675:24:    got restricted __le32 [usertype]
      [...]/security/selinux/ss/policydb.c:2676:24: warning: incorrect type in assignment (different base types)
      [...]/security/selinux/ss/policydb.c:2676:24:    expected unsigned int
      [...]/security/selinux/ss/policydb.c:2676:24:    got restricted __le32 [usertype]
      [...]/security/selinux/ss/policydb.c:2681:32: warning: incorrect type in assignment (different base types)
      [...]/security/selinux/ss/policydb.c:2681:32:    expected unsigned int
      [...]/security/selinux/ss/policydb.c:2681:32:    got restricted __le32 [usertype]
      [...]/security/selinux/ss/policydb.c:2701:16: warning: incorrect type in assignment (different base types)
      [...]/security/selinux/ss/policydb.c:2701:16:    expected unsigned int
      [...]/security/selinux/ss/policydb.c:2701:16:    got restricted __le32 [usertype]
      [...]/security/selinux/ss/policydb.c:2706:24: warning: incorrect type in assignment (different base types)
      [...]/security/selinux/ss/policydb.c:2706:24:    expected unsigned int
      [...]/security/selinux/ss/policydb.c:2706:24:    got restricted __le32 [usertype]
      [...]/security/selinux/ss/policydb.c:2707:24: warning: incorrect type in assignment (different base types)
      [...]/security/selinux/ss/policydb.c:2707:24:    expected unsigned int
      [...]/security/selinux/ss/policydb.c:2707:24:    got restricted __le32 [usertype]
      
      Signed-off-by: default avatarOndrej Mosnacek <omosnace@redhat.com>
      Reviewed-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      ae3d8c2e
  9. Jan 15, 2020
  10. Jan 10, 2020
  11. Jan 09, 2020
  12. Jan 07, 2020
  13. Jan 04, 2020
  14. Jan 02, 2020
  15. Dec 24, 2019
    • YueHaibing's avatar
      selinux: remove set but not used variable 'sidtab' · f1268534
      YueHaibing authored
      
      
      security/selinux/ss/services.c: In function security_port_sid:
      security/selinux/ss/services.c:2346:17: warning: variable sidtab set but not used [-Wunused-but-set-variable]
      security/selinux/ss/services.c: In function security_ib_endport_sid:
      security/selinux/ss/services.c:2435:17: warning: variable sidtab set but not used [-Wunused-but-set-variable]
      security/selinux/ss/services.c: In function security_netif_sid:
      security/selinux/ss/services.c:2480:17: warning: variable sidtab set but not used [-Wunused-but-set-variable]
      security/selinux/ss/services.c: In function security_fs_use:
      security/selinux/ss/services.c:2831:17: warning: variable sidtab set but not used [-Wunused-but-set-variable]
      
      Since commit 66f8e2f0 ("selinux: sidtab reverse lookup hash table")
      'sidtab' is not used any more, so remove it.
      
      Reported-by: default avatarHulk Robot <hulkci@huawei.com>
      Signed-off-by: default avatarYueHaibing <yuehaibing@huawei.com>
      Signed-off-by: default avatarPaul Moore <paul@paul-moore.com>
      f1268534
  16. Dec 23, 2019
  17. Dec 21, 2019
Loading