From patchwork Tue Nov 13 13:52:53 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ondrej Mosnacek X-Patchwork-Id: 10680675 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 0EBB814E2 for ; Tue, 13 Nov 2018 13:54:01 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id DD04B20499 for ; Tue, 13 Nov 2018 13:53:57 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id D0D1628500; Tue, 13 Nov 2018 13:53:57 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.2 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from usfb19pa15.eemsg.mail.mil (uphb19pa12.eemsg.mail.mil [214.24.26.86]) (using TLSv1.2 with cipher DHE-RSA-AES256-SHA256 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 0C29520499 for ; Tue, 13 Nov 2018 13:53:56 +0000 (UTC) X-EEMSG-check-008: 159423724|USFB19PA15_EEMSG_MP11.csd.disa.mil Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.3]) by usfb19pa15.eemsg.mail.mil with ESMTP/TLS/DHE-RSA-AES256-SHA256; 13 Nov 2018 13:53:54 +0000 X-IronPort-AV: E=Sophos;i="5.54,499,1534809600"; d="scan'208";a="20545266" IronPort-PHdr: 9a23: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 X-IPAS-Result: A2AzAABk1upb/wHyM5BjGwEBAQEDAQEBBwMBAQGBUwQBAQELAYIAA4FoJ4xvix6LIo4gFIFfEgEBGBMBh3siNgsNAQMBAQEBAQECAWwogjYkAYJgAwMBAiQTFCALAwMJAQFACAgDAS0DAQUBCxEGAQcLBRUDBIMAgXUNAwGcBzyMCTOFQIRsEodFhCoXgUA/gRGHXQESAYV6AokUhjSQDgmGOYpeCxiJSIcrl1YGAgkHDyGBKQ4jZHFNIxU7gmyCJxeOHXGBBQEBimqCPgEB Received: from tarius.tycho.ncsc.mil ([144.51.242.1]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 13 Nov 2018 13:53:53 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id wADDrIgr020052; Tue, 13 Nov 2018 08:53:26 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id wADDrGwd038731 for ; Tue, 13 Nov 2018 08:53:16 -0500 Received: from goalie.tycho.ncsc.mil (goalie.tycho.ncsc.mil [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id wADDrFr8020047 for ; Tue, 13 Nov 2018 08:53:15 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1BmAACk1upbl3sVGNZjHAEBAQQBAQcEAQGBVAQBAQsBggCBayeMb4seiyKQGgsBAYRsAoM5IjcKDQEDAQEBAQEBAhQBAQEBAQYYBoYTAwMnUhBRNAEFARwGARIagweBdQ0DAZwGPIwJM4osEodFhCoXgUA/gRGNawKJFJZCCYY5il4LGIlIhyuXVgYCCQcPIYE4gXdNIxWDJ4InDgmOHUAxji8BAQ X-IPAS-Result: A1BmAACk1upbl3sVGNZjHAEBAQQBAQcEAQGBVAQBAQsBggCBayeMb4seiyKQGgsBAYRsAoM5IjcKDQEDAQEBAQEBAhQBAQEBAQYYBoYTAwMnUhBRNAEFARwGARIagweBdQ0DAZwGPIwJM4osEodFhCoXgUA/gRGNawKJFJZCCYY5il4LGIlIhyuXVgYCCQcPIYE4gXdNIxWDJ4InDgmOHUAxji8BAQ X-IronPort-AV: E=Sophos;i="5.54,499,1534824000"; d="scan'208";a="412395" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.35]) by goalie.tycho.ncsc.mil with ESMTP; 13 Nov 2018 08:53:15 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BQAABk1upbl3sVGNZjHAEBAQQBAQcEAQGBVAQBAQsBggCBayeMb4seiyKQGgsBAYRsAoM5IjcKDQEDAQEBAQEBAgETAQEBAQEGGAZYgjYkAYJgAwMnUhBRNAEFARwGARIagweBdQ0DAZwHPIwJM4osEodFhCoXgUA/gRGNawKJFJZCCYY5il4LGIlIhyuXVgYCCQcPIYE4gXdNIxWDJ4InDgmOHT8yji8BAQ X-IPAS-Result: A0BQAABk1upbl3sVGNZjHAEBAQQBAQcEAQGBVAQBAQsBggCBayeMb4seiyKQGgsBAYRsAoM5IjcKDQEDAQEBAQEBAgETAQEBAQEGGAZYgjYkAYJgAwMnUhBRNAEFARwGARIagweBdQ0DAZwHPIwJM4osEodFhCoXgUA/gRGNawKJFJZCCYY5il4LGIlIhyuXVgYCCQcPIYE4gXdNIxWDJ4InDgmOHT8yji8BAQ X-IronPort-AV: E=Sophos;i="5.54,499,1534809600"; d="scan'208";a="20545203" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from uhil3cpa12.eemsg.mail.mil ([214.24.21.123]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 13 Nov 2018 13:53:14 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;853b1d03-080d-4abb-9f76-e56d116020fb Authentication-Results: UHIL3CPA04.eemsg.mail.mil; dkim=none (message not signed) header.i=none; spf=None smtp.pra=omosnace@redhat.com; spf=Pass smtp.mailfrom=omosnace@redhat.com; spf=None smtp.helo=postmaster@mail-wr1-f66.google.com; dmarc=pass (p=none dis=none) d=redhat.com X-EEMSG-check-008: 534815396|UHIL3CPA04_EEMSG_MP20.csd.disa.mil X-EEMSG-SBRS: 2.7 X-EEMSG-ORIG-IP: 209.85.221.66 X-EEMSG-check-002: true X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BlAABk1upbf0LdVdFjHAEBAQQBAQcEAQGBUwUBAQsBhBKMb4seiyKOIIF6CwEBhGwCgzkaBwEEMgsNAQMBAQEBAQEBAQETAQEJCwsIGwwxgjYkAYJgAwMnUhBRNAEFARwGARIagweBdQ0EnAc8jAkziiwJAQiHRYQqF4FAP4ERjWsCiRSWQgmGOYpeCxiJSIcrl1YGAgkHDyGBKQSCAk0jFYMngicXjh0+M44vAQE X-IPAS-Result: A0BlAABk1upbf0LdVdFjHAEBAQQBAQcEAQGBUwUBAQsBhBKMb4seiyKOIIF6CwEBhGwCgzkaBwEEMgsNAQMBAQEBAQEBAQETAQEJCwsIGwwxgjYkAYJgAwMnUhBRNAEFARwGARIagweBdQ0EnAc8jAkziiwJAQiHRYQqF4FAP4ERjWsCiRSWQgmGOYpeCxiJSIcrl1YGAgkHDyGBKQSCAk0jFYMngicXjh0+M44vAQE Received: from mail-wr1-f66.google.com ([209.85.221.66]) by UHIL3CPA04.eemsg.mail.mil with ESMTP/TLS/AES128-SHA; 13 Nov 2018 13:53:11 +0000 Received: by mail-wr1-f66.google.com with SMTP id y3-v6so13377540wrh.10 for ; Tue, 13 Nov 2018 05:53:11 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=kfWlC2l2R91YZ+YHJArmlUB/9Y4aLz4Qmy86b3cwAL4=; b=IW/xU82wX9Hcyj1LU32zCpVFjYgWzM/7o7Yv/ezN3tvTZikzrJMsAYJuOlz7MJsvh6 MHbZB4xVuTaFInmk2VQbdDrfk9px2iPtYPWsUE8rPQuLgNqpogSE4IboZrHWSDir26LQ aPrmA3j5IEbdsXZN8U5w0XAF7e+A0NkSYbDoNdTnssWOuVFznb9T6dnoVaxdkmuYDgOk 4apdJZlHUWretsioNaGbQG+7QiO4X/806bEXzpHIYWz+5ItUG2IZMDqQyTCifFOhtpPP IJCcbcpVnWL0qtPUpS5eSyotO1pxQ9adTL0oJlShZoa6ATTVrHthrdYRkv2RyBgjX528 U8LQ== X-Gm-Message-State: AGRZ1gLcna4dSx7FJxEUBvRH8g9B/jmBbAwh7IZ+TYAgIgy1sP3JwNJT boKk2v5bUc1z0sRs66twZrPQl3nUZSE= X-Google-Smtp-Source: AJdET5cwDhPzxDpokg64OjjxxTF00G56OQSmMV94mLCR0Mz3WBq81lVdc2ury7x2YNtjWAnuRd1dsQ== X-Received: by 2002:adf:9d4a:: with SMTP id o10-v6mr5234893wre.94.1542117189548; Tue, 13 Nov 2018 05:53:09 -0800 (PST) Received: from localhost.localdomain.com (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id t187-v6sm10342609wmt.45.2018.11.13.05.53.08 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 13 Nov 2018 05:53:08 -0800 (PST) X-EEMSG-check-009: 444-444 From: Ondrej Mosnacek To: selinux@vger.kernel.org, Paul Moore Date: Tue, 13 Nov 2018 14:52:53 +0100 Message-Id: <20181113135255.26045-2-omosnace@redhat.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20181113135255.26045-1-omosnace@redhat.com> References: <20181113135255.26045-1-omosnace@redhat.com> Subject: [RFC PATCH 1/3] selinux: refactor sidtab conversion X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: Stephen Smalley , selinux@tycho.nsa.gov MIME-Version: 1.0 Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP This is a purely cosmetic change that encapsulates the three-step sidtab conversion logic (shutdown -> clone -> map) into a single function defined in sidtab.c (as opposed to services.c). Signed-off-by: Ondrej Mosnacek Acked-by: Stephen Smalley --- security/selinux/ss/services.c | 22 +-------------- security/selinux/ss/sidtab.c | 50 ++++++++++++++++++++++++---------- security/selinux/ss/sidtab.h | 11 ++++---- 3 files changed, 42 insertions(+), 41 deletions(-) diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 12e414394530..7337db24a6a8 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -1880,19 +1880,6 @@ int security_change_sid(struct selinux_state *state, out_sid, false); } -/* Clone the SID into the new SID table. */ -static int clone_sid(u32 sid, - struct context *context, - void *arg) -{ - struct sidtab *s = arg; - - if (sid > SECINITSID_NUM) - return sidtab_insert(s, sid, context); - else - return 0; -} - static inline int convert_context_handle_invalid_context( struct selinux_state *state, struct context *context) @@ -2186,13 +2173,6 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len) goto err; } - /* Clone the SID table. */ - sidtab_shutdown(sidtab); - - rc = sidtab_map(sidtab, clone_sid, &newsidtab); - if (rc) - goto err; - /* * Convert the internal representations of contexts * in the new SID table. @@ -2200,7 +2180,7 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len) args.state = state; args.oldp = policydb; args.newp = newpolicydb; - rc = sidtab_map(&newsidtab, convert_context, &args); + rc = sidtab_convert(sidtab, &newsidtab, convert_context, &args); if (rc) { pr_err("SELinux: unable to convert the internal" " representation of contexts in the new SID" diff --git a/security/selinux/ss/sidtab.c b/security/selinux/ss/sidtab.c index fd75a12fa8fc..e66a2ab3d1c2 100644 --- a/security/selinux/ss/sidtab.c +++ b/security/selinux/ss/sidtab.c @@ -116,11 +116,11 @@ struct context *sidtab_search_force(struct sidtab *s, u32 sid) return sidtab_search_core(s, sid, 1); } -int sidtab_map(struct sidtab *s, - int (*apply) (u32 sid, - struct context *context, - void *args), - void *args) +static int sidtab_map(struct sidtab *s, + int (*apply) (u32 sid, + struct context *context, + void *args), + void *args) { int i, rc = 0; struct sidtab_node *cur; @@ -141,6 +141,37 @@ out: return rc; } +/* Clone the SID into the new SID table. */ +static int clone_sid(u32 sid, struct context *context, void *arg) +{ + struct sidtab *s = arg; + + if (sid > SECINITSID_NUM) + return sidtab_insert(s, sid, context); + else + return 0; +} + +int sidtab_convert(struct sidtab *s, struct sidtab *news, + int (*convert) (u32 sid, + struct context *context, + void *args), + void *args) +{ + unsigned long flags; + int rc; + + spin_lock_irqsave(&s->lock, flags); + s->shutdown = 1; + spin_unlock_irqrestore(&s->lock, flags); + + rc = sidtab_map(s, clone_sid, news); + if (rc) + return rc; + + return sidtab_map(news, convert, args); +} + static void sidtab_update_cache(struct sidtab *s, struct sidtab_node *n, int loc) { BUG_ON(loc >= SIDTAB_CACHE_LEN); @@ -295,12 +326,3 @@ void sidtab_set(struct sidtab *dst, struct sidtab *src) dst->cache[i] = NULL; spin_unlock_irqrestore(&src->lock, flags); } - -void sidtab_shutdown(struct sidtab *s) -{ - unsigned long flags; - - spin_lock_irqsave(&s->lock, flags); - s->shutdown = 1; - spin_unlock_irqrestore(&s->lock, flags); -} diff --git a/security/selinux/ss/sidtab.h b/security/selinux/ss/sidtab.h index a1a1d2617b6f..26c74fe7afc0 100644 --- a/security/selinux/ss/sidtab.h +++ b/security/selinux/ss/sidtab.h @@ -37,11 +37,11 @@ int sidtab_insert(struct sidtab *s, u32 sid, struct context *context); struct context *sidtab_search(struct sidtab *s, u32 sid); struct context *sidtab_search_force(struct sidtab *s, u32 sid); -int sidtab_map(struct sidtab *s, - int (*apply) (u32 sid, - struct context *context, - void *args), - void *args); +int sidtab_convert(struct sidtab *s, struct sidtab *news, + int (*apply) (u32 sid, + struct context *context, + void *args), + void *args); int sidtab_context_to_sid(struct sidtab *s, struct context *context, @@ -50,7 +50,6 @@ int sidtab_context_to_sid(struct sidtab *s, void sidtab_hash_eval(struct sidtab *h, char *tag); void sidtab_destroy(struct sidtab *s); void sidtab_set(struct sidtab *dst, struct sidtab *src); -void sidtab_shutdown(struct sidtab *s); #endif /* _SS_SIDTAB_H_ */