From patchwork Tue Nov 13 13:52:55 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ondrej Mosnacek X-Patchwork-Id: 10680695 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id A4F3E13BF for ; Tue, 13 Nov 2018 13:55:35 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9036C29BDA for ; Tue, 13 Nov 2018 13:55:35 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 7B3172A7A7; Tue, 13 Nov 2018 13:55:35 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.2 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from ucol19pa12.eemsg.mail.mil (ucol19pa12.eemsg.mail.mil [214.24.24.85]) (using TLSv1.2 with cipher DHE-RSA-AES256-SHA256 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 639CA29BDA for ; Tue, 13 Nov 2018 13:55:33 +0000 (UTC) X-EEMSG-check-008: 655738172|UCOL19PA12_EEMSG_MP10.csd.disa.mil X-IronPort-AV: E=Sophos;i="5.54,499,1534809600"; d="scan'208";a="655738172" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.3]) by ucol19pa12.eemsg.mail.mil with ESMTP; 13 Nov 2018 13:55:31 +0000 X-IronPort-AV: E=Sophos;i="5.54,499,1534809600"; d="scan'208";a="20545428" IronPort-PHdr: 9a23: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 X-IPAS-Result: A2AWAABk1upb/wHyM5BjGwEBAQEDAQEBBwMBAQGBUQYBAQELAYFVKwNmgQInjBBfix6DB4gNDo4gFIFjDgEBGAsIAYd7IjQNDQEDAQEBAQEBAgFsHAyCNiQBgmADAwECFw0TFCALAwMJAQFACAgDAR0QAwEFAQsRBgEHCwUVAwSDAAGBaQMIDQMBC5t8PIwJM4VAgkYNghQFEodFhCoXgUA/gRGCXYMLRQKBJggBCwcBC4VvAohwGgYEhjSBAY5fLgmGOT6HAIMgCxiBWIdwNoZ1jSiBB4ZggkcGAgkHDyGBIjhkcU0jFTuCbIImAReDSopRAnGBBQEBilsBDheCJwEB Received: from tarius.tycho.ncsc.mil ([144.51.242.1]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 13 Nov 2018 13:55:30 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id wADDtS4l020095; Tue, 13 Nov 2018 08:55:30 -0500 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id wADDrWDM038737 for ; Tue, 13 Nov 2018 08:53:32 -0500 Received: from goalie.tycho.ncsc.mil (goalie.tycho.ncsc.mil [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id wADDrUHE020056 for ; Tue, 13 Nov 2018 08:53:32 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1AWAACk1upblywVGNZjHAEBAQQBAQcEAQGBUQcBAQsBgVUraYECJ4wQX4segweIDQ6OIBSBZgsBASOESQKDOSI0DQ0BAwEBAQEBAQIUAQEBAQEGGAZMhUcDAxoNUhBRIRMBBQEcBgESGoMHAYFpAwgNAwELm3s8jAkziAYNghQFEodFhCoXgUA/gRGCXYMLRQKBJhQThW8CiHAaBgSHNY5fLgmGOT6HAIMgCxiBWIdwNoZ1jSiBB4ZggkcGAgkHDyGBIoINTSMVO4JsgiYBDgkSgziKUQJAMYtiASWCJwEB X-IPAS-Result: A1AWAACk1upblywVGNZjHAEBAQQBAQcEAQGBUQcBAQsBgVUraYECJ4wQX4segweIDQ6OIBSBZgsBASOESQKDOSI0DQ0BAwEBAQEBAQIUAQEBAQEGGAZMhUcDAxoNUhBRIRMBBQEcBgESGoMHAYFpAwgNAwELm3s8jAkziAYNghQFEodFhCoXgUA/gRGCXYMLRQKBJhQThW8CiHAaBgSHNY5fLgmGOT6HAIMgCxiBWIdwNoZ1jSiBB4ZggkcGAgkHDyGBIoINTSMVO4JsgiYBDgkSgziKUQJAMYtiASWCJwEB X-IronPort-AV: E=Sophos;i="5.54,499,1534824000"; d="scan'208";a="412401" Received: from emsm-gh1-uea10.ncsc.mil ([214.29.60.34]) by goalie.tycho.ncsc.mil with ESMTP; 13 Nov 2018 08:53:31 -0500 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0ARAAA51upblywVGNZjHAEBAQQBAQcEAQGBUQcBAQsBgVUraYECJ4wQX4segweIDQ6OIBSBZgsBASOESQKDOSI0DQ0BAwEBAQEBAQIBEwEBAQEBBhgGTAyCNiQBgmADAxoNUhBRIRMBBQEcBgESGoMHAYFpAwgNAwELm3o8jAkziAYNghQFEodFhCoXgUA/gRGCXYMLRQKBJhQThW8CiHAaBgSHNY5fLgmGOT6HAIMgCxiBWIdwNoZ1jSiBB4ZggkcGAgkHDyGBIoINTSMVO4JsgiYBDgkSgziKUQI/MotiASWCJwEB X-IPAS-Result: A0ARAAA51upblywVGNZjHAEBAQQBAQcEAQGBUQcBAQsBgVUraYECJ4wQX4segweIDQ6OIBSBZgsBASOESQKDOSI0DQ0BAwEBAQEBAQIBEwEBAQEBBhgGTAyCNiQBgmADAxoNUhBRIRMBBQEcBgESGoMHAYFpAwgNAwELm3o8jAkziAYNghQFEodFhCoXgUA/gRGCXYMLRQKBJhQThW8CiHAaBgSHNY5fLgmGOT6HAIMgCxiBWIdwNoZ1jSiBB4ZggkcGAgkHDyGBIoINTSMVO4JsgiYBDgkSgziKUQI/MotiASWCJwEB X-IronPort-AV: E=Sophos;i="5.54,499,1534809600"; d="scan'208";a="17777583" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from uhil3cpa05.eemsg.mail.mil ([214.24.21.44]) by EMSM-GH1-UEA10.NCSC.MIL with ESMTP; 13 Nov 2018 13:53:30 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;5eb994a9-f41e-49c1-8e24-f6af4144e9f4 Authentication-Results: UHIL3CPA09.eemsg.mail.mil; dkim=none (message not signed) header.i=none; spf=None smtp.pra=omosnace@redhat.com; spf=Pass smtp.mailfrom=omosnace@redhat.com; spf=None smtp.helo=postmaster@mail-wr1-f68.google.com; dmarc=pass (p=none dis=none) d=redhat.com X-EEMSG-check-008: 77733189|UHIL3CPA09_EEMSG_MP25.csd.disa.mil X-EEMSG-check-001: false X-EEMSG-SBRS: 2.7 X-EEMSG-ORIG-IP: 209.85.221.68 X-EEMSG-check-002: true X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AtAADc1upbf0TdVdFjHAEBAQQBAQcEAQGBUQcBAQsBgVWBFIEpjBBfix6DB4gNDo4gFIFmCwEBI4NIgQECgzkaBwEEMA0NAQMBAQEBAQEBAQETAQEJCwsIGwwlDII2JAGCYAMDGg1SEFEhEwEFARwGARIagwcBgWkDCA0EC5t7PIwJM4gGDYIUBQkBCIdFhCoXgUA/gRGCXYMLRQKBJhQThW8CiHAaBgSHNY5fLgmGOT6HAIMgCxiBWIdwNoZ1jSiBB4ZggkcGAgkHDyGBIoINTSMVO4JsgiYBF4NKilECPjOLYgElgicBAQ X-IPAS-Result: A0AtAADc1upbf0TdVdFjHAEBAQQBAQcEAQGBUQcBAQsBgVWBFIEpjBBfix6DB4gNDo4gFIFmCwEBI4NIgQECgzkaBwEEMA0NAQMBAQEBAQEBAQETAQEJCwsIGwwlDII2JAGCYAMDGg1SEFEhEwEFARwGARIagwcBgWkDCA0EC5t7PIwJM4gGDYIUBQkBCIdFhCoXgUA/gRGCXYMLRQKBJhQThW8CiHAaBgSHNY5fLgmGOT6HAIMgCxiBWIdwNoZ1jSiBB4ZggkcGAgkHDyGBIoINTSMVO4JsgiYBF4NKilECPjOLYgElgicBAQ Received: from mail-wr1-f68.google.com ([209.85.221.68]) by UHIL3CPA09.eemsg.mail.mil with ESMTP/TLS/AES128-SHA; 13 Nov 2018 13:53:14 +0000 Received: by mail-wr1-f68.google.com with SMTP id v18-v6so13408259wrt.8 for ; Tue, 13 Nov 2018 05:53:15 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=TdT3s0b/XnD9qNGSLx8gmRIKHxPqxn53OWe8NGAK10s=; b=WHMY1dI43nmdpXMTFldgyxeXfw1vKdg1aHa8zTvtLwYYqmKkd8/KqjcfOUzEBtgfYv xwRgcfig40931Lyv5O/opFkImZzccf79YIogJfyYSz1iWS3/PIvcmRCt+HBeuJzXMKrL UEeeFv8ceN7lMSgnfogf+McUCys+ffiDyImZ/lPxc/4Jb06uLgEtik/x5/NuYYKAwPuc oSSQIJI8WaMSAC1PLN3tme7G9jhhF74mHDB3sD2Tmb0hD9UAK8fVOpg74YQ46fKtOONP mkcZlxiZ5nSZR1Q5/Xqkb8OH1SPUgbQbJGcONewY6be9JrzY6piLu3yst+rdpcKJaazx WolA== X-Gm-Message-State: AGRZ1gKp3U8ZuIWWxkaTCeeKP5esNKT1/LVTu74xvz/HkUUOZjVS5AFl ChW5gEUqJYvfTGoOXJh2ydLeCg== X-Google-Smtp-Source: AJdET5fYanZQ7BYvPpu3r12v1ej0lvvuWKhBpE2lAh6DXHLSBoR99vZwUY7GZuF/A7tnv/m3QI+jTg== X-Received: by 2002:adf:9287:: with SMTP id 7-v6mr5266066wrn.3.1542117192506; Tue, 13 Nov 2018 05:53:12 -0800 (PST) Received: from localhost.localdomain.com (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id t187-v6sm10342609wmt.45.2018.11.13.05.53.11 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 13 Nov 2018 05:53:11 -0800 (PST) X-EEMSG-check-009: 444-444 From: Ondrej Mosnacek To: selinux@vger.kernel.org, Paul Moore Date: Tue, 13 Nov 2018 14:52:55 +0100 Message-Id: <20181113135255.26045-4-omosnace@redhat.com> X-Mailer: git-send-email 2.17.2 In-Reply-To: <20181113135255.26045-1-omosnace@redhat.com> References: <20181113135255.26045-1-omosnace@redhat.com> Subject: [RFC PATCH 3/3] selinux: overhaul sidtab to fix bug and improve performance X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: Stephen Smalley , selinux@tycho.nsa.gov MIME-Version: 1.0 Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP Before this patch, during a policy reload the sidtab would become frozen and trying to map a new context to SID would be unable to add a new entry to sidtab and fail with -ENOMEM. Such failures are usually propagated into userspace, which has no way of distignuishing them from actual allocation failures and thus doesn't handle them gracefully. Such situation can be triggered e.g. by the following reproducer: while true; do load_policy; echo -n .; sleep 0.1; done & for (( i = 0; i < 1024; i++ )); do runcon -l s0:c$i echo -n x || break # or: # chcon -l s0:c$i || break done This patch overhauls the sidtab so it doesn't need to be frozen during policy reload, thus solving the above problem. The new SID table leverages the fact that SIDs are allocated sequentially and are never invalidated and stores them in linear buckets indexed by a tree structure. This brings several advantages: 1. Fast SID -> context lookup - this lookup can now be done in logarithmic time complexity (usually in less than 4 array lookups) and can still be done safely without locking. 2. No need to re-search the whole table on reverse lookup miss - after acquiring the spinlock only the newly added entries need to be searched, which means that reverse lookups that end up inserting a new entry are now about twice as fast. 3. No need to freeze sidtab during policy reload - it is now possible to handle insertion of new entries even during sidtab conversion. The tree structure of the new sidtab is able to grow automatically to up to about 2^31 entries (at which point it should not have more than about 4 tree levels). The old sidtab had a theoretical capacity of almost 2^32 entries, but half of that is still more than enough since by that point the reverse table lookups would become unusably slow anyway... The number of entries per tree node is selected automatically so that each node fits into a single page, which should be the easiest size for kmalloc() to handle. Note that currently the new implementation does not have a cache for recent reverse lookups as the old one had. Since repeated lookups are quite likely with sidtab, it is an important optimization and I will try to add it before submitting a final version. Tested by selinux-testsuite and thoroughly tortured by this simple stress test: ``` function rand_cat() { echo $(( $RANDOM % 1024 )) } function do_work() { while true; do echo -n "system_u:system_r:kernel_t:s0:c$(rand_cat),c$(rand_cat)" \ >/sys/fs/selinux/context 2>/dev/null || true done } do_work >/dev/null & do_work >/dev/null & do_work >/dev/null & while load_policy; do echo -n .; sleep 0.1; done kill %1 kill %2 kill %3 ``` Reported-by: Orion Poplawski Reported-by: Li Kun Link: https://github.com/SELinuxProject/selinux-kernel/issues/38 Signed-off-by: Ondrej Mosnacek --- security/selinux/ss/mls.c | 23 +- security/selinux/ss/mls.h | 3 +- security/selinux/ss/services.c | 90 +++--- security/selinux/ss/sidtab.c | 514 +++++++++++++++++++-------------- security/selinux/ss/sidtab.h | 75 +++-- 5 files changed, 391 insertions(+), 314 deletions(-) diff --git a/security/selinux/ss/mls.c b/security/selinux/ss/mls.c index 2fe459df3c85..267ae4f9be79 100644 --- a/security/selinux/ss/mls.c +++ b/security/selinux/ss/mls.c @@ -436,16 +436,17 @@ int mls_setup_user_range(struct policydb *p, /* * Convert the MLS fields in the security context - * structure `c' from the values specified in the - * policy `oldp' to the values specified in the policy `newp'. + * structure `oldc' from the values specified in the + * policy `oldp' to the values specified in the policy `newp', + * storing the resulting context in `newc'. */ int mls_convert_context(struct policydb *oldp, struct policydb *newp, - struct context *c) + struct context *oldc, + struct context *newc) { struct level_datum *levdatum; struct cat_datum *catdatum; - struct ebitmap bitmap; struct ebitmap_node *node; int l, i; @@ -455,28 +456,24 @@ int mls_convert_context(struct policydb *oldp, for (l = 0; l < 2; l++) { levdatum = hashtab_search(newp->p_levels.table, sym_name(oldp, SYM_LEVELS, - c->range.level[l].sens - 1)); + oldc->range.level[l].sens - 1)); if (!levdatum) return -EINVAL; - c->range.level[l].sens = levdatum->level->sens; + newc->range.level[l].sens = levdatum->level->sens; - ebitmap_init(&bitmap); - ebitmap_for_each_positive_bit(&c->range.level[l].cat, node, i) { + ebitmap_for_each_positive_bit(&oldc->range.level[l].cat, node, i) { int rc; catdatum = hashtab_search(newp->p_cats.table, sym_name(oldp, SYM_CATS, i)); if (!catdatum) return -EINVAL; - rc = ebitmap_set_bit(&bitmap, catdatum->value - 1, 1); + rc = ebitmap_set_bit(&newc->range.level[l].cat, + catdatum->value - 1, 1); if (rc) return rc; - - cond_resched(); } - ebitmap_destroy(&c->range.level[l].cat); - c->range.level[l].cat = bitmap; } return 0; diff --git a/security/selinux/ss/mls.h b/security/selinux/ss/mls.h index 67093647576d..7954b1e60b64 100644 --- a/security/selinux/ss/mls.h +++ b/security/selinux/ss/mls.h @@ -46,7 +46,8 @@ int mls_range_set(struct context *context, struct mls_range *range); int mls_convert_context(struct policydb *oldp, struct policydb *newp, - struct context *context); + struct context *oldc, + struct context *newc); int mls_compute_sid(struct policydb *p, struct context *scontext, diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 30170d4c567a..3c5887838e12 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -1907,19 +1907,16 @@ struct convert_context_args { /* * Convert the values in the security context - * structure `c' from the values specified + * structure `oldc' from the values specified * in the policy `p->oldp' to the values specified - * in the policy `p->newp'. Verify that the - * context is valid under the new policy. + * in the policy `p->newp', storing the new context + * in `newc'. Verify that the context is valid + * under the new policy. */ -static int convert_context(u32 key, - struct context *c, - void *p) +static int convert_context(struct context *oldc, struct context *newc, void *p) { struct convert_context_args *args; - struct context oldc; struct ocontext *oc; - struct mls_range *range; struct role_datum *role; struct type_datum *typdatum; struct user_datum *usrdatum; @@ -1929,23 +1926,18 @@ static int convert_context(u32 key, args = p; - if (c->str) { - struct context ctx; - + if (oldc->str) { rc = -ENOMEM; - s = kstrdup(c->str, GFP_KERNEL); + s = kstrdup(oldc->str, GFP_KERNEL); if (!s) goto out; rc = string_to_context_struct(args->newp, NULL, s, - &ctx, SECSID_NULL); + newc, SECSID_NULL); kfree(s); if (!rc) { pr_info("SELinux: Context %s became valid (mapped).\n", - c->str); - /* Replace string with mapped representation. */ - kfree(c->str); - memcpy(c, &ctx, sizeof(*c)); + oldc->str); goto out; } else if (rc == -EINVAL) { /* Retain string representation for later mapping. */ @@ -1954,51 +1946,42 @@ static int convert_context(u32 key, } else { /* Other error condition, e.g. ENOMEM. */ pr_err("SELinux: Unable to map context %s, rc = %d.\n", - c->str, -rc); + oldc->str, -rc); goto out; } } - rc = context_cpy(&oldc, c); - if (rc) - goto out; + context_init(newc); /* Convert the user. */ rc = -EINVAL; usrdatum = hashtab_search(args->newp->p_users.table, - sym_name(args->oldp, SYM_USERS, c->user - 1)); + sym_name(args->oldp, SYM_USERS, oldc->user - 1)); if (!usrdatum) goto bad; - c->user = usrdatum->value; + newc->user = usrdatum->value; /* Convert the role. */ rc = -EINVAL; role = hashtab_search(args->newp->p_roles.table, - sym_name(args->oldp, SYM_ROLES, c->role - 1)); + sym_name(args->oldp, SYM_ROLES, oldc->role - 1)); if (!role) goto bad; - c->role = role->value; + newc->role = role->value; /* Convert the type. */ rc = -EINVAL; typdatum = hashtab_search(args->newp->p_types.table, - sym_name(args->oldp, SYM_TYPES, c->type - 1)); + sym_name(args->oldp, SYM_TYPES, oldc->type - 1)); if (!typdatum) goto bad; - c->type = typdatum->value; + newc->type = typdatum->value; /* Convert the MLS fields if dealing with MLS policies */ if (args->oldp->mls_enabled && args->newp->mls_enabled) { - rc = mls_convert_context(args->oldp, args->newp, c); + rc = mls_convert_context(args->oldp, args->newp, oldc, newc); if (rc) goto bad; - } else if (args->oldp->mls_enabled && !args->newp->mls_enabled) { - /* - * Switching between MLS and non-MLS policy: - * free any storage used by the MLS fields in the - * context for all existing entries in the sidtab. - */ - mls_context_destroy(c); } else if (!args->oldp->mls_enabled && args->newp->mls_enabled) { /* * Switching between non-MLS and MLS policy: @@ -2016,36 +1999,31 @@ static int convert_context(u32 key, " the initial SIDs list\n"); goto bad; } - range = &oc->context[0].range; - rc = mls_range_set(c, range); + rc = mls_range_set(newc, &oc->context[0].range); if (rc) goto bad; } /* Check the validity of the new context. */ - if (!policydb_context_isvalid(args->newp, c)) { - rc = convert_context_handle_invalid_context(args->state, - &oldc); + if (!policydb_context_isvalid(args->newp, newc)) { + rc = convert_context_handle_invalid_context(args->state, oldc); if (rc) goto bad; } - context_destroy(&oldc); - rc = 0; out: return rc; bad: /* Map old representation to string and save it. */ - rc = context_struct_to_string(args->oldp, &oldc, &s, &len); + rc = context_struct_to_string(args->oldp, oldc, &s, &len); if (rc) return rc; - context_destroy(&oldc); - context_destroy(c); - c->str = s; - c->len = len; + context_destroy(newc); + newc->str = s; + newc->len = len; pr_info("SELinux: Context %s became invalid (unmapped).\n", - c->str); + newc->str); rc = 0; goto out; } @@ -2091,6 +2069,7 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len) struct policydb *oldpolicydb, *newpolicydb; struct selinux_mapping *oldmapping; struct selinux_map newmap; + struct sidtab_convert_params convert_params; struct convert_context_args args; u32 seqno; int rc = 0; @@ -2147,12 +2126,6 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len) goto out; } - oldsidtab = state->ss->sidtab; - -#if 0 - sidtab_hash_eval(oldsidtab, "sids"); -#endif - rc = policydb_read(newpolicydb, fp); if (rc) { kfree(newsidtab); @@ -2184,6 +2157,8 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len) goto err; } + oldsidtab = state->ss->sidtab; + /* * Convert the internal representations of contexts * in the new SID table. @@ -2191,7 +2166,12 @@ int security_load_policy(struct selinux_state *state, void *data, size_t len) args.state = state; args.oldp = policydb; args.newp = newpolicydb; - rc = sidtab_convert(oldsidtab, newsidtab, convert_context, &args); + + convert_params.func = convert_context; + convert_params.args = &args; + convert_params.target = newsidtab; + + rc = sidtab_convert(oldsidtab, &convert_params); if (rc) { pr_err("SELinux: unable to convert the internal" " representation of contexts in the new SID" diff --git a/security/selinux/ss/sidtab.c b/security/selinux/ss/sidtab.c index 049ac1e6fd06..7331fb47be6e 100644 --- a/security/selinux/ss/sidtab.c +++ b/security/selinux/ss/sidtab.c @@ -2,113 +2,131 @@ /* * Implementation of the SID table type. * - * Author : Stephen Smalley, + * Original author: Stephen Smalley, + * Author: Ondrej Mosnacek, + * + * Copyright (C) 2018 Red Hat, Inc. */ +#include #include #include +#include #include -#include +#include #include "flask.h" #include "security.h" #include "sidtab.h" -#define SIDTAB_HASH(sid) \ -(sid & SIDTAB_HASH_MASK) - int sidtab_init(struct sidtab *s) { - int i; + u32 i; - s->htable = kmalloc_array(SIDTAB_SIZE, sizeof(*s->htable), GFP_ATOMIC); - if (!s->htable) - return -ENOMEM; + memset(s->roots, 0, sizeof(s->roots)); for (i = 0; i <= SECINITSID_NUM; i++) s->isids[i].set = 0; - for (i = 0; i < SIDTAB_SIZE; i++) - s->htable[i] = NULL; + atomic_set(&s->count, 0); - for (i = 0; i < SIDTAB_CACHE_LEN; i++) - s->cache[i] = NULL; + s->convert = NULL; - s->nel = 0; - s->next_sid = 0; - s->shutdown = 0; spin_lock_init(&s->lock); return 0; } -static int sidtab_insert(struct sidtab *s, u32 sid, struct context *context) +int sidtab_set_initial(struct sidtab *s, u32 sid, struct context *context) { - int hvalue; - struct sidtab_node *prev, *cur, *newnode; - - if (!s) - return -ENOMEM; - - hvalue = SIDTAB_HASH(sid); - prev = NULL; - cur = s->htable[hvalue]; - while (cur && sid > cur->sid) { - prev = cur; - cur = cur->next; - } - - if (cur && sid == cur->sid) - return -EEXIST; + struct sidtab_isid_entry *entry = &s->isids[sid]; + int rc = context_cpy(&entry->context, context); + if (rc) + return rc; - newnode = kmalloc(sizeof(*newnode), GFP_ATOMIC); - if (!newnode) - return -ENOMEM; + entry->set = 1; + return 0; +} - newnode->sid = sid; - if (context_cpy(&newnode->context, context)) { - kfree(newnode); - return -ENOMEM; +static u32 sidtab_level_from_count(u32 count) +{ + u32 capacity = SIDTAB_LEAF_ENTRIES; + u32 level = 0; + while (count > capacity) { + capacity <<= SIDTAB_INNER_SHIFT; + ++level; } + return level; +} - if (prev) { - newnode->next = prev->next; - wmb(); - prev->next = newnode; - } else { - newnode->next = s->htable[hvalue]; - wmb(); - s->htable[hvalue] = newnode; +static int sidtab_alloc_roots(struct sidtab *s, u32 level) +{ + u32 l; + if (!s->roots[0].ptr_leaf) { + s->roots[0].ptr_leaf = kzalloc(SIDTAB_NODE_ALLOC_SIZE, + GFP_ATOMIC); + if (!s->roots[0].ptr_leaf) + return -ENOMEM; } - - s->nel++; - if (sid >= s->next_sid) - s->next_sid = sid + 1; + for (l = 1; l <= level; ++l) + if (!s->roots[l].ptr_inner) { + s->roots[l].ptr_inner = kzalloc(SIDTAB_NODE_ALLOC_SIZE, + GFP_ATOMIC); + if (!s->roots[l].ptr_inner) + return -ENOMEM; + s->roots[l].ptr_inner->entries[0] = s->roots[l - 1]; + } return 0; } -int sidtab_set_initial(struct sidtab *s, u32 sid, struct context *context) +static struct context *sidtab_do_lookup(struct sidtab *s, u32 index, int alloc) { - struct sidtab_isid_entry *entry = &s->isids[sid]; - int rc = context_cpy(&entry->context, context); - if (rc) - return rc; + union sidtab_entry_inner *entry; + u32 level, capacity_shift, leaf_index = index / SIDTAB_LEAF_ENTRIES; - entry->set = 1; - return 0; + /* find the level of the subtree we need */ + level = sidtab_level_from_count(index + 1); + capacity_shift = level * SIDTAB_INNER_SHIFT; + + /* allocate roots if needed */ + if (alloc && sidtab_alloc_roots(s, level) != 0) + return NULL; + + /* lookup inside the subtree */ + entry = &s->roots[level]; + while (level != 0) { + capacity_shift -= SIDTAB_INNER_SHIFT; + --level; + + entry = &entry->ptr_inner->entries[leaf_index >> capacity_shift]; + leaf_index &= ((u32)1 << capacity_shift) - 1; + + if (!entry->ptr_inner) { + if (alloc) + entry->ptr_inner = kzalloc(SIDTAB_NODE_ALLOC_SIZE, + GFP_ATOMIC); + if (!entry->ptr_inner) + return NULL; + } + } + if (!entry->ptr_leaf) { + if (alloc) + entry->ptr_leaf = kzalloc(SIDTAB_NODE_ALLOC_SIZE, + GFP_ATOMIC); + if (!entry->ptr_leaf) + return NULL; + } + return &entry->ptr_leaf->entries[index % SIDTAB_LEAF_ENTRIES].context; } -static struct context *sidtab_lookup(struct sidtab *s, u32 sid) +static struct context *sidtab_lookup(struct sidtab *s, u32 index) { - int hvalue; - struct sidtab_node *cur; + u32 count = (u32)atomic_read(&s->count); - hvalue = SIDTAB_HASH(sid); - cur = s->htable[hvalue]; - while (cur && sid > cur->sid) - cur = cur->next; - - if (!cur || sid != cur->sid) + if (index >= count) return NULL; - return &cur->context; + /* read entries after reading count */ + smp_rmb(); + + return sidtab_do_lookup(s, index, 0); } static struct context *sidtab_search_core(struct sidtab *s, u32 sid, int force) @@ -116,9 +134,6 @@ static struct context *sidtab_search_core(struct sidtab *s, u32 sid, int force) struct context *context; struct sidtab_isid_entry *entry; - if (!s) - return NULL; - if (sid > SECINITSID_NUM) { u32 index = sid - (SECINITSID_NUM + 1); context = sidtab_lookup(s, index); @@ -143,140 +158,122 @@ struct context *sidtab_search_force(struct sidtab *s, u32 sid) return sidtab_search_core(s, sid, 1); } -static int sidtab_map(struct sidtab *s, - int (*apply) (u32 sid, - struct context *context, - void *args), - void *args) +static int sidtab_find_context(union sidtab_entry_inner entry, + u32 *pos, u32 count, u32 level, + struct context *context, u32 *index) { - int i, rc = 0; - struct sidtab_node *cur; - - if (!s) - goto out; + int rc; + u32 i; - for (i = 0; i < SIDTAB_SIZE; i++) { - cur = s->htable[i]; - while (cur) { - rc = apply(cur->sid, &cur->context, args); - if (rc) - goto out; - cur = cur->next; + if (level != 0) { + struct sidtab_node_inner *node = entry.ptr_inner; + i = 0; + while (i < SIDTAB_INNER_ENTRIES && *pos < count) { + rc = sidtab_find_context(node->entries[i], + pos, count, level - 1, + context, index); + if (rc == 0) + return 0; + i++; + } + } else { + struct sidtab_node_leaf *node = entry.ptr_leaf; + i = 0; + while (i < SIDTAB_LEAF_ENTRIES && *pos < count) { + if (context_cmp(&node->entries[i].context, context)) { + *index = *pos; + return 0; + } + (*pos)++; + i++; } } -out: - return rc; -} - -/* Clone the SID into the new SID table. */ -static int clone_sid(u32 sid, struct context *context, void *arg) -{ - struct sidtab *s = arg; - return sidtab_insert(s, sid, context); + return -ENOENT; } -int sidtab_convert(struct sidtab *s, struct sidtab *news, - int (*convert) (u32 sid, - struct context *context, - void *args), - void *args) +static int sidtab_reverse_lookup(struct sidtab *s, struct context *context, + u32 *index) { unsigned long flags; + u32 count = (u32)atomic_read(&s->count); + u32 count_locked, level, pos; + struct sidtab_convert_params *convert; + struct context *dst, *dst_convert; int rc; - spin_lock_irqsave(&s->lock, flags); - s->shutdown = 1; - spin_unlock_irqrestore(&s->lock, flags); + level = sidtab_level_from_count(count); - rc = sidtab_map(s, clone_sid, news); - if (rc) - return rc; + /* read entries after reading count */ + smp_rmb(); - return sidtab_map(news, convert, args); -} + pos = 0; + rc = sidtab_find_context(s->roots[level], &pos, count, level, + context, index); + if (rc == 0) + return 0; -static void sidtab_update_cache(struct sidtab *s, struct sidtab_node *n, int loc) -{ - BUG_ON(loc >= SIDTAB_CACHE_LEN); + /* lock-free search failed: lock, re-search, and insert if not found */ + spin_lock_irqsave(&s->lock, flags); - while (loc > 0) { - s->cache[loc] = s->cache[loc - 1]; - loc--; - } - s->cache[0] = n; -} + convert = s->convert; + count_locked = (u32)atomic_read(&s->count); + level = sidtab_level_from_count(count_locked); -static inline int sidtab_search_context(struct sidtab *s, - struct context *context, u32 *sid) -{ - int i; - struct sidtab_node *cur; - - for (i = 0; i < SIDTAB_SIZE; i++) { - cur = s->htable[i]; - while (cur) { - if (context_cmp(&cur->context, context)) { - sidtab_update_cache(s, cur, SIDTAB_CACHE_LEN - 1); - *sid = cur->sid; - return 0; - } - cur = cur->next; + /* if count has changed before we acquired the lock, then catch up */ + while (count < count_locked) { + if (context_cmp(sidtab_do_lookup(s, count, 0), context)) { + rc = 0; + *index = count; + goto out_unlock; } + ++count; } - return -ENOENT; -} -static inline int sidtab_search_cache(struct sidtab *s, struct context *context, - u32 *sid) -{ - int i; - struct sidtab_node *node; - - for (i = 0; i < SIDTAB_CACHE_LEN; i++) { - node = s->cache[i]; - if (unlikely(!node)) - return -ENOENT; - if (context_cmp(&node->context, context)) { - sidtab_update_cache(s, node, i); - *sid = node->sid; - return 0; - } - } - return -ENOENT; -} + /* insert context into new entry */ + rc = -ENOMEM; + dst = sidtab_do_lookup(s, count, 1); + if (!dst) + goto out_unlock; -static int sidtab_reverse_lookup(struct sidtab *s, struct context *context, - u32 *sid) -{ - int ret; - unsigned long flags; + rc = context_cpy(dst, context); + if (rc) + goto out_unlock; + + /* if we are building a new sidtab, we need to convert the context + * and insert it also there */ + if (convert) { + rc = -ENOMEM; + dst_convert = sidtab_do_lookup(convert->target, count, 1); + if (!dst_convert) { + context_destroy(dst); + goto out_unlock; + } - ret = sidtab_search_cache(s, context, sid); - if (ret) - ret = sidtab_search_context(s, context, sid); - if (ret) { - spin_lock_irqsave(&s->lock, flags); - /* Rescan now that we hold the lock. */ - ret = sidtab_search_context(s, context, sid); - if (!ret) - goto unlock_out; - /* No SID exists for the context. Allocate a new one. */ - if (s->next_sid == (UINT_MAX - SECINITSID_NUM - 1) || s->shutdown) { - ret = -ENOMEM; - goto unlock_out; + rc = convert->func(context, dst_convert, convert->args); + if (rc) { + context_destroy(dst); + goto out_unlock; } - *sid = s->next_sid++; - if (context->len) - pr_info("SELinux: Context %s is not valid (left unmapped).\n", - context->str); - ret = sidtab_insert(s, *sid, context); - if (ret) - s->next_sid--; -unlock_out: - spin_unlock_irqrestore(&s->lock, flags); + + /* at this point we know the insert won't fail */ + atomic_set(&convert->target->count, count + 1); } - return ret; + if (context->len) + pr_info("SELinux: Context %s is not valid (left unmapped).\n", + context->str); + + *index = count; + + /* write entries before writing new count */ + smp_wmb(); + + atomic_set(&s->count, count + 1); + + rc = 0; +out_unlock: + spin_unlock_irqrestore(&s->lock, flags); + return rc; } int sidtab_context_to_sid(struct sidtab *s, struct context *context, u32 *sid) @@ -299,58 +296,129 @@ int sidtab_context_to_sid(struct sidtab *s, struct context *context, u32 *sid) return 0; } -void sidtab_hash_eval(struct sidtab *h, char *tag) +static int sidtab_convert_tree(union sidtab_entry_inner *edst, + union sidtab_entry_inner *esrc, + u32 *pos, u32 count, u32 level, + struct sidtab_convert_params *convert) { - int i, chain_len, slots_used, max_chain_len; - struct sidtab_node *cur; - - slots_used = 0; - max_chain_len = 0; - for (i = 0; i < SIDTAB_SIZE; i++) { - cur = h->htable[i]; - if (cur) { - slots_used++; - chain_len = 0; - while (cur) { - chain_len++; - cur = cur->next; - } + int rc; + u32 i; - if (chain_len > max_chain_len) - max_chain_len = chain_len; + if (level != 0) { + if (!edst->ptr_inner) { + edst->ptr_inner = kzalloc(SIDTAB_NODE_ALLOC_SIZE, GFP_KERNEL); + if (!edst->ptr_inner) + return -ENOMEM; + } + i = 0; + while (i < SIDTAB_INNER_ENTRIES && *pos < count) { + rc = sidtab_convert_tree(&edst->ptr_inner->entries[i], + &esrc->ptr_inner->entries[i], + pos, count, level - 1, convert); + if (rc) + return rc; + i++; } + } else { + if (!edst->ptr_leaf) { + edst->ptr_leaf = kzalloc(SIDTAB_NODE_ALLOC_SIZE, GFP_KERNEL); + if (!edst->ptr_leaf) + return -ENOMEM; + } + i = 0; + while (i < SIDTAB_LEAF_ENTRIES && *pos < count) { + rc = convert->func(&esrc->ptr_leaf->entries[i].context, + &edst->ptr_leaf->entries[i].context, + convert->args); + if (rc) + return rc; + (*pos)++; + i++; + } + cond_resched(); + } + return 0; +} + +int sidtab_convert(struct sidtab *s, struct sidtab_convert_params *params) +{ + unsigned long flags; + u32 count, level, pos; + int rc; + + spin_lock_irqsave(&s->lock, flags); + + /* concurrent policy loads are not allowed */ + if (s->convert) { + spin_unlock_irqrestore(&s->lock, flags); + return -EBUSY; } - pr_debug("%s: %d entries and %d/%d buckets used, longest " - "chain length %d\n", tag, h->nel, slots_used, SIDTAB_SIZE, - max_chain_len); + count = (u32)atomic_read(&s->count); + level = sidtab_level_from_count(count); + + /* allocate last leaf in the new sidtab (to avoid race with live convert) */ + rc = sidtab_do_lookup(params->target, count - 1, 1) ? 0 : -ENOMEM; + if (rc) { + spin_unlock_irqrestore(&s->lock, flags); + return rc; + } + + /* set count in case no new entries are added during conversion */ + atomic_set(¶ms->target->count, count); + + /* enable live convert of new entries */ + s->convert = params; + + /* we can safely do the rest of the conversion outside the lock */ + spin_unlock_irqrestore(&s->lock, flags); + + pr_info("SELinux: Converting %u SID table entries...\n", count); + + /* convert all entries not covered by live convert */ + pos = 0; + rc = sidtab_convert_tree(¶ms->target->roots[level], &s->roots[level], + &pos, count, level, params); + if (rc) { + /* we need to keep the old table - disable live convert */ + spin_lock_irqsave(&s->lock, flags); + s->convert = NULL; + spin_unlock_irqrestore(&s->lock, flags); + } + return rc; } -void sidtab_destroy(struct sidtab *s) +static void sidtab_destroy_tree(union sidtab_entry_inner entry, u32 level) { - int i; - struct sidtab_node *cur, *temp; + u32 i; + if (level != 0) { + struct sidtab_node_inner *node = entry.ptr_inner; + if (node) { + union sidtab_entry_inner *entries = node->entries; + for (i = 0; i < SIDTAB_INNER_ENTRIES; i++) + sidtab_destroy_tree(entries[i], level - 1); + kfree(node); + } + } else { + struct sidtab_node_leaf *node = entry.ptr_leaf; + if (node) { + struct sidtab_entry_leaf *entries = node->entries; + for (i = 0; i < SIDTAB_LEAF_ENTRIES; i++) + context_destroy(&entries[i].context); + kfree(node); + } + } +} - if (!s) - return; +void sidtab_destroy(struct sidtab *s) +{ + u32 i, level; for (i = 0; i <= SECINITSID_NUM; i++) if (s->isids[i].set) context_destroy(&s->isids[i].context); - - for (i = 0; i < SIDTAB_SIZE; i++) { - cur = s->htable[i]; - while (cur) { - temp = cur; - cur = cur->next; - context_destroy(&temp->context); - kfree(temp); - } - s->htable[i] = NULL; - } - kfree(s->htable); - s->htable = NULL; - s->nel = 0; - s->next_sid = 1; + level = SIDTAB_MAX_LEVEL; + while (level && !s->roots[level].ptr_inner) --level; + sidtab_destroy_tree(s->roots[level], level); } diff --git a/security/selinux/ss/sidtab.h b/security/selinux/ss/sidtab.h index e181db3589bc..ec0517f925a0 100644 --- a/security/selinux/ss/sidtab.h +++ b/security/selinux/ss/sidtab.h @@ -1,39 +1,75 @@ /* SPDX-License-Identifier: GPL-2.0 */ /* - * A security identifier table (sidtab) is a hash table + * A security identifier table (sidtab) is a lookup table * of security context structures indexed by SID value. * - * Author : Stephen Smalley, + * Original author: Stephen Smalley, + * Author: Ondrej Mosnacek, + * + * Copyright (C) 2018 Red Hat, Inc. */ #ifndef _SS_SIDTAB_H_ #define _SS_SIDTAB_H_ +#include +#include + #include "context.h" -struct sidtab_node { - u32 sid; /* security identifier */ - struct context context; /* security context structure */ - struct sidtab_node *next; +struct sidtab_entry_leaf { + struct context context; +}; + +struct sidtab_node_inner; +struct sidtab_node_leaf; + +union sidtab_entry_inner { + struct sidtab_node_inner *ptr_inner; + struct sidtab_node_leaf *ptr_leaf; }; -#define SIDTAB_HASH_BITS 7 -#define SIDTAB_HASH_BUCKETS (1 << SIDTAB_HASH_BITS) -#define SIDTAB_HASH_MASK (SIDTAB_HASH_BUCKETS-1) +/* align node size to page boundary */ +#define SIDTAB_NODE_ALLOC_SHIFT PAGE_SHIFT +#define SIDTAB_NODE_ALLOC_SIZE PAGE_SIZE + +#define size_to_shift(size) ((size) == 1 ? 1 : (const_ilog2((size) - 1) + 1)) + +#define SIDTAB_INNER_SHIFT \ + (SIDTAB_NODE_ALLOC_SHIFT - size_to_shift(sizeof(union sidtab_entry_inner))) -#define SIDTAB_SIZE SIDTAB_HASH_BUCKETS +#define SIDTAB_LEAF_ENTRIES (PAGE_SIZE / sizeof(struct sidtab_entry_leaf)) +#define SIDTAB_INNER_ENTRIES ((size_t)1 << SIDTAB_INNER_SHIFT) + +#define SIDTAB_MAX_BITS 31 /* limited to INT_MAX due to atomic_t range */ +#define SIDTAB_MAX (((u32)1 << SIDTAB_MAX_BITS) - 1) +/* ensure enough tree levels for SIDTAB_MAX entries */ +#define SIDTAB_MAX_LEVEL \ + DIV_ROUND_UP(SIDTAB_MAX_BITS - size_to_shift(SIDTAB_LEAF_ENTRIES), \ + SIDTAB_INNER_SHIFT) + +struct sidtab_node_leaf { + struct sidtab_entry_leaf entries[SIDTAB_LEAF_ENTRIES]; +}; + +struct sidtab_node_inner { + union sidtab_entry_inner entries[SIDTAB_INNER_ENTRIES]; +}; struct sidtab_isid_entry { int set; struct context context; }; +struct sidtab_convert_params { + int (*func)(struct context *oldc, struct context *newc, void *args); + void *args; + struct sidtab *target; +}; + struct sidtab { - struct sidtab_node **htable; - unsigned int nel; /* number of elements */ - unsigned int next_sid; /* next SID to allocate */ - unsigned char shutdown; -#define SIDTAB_CACHE_LEN 3 - struct sidtab_node *cache[SIDTAB_CACHE_LEN]; + union sidtab_entry_inner roots[SIDTAB_MAX_LEVEL + 1]; + atomic_t count; + struct sidtab_convert_params *convert; spinlock_t lock; struct sidtab_isid_entry isids[SECINITSID_NUM + 1]; @@ -44,15 +80,10 @@ int sidtab_set_initial(struct sidtab *s, u32 sid, struct context *context); struct context *sidtab_search(struct sidtab *s, u32 sid); struct context *sidtab_search_force(struct sidtab *s, u32 sid); -int sidtab_convert(struct sidtab *s, struct sidtab *news, - int (*apply) (u32 sid, - struct context *context, - void *args), - void *args); +int sidtab_convert(struct sidtab *s, struct sidtab_convert_params *params); int sidtab_context_to_sid(struct sidtab *s, struct context *context, u32 *sid); -void sidtab_hash_eval(struct sidtab *h, char *tag); void sidtab_destroy(struct sidtab *s); #endif /* _SS_SIDTAB_H_ */