Skip to content

Commit

Permalink
NetLabel: better error handling involving mls_export_cat()
Browse files Browse the repository at this point in the history
Upon inspection it looked like the error handling for mls_export_cat() was
rather poor.  This patch addresses this by NULL'ing out kfree()'d pointers
before returning and checking the return value of the function everywhere
it is called.

Signed-off-by: Paul Moore <[email protected]>
Signed-off-by: James Morris <[email protected]>
  • Loading branch information
pcmoore authored and David S. Miller committed Oct 16, 2006
1 parent 044a68e commit bf0edf3
Show file tree
Hide file tree
Showing 3 changed files with 30 additions and 13 deletions.
8 changes: 6 additions & 2 deletions security/selinux/ss/ebitmap.c
Original file line number Diff line number Diff line change
Expand Up @@ -93,11 +93,15 @@ int ebitmap_export(const struct ebitmap *src,
size_t bitmap_byte;
unsigned char bitmask;

if (src->highbit == 0) {
*dst = NULL;
*dst_len = 0;
return 0;
}

bitmap_len = src->highbit / 8;
if (src->highbit % 7)
bitmap_len += 1;
if (bitmap_len == 0)
return -EINVAL;

bitmap = kzalloc((bitmap_len & ~(sizeof(MAPTYPE) - 1)) +
sizeof(MAPTYPE),
Expand Down
17 changes: 14 additions & 3 deletions security/selinux/ss/mls.c
Original file line number Diff line number Diff line change
Expand Up @@ -640,8 +640,13 @@ int mls_export_cat(const struct context *context,
{
int rc = -EPERM;

if (!selinux_mls_enabled)
if (!selinux_mls_enabled) {
*low = NULL;
*low_len = 0;
*high = NULL;
*high_len = 0;
return 0;
}

if (low != NULL) {
rc = ebitmap_export(&context->range.level[0].cat,
Expand All @@ -661,10 +666,16 @@ int mls_export_cat(const struct context *context,
return 0;

export_cat_failure:
if (low != NULL)
if (low != NULL) {
kfree(*low);
if (high != NULL)
*low = NULL;
*low_len = 0;
}
if (high != NULL) {
kfree(*high);
*high = NULL;
*high_len = 0;
}
return rc;
}

Expand Down
18 changes: 10 additions & 8 deletions security/selinux/ss/services.c
Original file line number Diff line number Diff line change
Expand Up @@ -2399,31 +2399,33 @@ static int selinux_netlbl_socket_setsid(struct socket *sock, u32 sid)
if (!ss_initialized)
return 0;

netlbl_secattr_init(&secattr);

POLICY_RDLOCK;

ctx = sidtab_search(&sidtab, sid);
if (ctx == NULL)
goto netlbl_socket_setsid_return;

netlbl_secattr_init(&secattr);
secattr.domain = kstrdup(policydb.p_type_val_to_name[ctx->type - 1],
GFP_ATOMIC);
mls_export_lvl(ctx, &secattr.mls_lvl, NULL);
secattr.mls_lvl_vld = 1;
mls_export_cat(ctx,
&secattr.mls_cat,
&secattr.mls_cat_len,
NULL,
NULL);
rc = mls_export_cat(ctx,
&secattr.mls_cat,
&secattr.mls_cat_len,
NULL,
NULL);
if (rc != 0)
goto netlbl_socket_setsid_return;

rc = netlbl_socket_setattr(sock, &secattr);
if (rc == 0)
sksec->nlbl_state = NLBL_LABELED;

netlbl_secattr_destroy(&secattr);

netlbl_socket_setsid_return:
POLICY_RDUNLOCK;
netlbl_secattr_destroy(&secattr);
return rc;
}

Expand Down

0 comments on commit bf0edf3

Please sign in to comment.