All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] selinux: correct locking in selinux_netlbl_socket_connect)
@ 2013-08-02 18:08 Paul Moore
       [not found] ` <20130802211929.GE10306@kroah.com>
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Paul Moore @ 2013-08-02 18:08 UTC (permalink / raw)
  To: selinux; +Cc: stable

The SELinux/NetLabel glue code has a locking bug that affects systems
with NetLabel enabled, see the kernel error message below.  This patch
corrects this problem by converting the bottom half socket lock to a
more conventional, and correct for this call-path, lock_sock() call.

 ===============================
 [ INFO: suspicious RCU usage. ]
 3.11.0-rc3+ #19 Not tainted
 -------------------------------
 net/ipv4/cipso_ipv4.c:1928 suspicious rcu_dereference_protected() usage!

 other info that might help us debug this:

 rcu_scheduler_active = 1, debug_locks = 0
 2 locks held by ping/731:
  #0:  (slock-AF_INET/1){+.-...}, at: [...] selinux_netlbl_socket_connect
  #1:  (rcu_read_lock){.+.+..}, at: [<...>] netlbl_conn_setattr

 stack backtrace:
 CPU: 1 PID: 731 Comm: ping Not tainted 3.11.0-rc3+ #19
 Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
  0000000000000001 ffff88006f659d28 ffffffff81726b6a ffff88003732c500
  ffff88006f659d58 ffffffff810e4457 ffff88006b845a00 0000000000000000
  000000000000000c ffff880075aa2f50 ffff88006f659d90 ffffffff8169bec7
 Call Trace:
  [<ffffffff81726b6a>] dump_stack+0x54/0x74
  [<ffffffff810e4457>] lockdep_rcu_suspicious+0xe7/0x120
  [<ffffffff8169bec7>] cipso_v4_sock_setattr+0x187/0x1a0
  [<ffffffff8170f317>] netlbl_conn_setattr+0x187/0x190
  [<ffffffff8170f195>] ? netlbl_conn_setattr+0x5/0x190
  [<ffffffff8131ac9e>] selinux_netlbl_socket_connect+0xae/0xc0
  [<ffffffff81303025>] selinux_socket_connect+0x135/0x170
  [<ffffffff8119d127>] ? might_fault+0x57/0xb0
  [<ffffffff812fb146>] security_socket_connect+0x16/0x20
  [<ffffffff815d3ad3>] SYSC_connect+0x73/0x130
  [<ffffffff81739a85>] ? sysret_check+0x22/0x5d
  [<ffffffff810e5e2d>] ? trace_hardirqs_on_caller+0xfd/0x1c0
  [<ffffffff81373d4e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
  [<ffffffff815d52be>] SyS_connect+0xe/0x10
  [<ffffffff81739a59>] system_call_fastpath+0x16/0x1b

Signed-off-by: Paul Moore <pmoore@redhat.com>
---
 security/selinux/netlabel.c |    6 ++----
 1 file changed, 2 insertions(+), 4 deletions(-)

diff --git a/security/selinux/netlabel.c b/security/selinux/netlabel.c
index da4b8b2..6235d05 100644
--- a/security/selinux/netlabel.c
+++ b/security/selinux/netlabel.c
@@ -442,8 +442,7 @@ int selinux_netlbl_socket_connect(struct sock *sk, struct sockaddr *addr)
 	    sksec->nlbl_state != NLBL_CONNLABELED)
 		return 0;
 
-	local_bh_disable();
-	bh_lock_sock_nested(sk);
+	lock_sock(sk);
 
 	/* connected sockets are allowed to disconnect when the address family
 	 * is set to AF_UNSPEC, if that is what is happening we want to reset
@@ -464,7 +463,6 @@ int selinux_netlbl_socket_connect(struct sock *sk, struct sockaddr *addr)
 		sksec->nlbl_state = NLBL_CONNLABELED;
 
 socket_connect_return:
-	bh_unlock_sock(sk);
-	local_bh_enable();
+	release_sock(sk);
 	return rc;
 }


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH] selinux: correct locking in selinux_netlbl_socket_connect)
       [not found] ` <20130802211929.GE10306@kroah.com>
@ 2013-08-02 21:33   ` Paul Moore
  0 siblings, 0 replies; 4+ messages in thread
From: Paul Moore @ 2013-08-02 21:33 UTC (permalink / raw)
  To: Greg KH; +Cc: selinux, stable

On Saturday, August 03, 2013 05:19:29 AM Greg KH wrote:
> <formletter>
> 
> This is not the correct way to submit patches for inclusion in the
> stable kernel tree.  Please read Documentation/stable_kernel_rules.txt
> for how to do this properly.
> 
> </formletter>

My apologies, I even know better, I just spaced and did a direct CC.

-- 
paul moore
security and virtualization @ redhat


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] selinux: correct locking in selinux_netlbl_socket_connect)
  2013-08-02 18:08 [PATCH] selinux: correct locking in selinux_netlbl_socket_connect) Paul Moore
       [not found] ` <20130802211929.GE10306@kroah.com>
@ 2013-08-05 19:43 ` Paul Moore
  2013-09-26 21:05 ` Paul Moore
  2 siblings, 0 replies; 4+ messages in thread
From: Paul Moore @ 2013-08-05 19:43 UTC (permalink / raw)
  To: selinux

On Friday, August 02, 2013 02:08:07 PM Paul Moore wrote:
> The SELinux/NetLabel glue code has a locking bug that affects systems
> with NetLabel enabled, see the kernel error message below.  This patch
> corrects this problem by converting the bottom half socket lock to a
> more conventional, and correct for this call-path, lock_sock() call.
> 
>  ===============================
>  [ INFO: suspicious RCU usage. ]
>  3.11.0-rc3+ #19 Not tainted
>  -------------------------------
>  net/ipv4/cipso_ipv4.c:1928 suspicious rcu_dereference_protected() usage!
> 
>  other info that might help us debug this:
> 
>  rcu_scheduler_active = 1, debug_locks = 0
>  2 locks held by ping/731:
>   #0:  (slock-AF_INET/1){+.-...}, at: [...] selinux_netlbl_socket_connect
>   #1:  (rcu_read_lock){.+.+..}, at: [<...>] netlbl_conn_setattr
> 
>  stack backtrace:
>  CPU: 1 PID: 731 Comm: ping Not tainted 3.11.0-rc3+ #19
>  Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
>   0000000000000001 ffff88006f659d28 ffffffff81726b6a ffff88003732c500
>   ffff88006f659d58 ffffffff810e4457 ffff88006b845a00 0000000000000000
>   000000000000000c ffff880075aa2f50 ffff88006f659d90 ffffffff8169bec7
>  Call Trace:
>   [<ffffffff81726b6a>] dump_stack+0x54/0x74
>   [<ffffffff810e4457>] lockdep_rcu_suspicious+0xe7/0x120
>   [<ffffffff8169bec7>] cipso_v4_sock_setattr+0x187/0x1a0
>   [<ffffffff8170f317>] netlbl_conn_setattr+0x187/0x190
>   [<ffffffff8170f195>] ? netlbl_conn_setattr+0x5/0x190
>   [<ffffffff8131ac9e>] selinux_netlbl_socket_connect+0xae/0xc0
>   [<ffffffff81303025>] selinux_socket_connect+0x135/0x170
>   [<ffffffff8119d127>] ? might_fault+0x57/0xb0
>   [<ffffffff812fb146>] security_socket_connect+0x16/0x20
>   [<ffffffff815d3ad3>] SYSC_connect+0x73/0x130
>   [<ffffffff81739a85>] ? sysret_check+0x22/0x5d
>   [<ffffffff810e5e2d>] ? trace_hardirqs_on_caller+0xfd/0x1c0
>   [<ffffffff81373d4e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
>   [<ffffffff815d52be>] SyS_connect+0xe/0x10
>   [<ffffffff81739a59>] system_call_fastpath+0x16/0x1b
> 
> Signed-off-by: Paul Moore <pmoore@redhat.com>
> ---
>  security/selinux/netlabel.c |    6 ++----
>  1 file changed, 2 insertions(+), 4 deletions(-)

Just a point of clarification, as a bug fix, I think this patch should be 
targeted at 3.11-rcX.

> diff --git a/security/selinux/netlabel.c b/security/selinux/netlabel.c
> index da4b8b2..6235d05 100644
> --- a/security/selinux/netlabel.c
> +++ b/security/selinux/netlabel.c
> @@ -442,8 +442,7 @@ int selinux_netlbl_socket_connect(struct sock *sk,
> struct sockaddr *addr) sksec->nlbl_state != NLBL_CONNLABELED)
>  		return 0;
> 
> -	local_bh_disable();
> -	bh_lock_sock_nested(sk);
> +	lock_sock(sk);
> 
>  	/* connected sockets are allowed to disconnect when the address family
>  	 * is set to AF_UNSPEC, if that is what is happening we want to reset
> @@ -464,7 +463,6 @@ int selinux_netlbl_socket_connect(struct sock *sk,
> struct sockaddr *addr) sksec->nlbl_state = NLBL_CONNLABELED;
> 
>  socket_connect_return:
> -	bh_unlock_sock(sk);
> -	local_bh_enable();
> +	release_sock(sk);
>  	return rc;
>  }

-- 
paul moore
security and virtualization @ redhat


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] selinux: correct locking in selinux_netlbl_socket_connect)
  2013-08-02 18:08 [PATCH] selinux: correct locking in selinux_netlbl_socket_connect) Paul Moore
       [not found] ` <20130802211929.GE10306@kroah.com>
  2013-08-05 19:43 ` Paul Moore
@ 2013-09-26 21:05 ` Paul Moore
  2 siblings, 0 replies; 4+ messages in thread
From: Paul Moore @ 2013-09-26 21:05 UTC (permalink / raw)
  To: selinux

On Friday, August 02, 2013 02:08:07 PM Paul Moore wrote:
> The SELinux/NetLabel glue code has a locking bug that affects systems
> with NetLabel enabled, see the kernel error message below.  This patch
> corrects this problem by converting the bottom half socket lock to a
> more conventional, and correct for this call-path, lock_sock() call.
> 
>  ===============================
>  [ INFO: suspicious RCU usage. ]
>  3.11.0-rc3+ #19 Not tainted
>  -------------------------------
>  net/ipv4/cipso_ipv4.c:1928 suspicious rcu_dereference_protected() usage!
> 
>  other info that might help us debug this:
> 
>  rcu_scheduler_active = 1, debug_locks = 0
>  2 locks held by ping/731:
>   #0:  (slock-AF_INET/1){+.-...}, at: [...] selinux_netlbl_socket_connect
>   #1:  (rcu_read_lock){.+.+..}, at: [<...>] netlbl_conn_setattr
> 
>  stack backtrace:
>  CPU: 1 PID: 731 Comm: ping Not tainted 3.11.0-rc3+ #19
>  Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
>   0000000000000001 ffff88006f659d28 ffffffff81726b6a ffff88003732c500
>   ffff88006f659d58 ffffffff810e4457 ffff88006b845a00 0000000000000000
>   000000000000000c ffff880075aa2f50 ffff88006f659d90 ffffffff8169bec7
>  Call Trace:
>   [<ffffffff81726b6a>] dump_stack+0x54/0x74
>   [<ffffffff810e4457>] lockdep_rcu_suspicious+0xe7/0x120
>   [<ffffffff8169bec7>] cipso_v4_sock_setattr+0x187/0x1a0
>   [<ffffffff8170f317>] netlbl_conn_setattr+0x187/0x190
>   [<ffffffff8170f195>] ? netlbl_conn_setattr+0x5/0x190
>   [<ffffffff8131ac9e>] selinux_netlbl_socket_connect+0xae/0xc0
>   [<ffffffff81303025>] selinux_socket_connect+0x135/0x170
>   [<ffffffff8119d127>] ? might_fault+0x57/0xb0
>   [<ffffffff812fb146>] security_socket_connect+0x16/0x20
>   [<ffffffff815d3ad3>] SYSC_connect+0x73/0x130
>   [<ffffffff81739a85>] ? sysret_check+0x22/0x5d
>   [<ffffffff810e5e2d>] ? trace_hardirqs_on_caller+0xfd/0x1c0
>   [<ffffffff81373d4e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
>   [<ffffffff815d52be>] SyS_connect+0xe/0x10
>   [<ffffffff81739a59>] system_call_fastpath+0x16/0x1b
> 
> Signed-off-by: Paul Moore <pmoore@redhat.com>
> ---
>  security/selinux/netlabel.c |    6 ++----
>  1 file changed, 2 insertions(+), 4 deletions(-)

FYI: I've gueued this up for 3.13.

 * git://git.infradead.org/users/pcmoore/selinux

> diff --git a/security/selinux/netlabel.c b/security/selinux/netlabel.c
> index da4b8b2..6235d05 100644
> --- a/security/selinux/netlabel.c
> +++ b/security/selinux/netlabel.c
> @@ -442,8 +442,7 @@ int selinux_netlbl_socket_connect(struct sock *sk,
> struct sockaddr *addr) sksec->nlbl_state != NLBL_CONNLABELED)
>  		return 0;
> 
> -	local_bh_disable();
> -	bh_lock_sock_nested(sk);
> +	lock_sock(sk);
> 
>  	/* connected sockets are allowed to disconnect when the address family
>  	 * is set to AF_UNSPEC, if that is what is happening we want to reset
> @@ -464,7 +463,6 @@ int selinux_netlbl_socket_connect(struct sock *sk,
> struct sockaddr *addr) sksec->nlbl_state = NLBL_CONNLABELED;
> 
>  socket_connect_return:
> -	bh_unlock_sock(sk);
> -	local_bh_enable();
> +	release_sock(sk);
>  	return rc;
>  }
> 
> 
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov
> with the words "unsubscribe selinux" without quotes as the message.

-- 
paul moore
security and virtualization @ redhat


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2013-09-26 21:05 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-08-02 18:08 [PATCH] selinux: correct locking in selinux_netlbl_socket_connect) Paul Moore
     [not found] ` <20130802211929.GE10306@kroah.com>
2013-08-02 21:33   ` Paul Moore
2013-08-05 19:43 ` Paul Moore
2013-09-26 21:05 ` Paul Moore

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.