aboutsummaryrefslogtreecommitdiffstats
path: root/security/selinux/ss/policydb.c
diff options
context:
space:
mode:
authorEric Paris <eparis@redhat.com>2010-11-29 15:47:09 -0500
committerEric Paris <eparis@redhat.com>2010-11-30 17:28:57 -0500
commit23bdecb000c806cf4ec52764499a600f7200d7a9 (patch)
treef13a523f6bec22c5e7ec58ea02a4988aefe7c8ac /security/selinux/ss/policydb.c
parentc41ab6a1b9028de33e74101cb0aae13098a56fdb (diff)
selinux: convert type_val_to_struct to flex_array
In rawhide type_val_to_struct will allocate 26848 bytes, an order 3 allocations. While this hasn't been seen to fail it isn't outside the realm of possibiliy on systems with severe memory fragmentation. Convert to flex_array so no allocation will ever be bigger than PAGE_SIZE. Signed-off-by: Eric Paris <eparis@redhat.com>
Diffstat (limited to 'security/selinux/ss/policydb.c')
-rw-r--r--security/selinux/ss/policydb.c28
1 files changed, 21 insertions, 7 deletions
diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c
index 6ad73e81da5c..af41fdfe1a71 100644
--- a/security/selinux/ss/policydb.c
+++ b/security/selinux/ss/policydb.c
@@ -307,7 +307,11 @@ static int type_index(void *key, void *datum, void *datap)
307 || typdatum->bounds > p->p_types.nprim) 307 || typdatum->bounds > p->p_types.nprim)
308 return -EINVAL; 308 return -EINVAL;
309 p->p_type_val_to_name[typdatum->value - 1] = key; 309 p->p_type_val_to_name[typdatum->value - 1] = key;
310 p->type_val_to_struct[typdatum->value - 1] = typdatum; 310 /* this flex array was all preallocated, this cannot fail */
311 if (flex_array_put_ptr(p->type_val_to_struct_array,
312 typdatum->value - 1, typdatum,
313 GFP_KERNEL | __GFP_ZERO))
314 BUG();
311 } 315 }
312 316
313 return 0; 317 return 0;
@@ -484,11 +488,17 @@ static int policydb_index_others(struct policydb *p)
484 if (!p->user_val_to_struct) 488 if (!p->user_val_to_struct)
485 goto out; 489 goto out;
486 490
491 /* Yes, I want the sizeof the pointer, not the structure */
487 rc = -ENOMEM; 492 rc = -ENOMEM;
488 p->type_val_to_struct = 493 p->type_val_to_struct_array = flex_array_alloc(sizeof(struct type_datum *),
489 kmalloc(p->p_types.nprim * sizeof(*(p->type_val_to_struct)), 494 p->p_types.nprim,
490 GFP_KERNEL); 495 GFP_KERNEL | __GFP_ZERO);
491 if (!p->type_val_to_struct) 496 if (!p->type_val_to_struct_array)
497 goto out;
498
499 rc = flex_array_prealloc(p->type_val_to_struct_array, 0,
500 p->p_types.nprim - 1, GFP_KERNEL | __GFP_ZERO);
501 if (rc)
492 goto out; 502 goto out;
493 503
494 rc = -ENOMEM; 504 rc = -ENOMEM;
@@ -699,7 +709,8 @@ void policydb_destroy(struct policydb *p)
699 kfree(p->class_val_to_struct); 709 kfree(p->class_val_to_struct);
700 kfree(p->role_val_to_struct); 710 kfree(p->role_val_to_struct);
701 kfree(p->user_val_to_struct); 711 kfree(p->user_val_to_struct);
702 kfree(p->type_val_to_struct); 712 if (p->type_val_to_struct_array)
713 flex_array_free(p->type_val_to_struct_array);
703 714
704 avtab_destroy(&p->te_avtab); 715 avtab_destroy(&p->te_avtab);
705 716
@@ -1618,7 +1629,10 @@ static int type_bounds_sanity_check(void *key, void *datum, void *datap)
1618 return -EINVAL; 1629 return -EINVAL;
1619 } 1630 }
1620 1631
1621 upper = p->type_val_to_struct[upper->bounds - 1]; 1632 upper = flex_array_get_ptr(p->type_val_to_struct_array,
1633 upper->bounds - 1);
1634 BUG_ON(!upper);
1635
1622 if (upper->attribute) { 1636 if (upper->attribute) {
1623 printk(KERN_ERR "SELinux: type %s: " 1637 printk(KERN_ERR "SELinux: type %s: "
1624 "bounded by attribute %s", 1638 "bounded by attribute %s",