netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* SELinux/IP_PASSSEC regression in 4.13-rcX
@ 2017-07-21 22:19 Paul Moore
  2017-07-24 12:25 ` Paolo Abeni
  0 siblings, 1 reply; 9+ messages in thread
From: Paul Moore @ 2017-07-21 22:19 UTC (permalink / raw)
  To: Paolo Abeni, netdev; +Cc: selinux

Hello,

I've been seeing a SELinux regression with IP_PASSSEC on the v4.13-rcX
kernels and finally tracked the problem down to the
skb_release_head_state() call in __udp_queue_rcv_skb().  Looking at
the code and the git log it would appear that the likely culprit is
0a463c78d25b ("udp: avoid a cache miss on dequeue
"); it looks similar to IP option problem fixed in 0ddf3fb2c43d2.

>From a SELinux/IP_PASSSEC point of view we need access to the skb->sp
pointer to examine the SAs.  I'm posting this here without a patch
because it isn't clear to me how you would like to fix the problem; my
initial thought would be to simply make the skb_release_head_state()
conditional on the skb->sp pointer, much like the IP options fix, but
I'm not sure if you have a more clever idea.

-- 
paul moore
www.paul-moore.com

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2017-07-25 15:37 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2017-07-21 22:19 SELinux/IP_PASSSEC regression in 4.13-rcX Paul Moore
2017-07-24 12:25 ` Paolo Abeni
2017-07-24 14:42   ` Paul Moore
2017-07-24 16:09     ` Paolo Abeni
2017-07-24 19:00       ` Paul Moore
2017-07-25  2:00         ` Paul Moore
2017-07-25  9:59           ` Paolo Abeni
2017-07-25 14:45             ` Paul Moore
2017-07-25 15:36               ` Paolo Abeni

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).