No description
Find a file
James Carter 2d49a4b41c libsepol/cil: Create new keep field for type attribute sets
Daniel Cashman <dcashman@android.com> discovered the following:
When using cil_db multiple_decls, the different cil_attribute nodes
all point to the same underlying cil_attribute struct.  This leads
to problems, though, when modifying the used value in the struct.
__cil_post_db_attr() changes the value of the field to based on
the output of cil_typeattribute_used(), for use later in
cil_typeattribute_to_policydb and cil_typeattribute_to_bitmap, but
due to the multiple declarations, cil_typeattribute_used() could be
called again by a second node.  In this second call, the value used
is the modifed value of CIL_TRUE or CIL_FALSE, not the flags actually
needed. This could result in the field being reset again, to an
incorrect CIL_FALSE value.

Add the field "keep" to struct cil_typeattributeset, set its value
using cil_typeattribute_used(), and use it when determining whether
the attribute is to be kept or if it should be expanded.

Signed-off-by: James Carter <jwcart2@tycho.nsa.gov>
2017-11-22 11:49:19 -05:00
checkpolicy checkpolicy,libselinux,libsepol,policycoreutils: Update my email address 2017-08-17 14:17:12 -04:00
dbus Update VERSION files for 2.7 release. 2017-08-04 09:31:00 -04:00
gui gui: remove mappingsPage 2017-10-02 01:51:49 +08:00
libselinux libselinux: Add support for pcre2 to pkgconfig definition 2017-10-13 15:24:23 -04:00
libsemanage libsemanage: free genhomedircon fallback user 2017-11-08 14:55:31 +08:00
libsepol libsepol/cil: Create new keep field for type attribute sets 2017-11-22 11:49:19 -05:00
mcstrans Update VERSION files for 2.7 release. 2017-08-04 09:31:00 -04:00
policycoreutils checkpolicy,libselinux,libsepol,policycoreutils: Update my email address 2017-08-17 14:17:12 -04:00
python python/sepolicy: Fix sepolicy manpage. 2017-11-22 09:47:50 +01:00
restorecond restorecond: check write() and daemon() results 2017-09-05 12:37:29 -04:00
sandbox Update VERSION files for 2.7 release. 2017-08-04 09:31:00 -04:00
scripts Fix release script 2016-11-16 11:19:51 -05:00
secilc libsepol: cil: Add ability to redeclare types[attributes] 2017-08-31 14:42:25 -04:00
semodule-utils semodule-utils: remove semodule_deps 2017-10-12 11:18:05 -07:00
.gitignore restorecond: Add gitignore 2016-11-16 11:20:05 -05:00
.travis.yml Travis-CI: try working around network issues by retrying downloads 2017-10-26 12:51:33 -07:00
CleanSpec.mk Add empty top level Android.mk / CleanSpec.mk files 2015-04-16 07:54:09 -04:00
Makefile Makefile: define a default value for CFLAGS 2017-09-05 12:37:41 -04:00
README libsepol compilation fixes for macOS. 2017-01-20 13:19:57 -05:00

Please submit all bug reports and patches to selinux@tycho.nsa.gov.
Subscribe via selinux-join@tycho.nsa.gov.

Build dependencies on Fedora:
yum install audit-libs-devel bison bzip2-devel dbus-devel dbus-glib-devel flex flex-devel flex-static glib2-devel libcap-devel libcap-ng-devel pam-devel pcre-devel python-devel setools-devel swig xmlto redhat-rpm-config

To build and install everything under a private directory, run:
make DESTDIR=~/obj install install-pywrap

To install as the default system libraries and binaries
(overwriting any previously installed ones - dangerous!),
on x86_64, run:
make LIBDIR=/usr/lib64 SHLIBDIR=/lib64 install install-pywrap relabel
or on x86 (32-bit), run:
make install install-pywrap relabel

This may render your system unusable if the upstream SELinux userspace
lacks library functions or other dependencies relied upon by your
distribution.  If it breaks, you get to keep both pieces.

To install libsepol on macOS (mainly for policy analysis):
cd libsepol; make DESTDIR=/usr/local PREFIX=/usr/local install

This requires GNU coreutils (brew install coreutils).