diff options
author | Will Woods <wwoods@redhat.com> | 2015-03-13 17:24:46 -0400 |
---|---|---|
committer | Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> | 2015-03-13 23:42:18 -0400 |
commit | f5ce2b49585a14cefb6d02f61c8dcdf7628a8605 (patch) | |
tree | d0199354e4bfd7efc096f948be36c1d6c3bb7845 | |
parent | 5de0ccffcc4a5a946102a14e0b0e681d964e3225 (diff) |
selinux: fix SEGV during switch-root if SELinux policy loaded
If you've got SELinux policy loaded, label_hnd is your labeling handle.
When systemd is shutting down, we free that handle via mac_selinux_finish().
But: switch_root() calls mkdir_p_label(), which tries to look up a label
using that freed handle, and so we get a bunch of garbage and eventually
SEGV in libselinux.
(This doesn't happen in the switch-root from initramfs to real root because
there's no SELinux policy loaded in initramfs, so label_hnd is NULL and we
never attempt any lookups.)
So: make sure that mac_selinux_finish() actually sets label_hnd to NULL, so
nobody tries to use it after it becomes invalid.
https://bugzilla.redhat.com/show_bug.cgi?id=1185604
-rw-r--r-- | src/shared/selinux-util.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/src/shared/selinux-util.c b/src/shared/selinux-util.c index a8d5fc4f3e..7c58985cd2 100644 --- a/src/shared/selinux-util.c +++ b/src/shared/selinux-util.c @@ -116,6 +116,7 @@ void mac_selinux_finish(void) { return; selabel_close(label_hnd); + label_hnd = NULL; #endif } |