a233116
From 19e98bf405a8105db71a4e3247b0397509825a6e Mon Sep 17 00:00:00 2001
a233116
From: Will Woods <wwoods@redhat.com>
a233116
Date: Fri, 13 Mar 2015 17:24:46 -0400
a233116
Subject: [PATCH] selinux: fix SEGV during switch-root if SELinux policy loaded
a233116
a233116
If you've got SELinux policy loaded, label_hnd is your labeling handle.
a233116
When systemd is shutting down, we free that handle via mac_selinux_finish().
a233116
a233116
But: switch_root() calls mkdir_p_label(), which tries to look up a label
a233116
using that freed handle, and so we get a bunch of garbage and eventually
a233116
SEGV in libselinux.
a233116
a233116
(This doesn't happen in the switch-root from initramfs to real root because
a233116
there's no SELinux policy loaded in initramfs, so label_hnd is NULL and we
a233116
never attempt any lookups.)
a233116
a233116
So: make sure that mac_selinux_finish() actually sets label_hnd to NULL, so
a233116
nobody tries to use it after it becomes invalid.
a233116
a233116
https://bugzilla.redhat.com/show_bug.cgi?id=1185604
a233116
(cherry picked from commit f5ce2b49585a14cefb6d02f61c8dcdf7628a8605)
a233116
---
a233116
 src/shared/selinux-util.c | 1 +
a233116
 1 file changed, 1 insertion(+)
a233116
a233116
diff --git a/src/shared/selinux-util.c b/src/shared/selinux-util.c
a233116
index a2233e0cfb..a46ddf8498 100644
a233116
--- a/src/shared/selinux-util.c
a233116
+++ b/src/shared/selinux-util.c
a233116
@@ -117,6 +117,7 @@ void mac_selinux_finish(void) {
a233116
                 return;
a233116
 
a233116
         selabel_close(label_hnd);
a233116
+        label_hnd = NULL;
a233116
 #endif
a233116
 }
a233116