diff mbox series

[RESEND] libsepol: Print line markers also for allow rules

Message ID 20250402010146.898864-1-inseob@google.com (mailing list archive)
State New
Headers show
Series [RESEND] libsepol: Print line markers also for allow rules | expand

Commit Message

Inseob Kim April 2, 2025, 1:01 a.m. UTC
Currently, only line markers for neverallow rules are printed. This
makes people difficult to debug a neverallow failure with cil files
generated by checkpolicy.

This change additionally prints line markers for allow and allowxperm
statements to make debugging easier.

Signed-off-by: Inseob Kim <inseob@google.com>
---
 libsepol/src/module_to_cil.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

Comments

James Carter April 2, 2025, 7:43 p.m. UTC | #1
On Tue, Apr 1, 2025 at 9:04 PM Inseob Kim <inseob@google.com> wrote:
>
> Currently, only line markers for neverallow rules are printed. This
> makes people difficult to debug a neverallow failure with cil files
> generated by checkpolicy.
>
> This change additionally prints line markers for allow and allowxperm
> statements to make debugging easier.
>
> Signed-off-by: Inseob Kim <inseob@google.com>
> ---
>  libsepol/src/module_to_cil.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/libsepol/src/module_to_cil.c b/libsepol/src/module_to_cil.c
> index ae9a2b5d..76fe4739 100644
> --- a/libsepol/src/module_to_cil.c
> +++ b/libsepol/src/module_to_cil.c
> @@ -1196,7 +1196,7 @@ static int avrule_list_to_cil(int indent, struct policydb *pdb, struct avrule *a
>         struct type_set *ts;
>
>         for (avrule = avrule_list; avrule != NULL; avrule = avrule->next) {
> -               if ((avrule->specified & (AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
> +               if ((avrule->specified & (AVRULE_ALLOWED|AVRULE_XPERMS_ALLOWED|AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
>                     avrule->source_filename) {
>                         cil_println(0, ";;* lmx %lu %s\n",avrule->source_line, avrule->source_filename);
>                 }

The problem is that currently line marks (which are converted to
<src_info> rules when parsed) cannot be in booleanif statements, but
allow rules can be, so this can create cil files that will not
compile.
I suspect that that restriction was not intentional and can be
relaxed, but I don't remember.

The other issue is that this will produce a lot of line marks for any
real policy. A lot of line marks. It would be nice if this behavior
could be made optional.

Jim


> @@ -1264,7 +1264,7 @@ static int avrule_list_to_cil(int indent, struct policydb *pdb, struct avrule *a
>                 names_destroy(&snames, &num_snames);
>                 names_destroy(&tnames, &num_tnames);
>
> -               if ((avrule->specified & (AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
> +               if ((avrule->specified & (AVRULE_ALLOWED|AVRULE_XPERMS_ALLOWED|AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
>                     avrule->source_filename) {
>                         cil_println(0, ";;* lme\n");
>                 }
> --
> 2.49.0.rc1.451.g8f38331e32-goog
>
>
Inseob Kim April 3, 2025, 7:29 a.m. UTC | #2
On Thu, Apr 3, 2025 at 4:43 AM James Carter <jwcart2@gmail.com> wrote:
>
> On Tue, Apr 1, 2025 at 9:04 PM Inseob Kim <inseob@google.com> wrote:
> >
> > Currently, only line markers for neverallow rules are printed. This
> > makes people difficult to debug a neverallow failure with cil files
> > generated by checkpolicy.
> >
> > This change additionally prints line markers for allow and allowxperm
> > statements to make debugging easier.
> >
> > Signed-off-by: Inseob Kim <inseob@google.com>
> > ---
> >  libsepol/src/module_to_cil.c | 4 ++--
> >  1 file changed, 2 insertions(+), 2 deletions(-)
> >
> > diff --git a/libsepol/src/module_to_cil.c b/libsepol/src/module_to_cil.c
> > index ae9a2b5d..76fe4739 100644
> > --- a/libsepol/src/module_to_cil.c
> > +++ b/libsepol/src/module_to_cil.c
> > @@ -1196,7 +1196,7 @@ static int avrule_list_to_cil(int indent, struct policydb *pdb, struct avrule *a
> >         struct type_set *ts;
> >
> >         for (avrule = avrule_list; avrule != NULL; avrule = avrule->next) {
> > -               if ((avrule->specified & (AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
> > +               if ((avrule->specified & (AVRULE_ALLOWED|AVRULE_XPERMS_ALLOWED|AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
> >                     avrule->source_filename) {
> >                         cil_println(0, ";;* lmx %lu %s\n",avrule->source_line, avrule->source_filename);
> >                 }
>
> The problem is that currently line marks (which are converted to
> <src_info> rules when parsed) cannot be in booleanif statements, but
> allow rules can be, so this can create cil files that will not
> compile.
> I suspect that that restriction was not intentional and can be
> relaxed, but I don't remember.

I tried supporting markers within booleanif statements and it seems to
work with my tiny test.

PoC patch:

diff --git a/libsepol/cil/src/cil_binary.c b/libsepol/cil/src/cil_binary.c
index 3d920182..90745110 100644
--- a/libsepol/cil/src/cil_binary.c
+++ b/libsepol/cil/src/cil_binary.c
@@ -2121,6 +2121,7 @@ static int __cil_cond_to_policydb_helper(struct
cil_tree_node *node, __attribute
                break;
        case CIL_CALL:
        case CIL_TUNABLEIF:
+       case CIL_SRC_INFO:
                break;
        default:
                cil_tree_log(node, CIL_ERR, "Invalid statement within
booleanif");
diff --git a/libsepol/cil/src/cil_build_ast.c b/libsepol/cil/src/cil_build_ast.c
index 19fbb04e..619cd894 100644
--- a/libsepol/cil/src/cil_build_ast.c
+++ b/libsepol/cil/src/cil_build_ast.c
@@ -6158,6 +6158,7 @@ static int check_for_illegal_statement(struct
cil_tree_node *parse_current, stru
                        parse_current->data != CIL_KEY_AUDITALLOW &&
                        parse_current->data != CIL_KEY_TYPETRANSITION &&
                        parse_current->data != CIL_KEY_TYPECHANGE &&
+                       parse_current->data != CIL_KEY_SRC_INFO &&
                        parse_current->data != CIL_KEY_TYPEMEMBER) {
                        if (((struct
cil_booleanif*)args->boolif->data)->preserved_tunable) {
                                cil_tree_log(parse_current, CIL_ERR,
"%s is not allowed in tunableif being treated as a booleanif", (char
*)parse_current->data);
diff --git a/libsepol/cil/src/cil_resolve_ast.c
b/libsepol/cil/src/cil_resolve_ast.c
index da8863c4..d0d53b1d 100644
--- a/libsepol/cil/src/cil_resolve_ast.c
+++ b/libsepol/cil/src/cil_resolve_ast.c
@@ -3848,7 +3848,8 @@ static int __cil_resolve_ast_node_helper(struct
cil_tree_node *node, uint32_t *f
                        node->flavor != CIL_CONDBLOCK &&
                        node->flavor != CIL_AVRULE &&
                        node->flavor != CIL_TYPE_RULE &&
-                       node->flavor != CIL_NAMETYPETRANSITION) {
+                       node->flavor != CIL_NAMETYPETRANSITION &&
+                       node->flavor != CIL_SRC_INFO) {
                        rc = SEPOL_ERR;
                } else if (node->flavor == CIL_AVRULE) {
                        struct cil_avrule *rule = node->data;
diff --git a/libsepol/cil/src/cil_verify.c b/libsepol/cil/src/cil_verify.c
index 9621a247..0b740c85 100644
--- a/libsepol/cil/src/cil_verify.c
+++ b/libsepol/cil/src/cil_verify.c
@@ -1175,6 +1175,9 @@ static int __cil_verify_booleanif_helper(struct
cil_tree_node *node, __attribute
                   booleanif statements if they don't have "*" as the file. We
                   can't check that here. Or at least we won't right now. */
                break;
+       case CIL_SRC_INFO:
+               //Fall through
+               break;
        default: {
                const char * flavor = cil_node_to_string(node);
                if (bif->preserved_tunable) {

Snippet of test cil:

(boolean foobarbaz true)
(booleanif foobarbaz (true

;;* lmx 999 system/sepolicy/private/booleanif.te
(allow domain system_file (file (open)))
;;* lme

))

secilc neverallow check output:

neverallow check failed at plat_sepolicy.cil:15155 from
system/sepolicy/private/domain.te:1237
  (neverallow base_typeattr_430 base_typeattr_438 (...))
    <root>
    booleanif at plat_sepolicy.cil:9105
    true at plat_sepolicy.cil:9105
    allow at plat_sepolicy.cil:9108 from
system/sepolicy/private/booleanif.te:999
      (allow domain system_file (file (open)))

I'll apply this in my next patchset. What do you think?

>
> The other issue is that this will produce a lot of line marks for any
> real policy. A lot of line marks. It would be nice if this behavior
> could be made optional.

Ack, working on it.

>
> Jim
>
>
> > @@ -1264,7 +1264,7 @@ static int avrule_list_to_cil(int indent, struct policydb *pdb, struct avrule *a
> >                 names_destroy(&snames, &num_snames);
> >                 names_destroy(&tnames, &num_tnames);
> >
> > -               if ((avrule->specified & (AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
> > +               if ((avrule->specified & (AVRULE_ALLOWED|AVRULE_XPERMS_ALLOWED|AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
> >                     avrule->source_filename) {
> >                         cil_println(0, ";;* lme\n");
> >                 }
> > --
> > 2.49.0.rc1.451.g8f38331e32-goog
> >
> >



--
Inseob Kim | Software Engineer | inseob@google.com
Inseob Kim April 4, 2025, 9:17 a.m. UTC | #3
While working on this change, I also found that
checkpolicy/policy_scan.l is a little broken.

#line[ ]1[ ]\"[^\n]*\" { set_source_file(yytext+9); }
#line[ ]{digit}+        {
 errno = 0;
 source_lineno = strtoul(yytext+6, NULL, 10) - 1;
 if (errno) {
   yywarn("source line number too big");
 }
}

It assumes that the line marker with a filename always starts with
"#line 1 ...", but it isn't always the case if the file is
preprocessed and the very first line is skipped. We may want to fix
the rule like:

#line[ ]{digit}+[ ]\"[^\n]*\" { set_source_file(yytext+6); }
...
void set_source_file(const char *name)
{
// name points to "(number) (filename)".
// assign both source_lineno and source_file appropriately.
}

Let me apply that to my next patchset too.
diff mbox series

Patch

diff --git a/libsepol/src/module_to_cil.c b/libsepol/src/module_to_cil.c
index ae9a2b5d..76fe4739 100644
--- a/libsepol/src/module_to_cil.c
+++ b/libsepol/src/module_to_cil.c
@@ -1196,7 +1196,7 @@  static int avrule_list_to_cil(int indent, struct policydb *pdb, struct avrule *a
 	struct type_set *ts;
 
 	for (avrule = avrule_list; avrule != NULL; avrule = avrule->next) {
-		if ((avrule->specified & (AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
+		if ((avrule->specified & (AVRULE_ALLOWED|AVRULE_XPERMS_ALLOWED|AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
 		    avrule->source_filename) {
 			cil_println(0, ";;* lmx %lu %s\n",avrule->source_line, avrule->source_filename);
 		}
@@ -1264,7 +1264,7 @@  static int avrule_list_to_cil(int indent, struct policydb *pdb, struct avrule *a
 		names_destroy(&snames, &num_snames);
 		names_destroy(&tnames, &num_tnames);
 
-		if ((avrule->specified & (AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
+		if ((avrule->specified & (AVRULE_ALLOWED|AVRULE_XPERMS_ALLOWED|AVRULE_NEVERALLOW|AVRULE_XPERMS_NEVERALLOW)) &&
 		    avrule->source_filename) {
 			cil_println(0, ";;* lme\n");
 		}