Message ID | 20241025154824.140073-4-cgoettsche@seltendoof.de (mailing list archive) |
---|---|
State | Accepted |
Commit | 1fd41f488e8a |
Delegated to: | Petr Lautrbach |
Headers | show |
Series | [v3,1/6] libsepol: misc assertion cleanup | expand |
On Fri, Oct 25, 2024 at 12:12 PM Christian Göttsche <cgoettsche@seltendoof.de> wrote: > > From: Christian Göttsche <cgzones@googlemail.com> > > Add support for extended permission rules in conditional policies. > > Signed-off-by: Christian Göttsche <cgzones@googlemail.com> Testing reveals a couple of issues handling assertions in CIL that works as expected in checkpolicy. (type tp21) (boolean bb02 true) (booleanif bb02 (true (allow tp21 tpx (clx (ioctl))) (allowx tp21 tpx (ioctl clx (0x1101))) ) ) (neverallowx tp21 tpx (ioctl clx (0x4101))) This neverallowx should is not a violation, but is reported as one. (type tp51) (boolean bb05 true) (allow tp51 tpx (clx (ioctl))) (booleanif bb05 (true (allowx tp51 tpx (ioctl clx (0x1101))) ) (false (allowx tp51 tpx (ioctl clx (0x1101))) ) ) (neverallowx tp51 tpx (ioctl clx (0x4101))) Same for this neverallowx. It is not a violation, but is reported as one. CIL does most of its checking using libsepol, so I am not sure what the problem is. Thanks, Jim > --- > libsepol/cil/src/cil_binary.c | 153 +++++++++++++++++++++++++---- > libsepol/cil/src/cil_build_ast.c | 6 +- > libsepol/cil/src/cil_resolve_ast.c | 6 +- > libsepol/cil/src/cil_verify.c | 3 +- > secilc/test/policy.cil | 13 ++- > 5 files changed, 153 insertions(+), 28 deletions(-) > > diff --git a/libsepol/cil/src/cil_binary.c b/libsepol/cil/src/cil_binary.c > index 3dec1883..086dccb0 100644 > --- a/libsepol/cil/src/cil_binary.c > +++ b/libsepol/cil/src/cil_binary.c > @@ -59,14 +59,18 @@ > #define AVRULEX_TABLE_SIZE (1 << 10) > #define PERMS_PER_CLASS 32 > > +struct cil_args_xperm_tables { > + hashtab_t ioctl; > + hashtab_t nlmsg; > +}; > + > struct cil_args_binary { > const struct cil_db *db; > policydb_t *pdb; > struct cil_list *neverallows; > int pass; > hashtab_t role_trans_table; > - hashtab_t avrulex_ioctl_table; > - hashtab_t avrulex_nlmsg_table; > + struct cil_args_xperm_tables avrulex_xperm_tables; > void **type_value_to_cil; > }; > > @@ -75,8 +79,14 @@ struct cil_args_booleanif { > policydb_t *pdb; > cond_node_t *cond_node; > enum cil_flavor cond_flavor; > + struct cil_args_xperm_tables avrulex_xperm_tables; > }; > > +static unsigned int avrulex_hash(__attribute__((unused)) hashtab_t h, const_hashtab_key_t key); > +static int avrulex_compare(hashtab_t h > + __attribute__ ((unused)), const_hashtab_key_t key1, > + const_hashtab_key_t key2); > + > static int __cil_get_sepol_user_datum(policydb_t *pdb, struct cil_symtab_datum *datum, user_datum_t **sepol_user) > { > *sepol_user = hashtab_search(pdb->p_users.table, datum->fqn); > @@ -1762,7 +1772,10 @@ static int __cil_permx_bitmap_to_sepol_xperms_list(uint32_t kind, ebitmap_t *xpe > static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datum, uint32_t xperm_kind, void *args) > { > int rc = SEPOL_OK; > - struct policydb *pdb; > + struct cil_args_booleanif *booleanif_args = args; > + struct policydb *pdb = booleanif_args->pdb; > + cond_node_t *cond_node = booleanif_args->cond_node; > + enum cil_flavor cond_flavor = booleanif_args->cond_flavor; > avtab_key_t *avtab_key; > avtab_datum_t avtab_datum; > struct cil_list *xperms_list = NULL; > @@ -1772,7 +1785,6 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu > char *kind = NULL; > > avtab_key = (avtab_key_t *)k; > - pdb = args; > > sepol_obj = pdb->class_val_to_struct[avtab_key->target_class - 1]; > > @@ -1793,7 +1805,12 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu > > cil_list_for_each(item, xperms_list) { > avtab_datum.xperms = item->data; > - rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); > + > + if (cond_node) { > + rc = __cil_cond_insert_rule(&pdb->te_cond_avtab, avtab_key, &avtab_datum, cond_node, cond_flavor); > + } else { > + rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); > + } > if (rc != SEPOL_OK) { > goto exit; > } > @@ -1876,7 +1893,7 @@ exit: > return rc; > } > > -static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_binary *args) > +static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_xperm_tables *xt) > { > int rc = SEPOL_ERR; > type_datum_t *sepol_src = NULL; > @@ -1899,11 +1916,11 @@ static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, str > > switch (permx->kind) { > case CIL_PERMX_KIND_IOCTL: > - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_ioctl_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > + rc = __cil_avrulex_xperm_to_hashtable(xt->ioctl, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > if (rc != SEPOL_OK) goto exit; > break; > case CIL_PERMX_KIND_NLMSG: > - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_nlmsg_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > + rc = __cil_avrulex_xperm_to_hashtable(xt->nlmsg, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > if (rc != SEPOL_OK) goto exit; > break; > default: > @@ -1920,7 +1937,7 @@ exit: > return rc; > } > > -static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_binary *args) > +static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_xperm_tables *xt) > { > int rc = SEPOL_ERR; > uint16_t kind; > @@ -1946,7 +1963,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { > src = DATUM(db->val_to_type[s]); > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, args); > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, xt); > if (rc != SEPOL_OK) { > ebitmap_destroy(&src_bitmap); > goto exit; > @@ -1964,7 +1981,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > for (t = 0; t < (unsigned int)db->num_types; t++) { > if (s != t) { > tgt = DATUM(db->val_to_type[t]); > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > if (rc != SEPOL_OK) { > ebitmap_destroy(&src_bitmap); > goto exit; > @@ -1984,7 +2001,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > ebitmap_for_each_positive_bit(&src_bitmap, tnode, t) { > if (s != t) { > tgt = DATUM(db->val_to_type[t]); > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > if (rc != SEPOL_OK) { > ebitmap_destroy(&src_bitmap); > goto exit; > @@ -1998,7 +2015,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > int expand_tgt = __cil_should_expand_attribute(db, tgt); > > if (!expand_src && !expand_tgt) { > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > if (rc != SEPOL_OK) { > goto exit; > } > @@ -2019,7 +2036,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { > tgt = DATUM(db->val_to_type[t]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > if (rc != SEPOL_OK) { > ebitmap_destroy(&src_bitmap); > ebitmap_destroy(&tgt_bitmap); > @@ -2038,7 +2055,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { > src = DATUM(db->val_to_type[s]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > if (rc != SEPOL_OK) { > ebitmap_destroy(&src_bitmap); > goto exit; > @@ -2054,7 +2071,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { > tgt = DATUM(db->val_to_type[t]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > if (rc != SEPOL_OK) { > ebitmap_destroy(&tgt_bitmap); > goto exit; > @@ -2123,6 +2140,21 @@ static int __cil_cond_to_policydb_helper(struct cil_tree_node *node, __attribute > goto exit; > } > break; > + case CIL_AVRULEX: > + if (db->policy_version < POLICYDB_VERSION_COND_XPERMS) { > + cil_tree_log(node, CIL_ERR, "Extended permission rules are not supported in policy version %d\n", > + db->policy_version); > + rc = SEPOL_ERR; > + goto exit; > + } > + cil_avrule = node->data; > + rc = cil_avrulex_to_hashtable(pdb, db, cil_avrule, &args->avrulex_xperm_tables); > + if (rc != SEPOL_OK) { > + cil_tree_log(node, CIL_ERR, "Failed to insert avrulex into avtab"); > + goto exit; > + } > + break; > + > case CIL_CALL: > case CIL_TUNABLEIF: > break; > @@ -2429,6 +2461,8 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c > int was_created; > int swapped = CIL_FALSE; > cond_av_list_t tmp_cl; > + hashtab_t avrulex_ioctl_table = NULL; > + hashtab_t avrulex_nlmsg_table = NULL; > > tmp_cond = cond_node_create(pdb, NULL); > if (tmp_cond == NULL) { > @@ -2497,26 +2531,97 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c > bool_args.cond_node = cond_node; > > if (true_node != NULL) { > + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > + if (!avrulex_ioctl_table) { > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > + goto exit; > + } > + > + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > + if (!avrulex_nlmsg_table) { > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > + goto exit; > + } > + > bool_args.cond_flavor = CIL_CONDTRUE; > + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > rc = cil_tree_walk(true_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); > if (rc != SEPOL_OK) { > cil_tree_log(true_node, CIL_ERR, "Failure while walking true conditional block"); > goto exit; > } > + > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); > + if (rc != SEPOL_OK) { > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > + goto exit; > + } > + > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); > + if (rc != SEPOL_OK) { > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > + goto exit; > + } > + > + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); > + hashtab_destroy(avrulex_nlmsg_table); > + avrulex_nlmsg_table = NULL; > + > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > + hashtab_destroy(avrulex_ioctl_table); > + avrulex_ioctl_table = NULL; > } > > if (false_node != NULL) { > + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > + if (!avrulex_ioctl_table) { > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > + goto exit; > + } > + > + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > + if (!avrulex_nlmsg_table) { > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > + goto exit; > + } > + > bool_args.cond_flavor = CIL_CONDFALSE; > + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > rc = cil_tree_walk(false_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); > if (rc != SEPOL_OK) { > cil_tree_log(false_node, CIL_ERR, "Failure while walking false conditional block"); > goto exit; > } > + > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); > + if (rc != SEPOL_OK) { > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > + goto exit; > + } > + > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); > + if (rc != SEPOL_OK) { > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > + goto exit; > + } > + > + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); > + hashtab_destroy(avrulex_nlmsg_table); > + avrulex_nlmsg_table = NULL; > + > + > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > + hashtab_destroy(avrulex_ioctl_table); > + avrulex_ioctl_table = NULL; > } > > return SEPOL_OK; > > exit: > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > + hashtab_destroy(avrulex_ioctl_table); > if (tmp_cond) { > if (tmp_cond->expr) > cond_expr_destroy(tmp_cond->expr); > @@ -4091,7 +4196,7 @@ static int __cil_node_to_policydb(struct cil_tree_node *node, void *extra_args) > case CIL_AVRULEX: { > struct cil_avrule *rule = node->data; > if (rule->rule_kind != CIL_AVRULE_NEVERALLOW) { > - rc = cil_avrulex_to_hashtable(pdb, db, node->data, args); > + rc = cil_avrulex_to_hashtable(pdb, db, node->data, &args->avrulex_xperm_tables); > } > } > break; > @@ -5162,6 +5267,7 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > int rc = SEPOL_ERR; > int i; > struct cil_args_binary extra_args; > + struct cil_args_booleanif booleanif_args; > policydb_t *pdb = &policydb->p; > struct cil_list *neverallows = NULL; > hashtab_t role_trans_table = NULL; > @@ -5226,10 +5332,15 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > extra_args.pdb = pdb; > extra_args.neverallows = neverallows; > extra_args.role_trans_table = role_trans_table; > - extra_args.avrulex_ioctl_table = avrulex_ioctl_table; > - extra_args.avrulex_nlmsg_table = avrulex_nlmsg_table; > + extra_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > + extra_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > extra_args.type_value_to_cil = type_value_to_cil; > > + booleanif_args.db = db; > + booleanif_args.pdb = pdb; > + booleanif_args.cond_node = NULL; > + booleanif_args.cond_flavor = CIL_NONE; > + > for (i = 1; i <= 3; i++) { > extra_args.pass = i; > > @@ -5248,12 +5359,12 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > } > > if (i == 3) { > - rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, pdb); > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &booleanif_args); > if (rc != SEPOL_OK) { > cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > goto exit; > } > - rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, pdb); > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &booleanif_args); > if (rc != SEPOL_OK) { > cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > goto exit; > diff --git a/libsepol/cil/src/cil_build_ast.c b/libsepol/cil/src/cil_build_ast.c > index 19fbb04e..8cc3f9b2 100644 > --- a/libsepol/cil/src/cil_build_ast.c > +++ b/libsepol/cil/src/cil_build_ast.c > @@ -6158,7 +6158,11 @@ static int check_for_illegal_statement(struct cil_tree_node *parse_current, stru > parse_current->data != CIL_KEY_AUDITALLOW && > parse_current->data != CIL_KEY_TYPETRANSITION && > parse_current->data != CIL_KEY_TYPECHANGE && > - parse_current->data != CIL_KEY_TYPEMEMBER) { > + parse_current->data != CIL_KEY_TYPEMEMBER && > + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || > + (parse_current->data != CIL_KEY_ALLOWX && > + parse_current->data != CIL_KEY_DONTAUDITX && > + parse_current->data != CIL_KEY_AUDITALLOWX))) { > if (((struct cil_booleanif*)args->boolif->data)->preserved_tunable) { > cil_tree_log(parse_current, CIL_ERR, "%s is not allowed in tunableif being treated as a booleanif", (char *)parse_current->data); > } else { > diff --git a/libsepol/cil/src/cil_resolve_ast.c b/libsepol/cil/src/cil_resolve_ast.c > index da8863c4..a8fa89df 100644 > --- a/libsepol/cil/src/cil_resolve_ast.c > +++ b/libsepol/cil/src/cil_resolve_ast.c > @@ -3848,9 +3848,11 @@ static int __cil_resolve_ast_node_helper(struct cil_tree_node *node, uint32_t *f > node->flavor != CIL_CONDBLOCK && > node->flavor != CIL_AVRULE && > node->flavor != CIL_TYPE_RULE && > - node->flavor != CIL_NAMETYPETRANSITION) { > + node->flavor != CIL_NAMETYPETRANSITION && > + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || > + (node->flavor != CIL_AVRULEX))) { > rc = SEPOL_ERR; > - } else if (node->flavor == CIL_AVRULE) { > + } else if (node->flavor == CIL_AVRULE || node->flavor == CIL_AVRULEX) { > struct cil_avrule *rule = node->data; > if (rule->rule_kind == CIL_AVRULE_NEVERALLOW) { > rc = SEPOL_ERR; > diff --git a/libsepol/cil/src/cil_verify.c b/libsepol/cil/src/cil_verify.c > index 9621a247..550b4542 100644 > --- a/libsepol/cil/src/cil_verify.c > +++ b/libsepol/cil/src/cil_verify.c > @@ -1101,7 +1101,8 @@ static int __cil_verify_booleanif_helper(struct cil_tree_node *node, __attribute > struct cil_booleanif *bif = node->parent->parent->data; > > switch (rule_node->flavor) { > - case CIL_AVRULE: { > + case CIL_AVRULE: > + case CIL_AVRULEX: { > struct cil_avrule *avrule = NULL; > avrule = rule_node->data; > if (avrule->rule_kind == CIL_AVRULE_NEVERALLOW) { > diff --git a/secilc/test/policy.cil b/secilc/test/policy.cil > index e6b78618..d0d52d0d 100644 > --- a/secilc/test/policy.cil > +++ b/secilc/test/policy.cil > @@ -47,8 +47,9 @@ > > (block policy > (class file (execute_no_trans entrypoint execmod open audit_access a b c d e)) > - ; order should be: file char b c a dir d e f > - (classorder (file char)) > + (class socket (nlmsg)) > + ; order should be: file socket char b c a dir d e f > + (classorder (file socket char)) > (classorder (unordered dir)) > (classorder (unordered c a b d e f)) > (classorder (char b c a)) > @@ -161,7 +162,10 @@ > ;;(allow bad_t not_bad_type (file (execute))) > ;;(allow bad_t exec_t (file (execute))) > (neverallow bad_t not_bad_type (file (execute))) > - > + > + (auditallowx getty_t console_device_t (ioctl file (range 0x1000 0x10FF))) > + (auditallowx getty_t kernel_t (nlmsg socket (range 0x1000 0x10FF))) > + > (booleanif secure_mode > (true > (auditallow device_t exec_t (file (read write))) > @@ -172,9 +176,12 @@ > (true > (typechange auditadm_t console_device_t file user_tty_device_t) > (allow getty_t console_device_t (file (getattr open read write append))) > + (auditallowx getty_t console_device_t (ioctl file (range 0x2000 0x21FF))) > + (auditallowx getty_t kernel_t (nlmsg socket (0x1))) > ) > (false > (dontaudit getty_t console_device_t (file (getattr open read write append))) > + (dontauditx getty_t console_device_t (ioctl file (range 0x3000 0x31FF))) > ) > ) > > -- > 2.45.2 > >
On Mon, 28 Oct 2024 at 16:17, James Carter <jwcart2@gmail.com> wrote: > > On Fri, Oct 25, 2024 at 12:12 PM Christian Göttsche > <cgoettsche@seltendoof.de> wrote: > > > > From: Christian Göttsche <cgzones@googlemail.com> > > > > Add support for extended permission rules in conditional policies. > > > > Signed-off-by: Christian Göttsche <cgzones@googlemail.com> > > Testing reveals a couple of issues handling assertions in CIL that > works as expected in checkpolicy. > > (type tp21) > (boolean bb02 true) > (booleanif bb02 > (true > (allow tp21 tpx (clx (ioctl))) > (allowx tp21 tpx (ioctl clx (0x1101))) > ) > ) > (neverallowx tp21 tpx (ioctl clx (0x4101))) > This neverallowx should is not a violation, but is reported as one. > > (type tp51) > (boolean bb05 true) > (allow tp51 tpx (clx (ioctl))) > (booleanif bb05 > (true > (allowx tp51 tpx (ioctl clx (0x1101))) > ) > (false > (allowx tp51 tpx (ioctl clx (0x1101))) > ) > ) > (neverallowx tp51 tpx (ioctl clx (0x4101))) > Same for this neverallowx. It is not a violation, but is reported as one. > > CIL does most of its checking using libsepol, so I am not sure what > the problem is. Thanks again for testing. It seems CIL is setting the ioctl/nlmsg permission bit into the `data` member of `avtab_datum_t` for extended av rules while checkpolicy is not. The following fixup for patch 3/6 solves the issue for me: diff --git a/libsepol/src/assertion.c b/libsepol/src/assertion.c index 20a368e4..2a9ae6e0 100644 --- a/libsepol/src/assertion.c +++ b/libsepol/src/assertion.c @@ -546,7 +546,7 @@ static bool check_assertion_extended_permissions_avtab(const avrule_t *narule, if (!match_node_key(node, &tmp_key)) continue; - if (match_any_class_permissions(narule->perms, node->key.target_class, node->datum.data)) { + if ((node->key.specified & AVTAB_ALLOWED) && match_any_class_permissions(narule->perms, node->key.target_class, node->datum.data)) { found_true_base = true; continue; } @@ -607,7 +607,7 @@ static bool check_assertion_extended_permissions_avtab(const avrule_t *narule, if (!match_node_key(node, &tmp_key)) continue; - if (match_any_class_permissions(narule->perms, node->key.target_class, node->datum.data)) { + if ((node->key.specified & AVTAB_ALLOWED) && match_any_class_permissions(narule->perms, node->key.target_class, node->datum.data)) { found_false_base = true; continue; } > > Thanks, > Jim > > > > --- > > libsepol/cil/src/cil_binary.c | 153 +++++++++++++++++++++++++---- > > libsepol/cil/src/cil_build_ast.c | 6 +- > > libsepol/cil/src/cil_resolve_ast.c | 6 +- > > libsepol/cil/src/cil_verify.c | 3 +- > > secilc/test/policy.cil | 13 ++- > > 5 files changed, 153 insertions(+), 28 deletions(-) > > > > diff --git a/libsepol/cil/src/cil_binary.c b/libsepol/cil/src/cil_binary.c > > index 3dec1883..086dccb0 100644 > > --- a/libsepol/cil/src/cil_binary.c > > +++ b/libsepol/cil/src/cil_binary.c > > @@ -59,14 +59,18 @@ > > #define AVRULEX_TABLE_SIZE (1 << 10) > > #define PERMS_PER_CLASS 32 > > > > +struct cil_args_xperm_tables { > > + hashtab_t ioctl; > > + hashtab_t nlmsg; > > +}; > > + > > struct cil_args_binary { > > const struct cil_db *db; > > policydb_t *pdb; > > struct cil_list *neverallows; > > int pass; > > hashtab_t role_trans_table; > > - hashtab_t avrulex_ioctl_table; > > - hashtab_t avrulex_nlmsg_table; > > + struct cil_args_xperm_tables avrulex_xperm_tables; > > void **type_value_to_cil; > > }; > > > > @@ -75,8 +79,14 @@ struct cil_args_booleanif { > > policydb_t *pdb; > > cond_node_t *cond_node; > > enum cil_flavor cond_flavor; > > + struct cil_args_xperm_tables avrulex_xperm_tables; > > }; > > > > +static unsigned int avrulex_hash(__attribute__((unused)) hashtab_t h, const_hashtab_key_t key); > > +static int avrulex_compare(hashtab_t h > > + __attribute__ ((unused)), const_hashtab_key_t key1, > > + const_hashtab_key_t key2); > > + > > static int __cil_get_sepol_user_datum(policydb_t *pdb, struct cil_symtab_datum *datum, user_datum_t **sepol_user) > > { > > *sepol_user = hashtab_search(pdb->p_users.table, datum->fqn); > > @@ -1762,7 +1772,10 @@ static int __cil_permx_bitmap_to_sepol_xperms_list(uint32_t kind, ebitmap_t *xpe > > static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datum, uint32_t xperm_kind, void *args) > > { > > int rc = SEPOL_OK; > > - struct policydb *pdb; > > + struct cil_args_booleanif *booleanif_args = args; > > + struct policydb *pdb = booleanif_args->pdb; > > + cond_node_t *cond_node = booleanif_args->cond_node; > > + enum cil_flavor cond_flavor = booleanif_args->cond_flavor; > > avtab_key_t *avtab_key; > > avtab_datum_t avtab_datum; > > struct cil_list *xperms_list = NULL; > > @@ -1772,7 +1785,6 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu > > char *kind = NULL; > > > > avtab_key = (avtab_key_t *)k; > > - pdb = args; > > > > sepol_obj = pdb->class_val_to_struct[avtab_key->target_class - 1]; > > > > @@ -1793,7 +1805,12 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu > > > > cil_list_for_each(item, xperms_list) { > > avtab_datum.xperms = item->data; > > - rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); > > + > > + if (cond_node) { > > + rc = __cil_cond_insert_rule(&pdb->te_cond_avtab, avtab_key, &avtab_datum, cond_node, cond_flavor); > > + } else { > > + rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); > > + } > > if (rc != SEPOL_OK) { > > goto exit; > > } > > @@ -1876,7 +1893,7 @@ exit: > > return rc; > > } > > > > -static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_binary *args) > > +static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_xperm_tables *xt) > > { > > int rc = SEPOL_ERR; > > type_datum_t *sepol_src = NULL; > > @@ -1899,11 +1916,11 @@ static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, str > > > > switch (permx->kind) { > > case CIL_PERMX_KIND_IOCTL: > > - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_ioctl_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > + rc = __cil_avrulex_xperm_to_hashtable(xt->ioctl, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > if (rc != SEPOL_OK) goto exit; > > break; > > case CIL_PERMX_KIND_NLMSG: > > - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_nlmsg_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > + rc = __cil_avrulex_xperm_to_hashtable(xt->nlmsg, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > if (rc != SEPOL_OK) goto exit; > > break; > > default: > > @@ -1920,7 +1937,7 @@ exit: > > return rc; > > } > > > > -static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_binary *args) > > +static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_xperm_tables *xt) > > { > > int rc = SEPOL_ERR; > > uint16_t kind; > > @@ -1946,7 +1963,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > > ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { > > src = DATUM(db->val_to_type[s]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > goto exit; > > @@ -1964,7 +1981,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > for (t = 0; t < (unsigned int)db->num_types; t++) { > > if (s != t) { > > tgt = DATUM(db->val_to_type[t]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > goto exit; > > @@ -1984,7 +2001,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&src_bitmap, tnode, t) { > > if (s != t) { > > tgt = DATUM(db->val_to_type[t]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > goto exit; > > @@ -1998,7 +2015,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > int expand_tgt = __cil_should_expand_attribute(db, tgt); > > > > if (!expand_src && !expand_tgt) { > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > goto exit; > > } > > @@ -2019,7 +2036,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { > > tgt = DATUM(db->val_to_type[t]); > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > ebitmap_destroy(&tgt_bitmap); > > @@ -2038,7 +2055,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { > > src = DATUM(db->val_to_type[s]); > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > goto exit; > > @@ -2054,7 +2071,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { > > tgt = DATUM(db->val_to_type[t]); > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&tgt_bitmap); > > goto exit; > > @@ -2123,6 +2140,21 @@ static int __cil_cond_to_policydb_helper(struct cil_tree_node *node, __attribute > > goto exit; > > } > > break; > > + case CIL_AVRULEX: > > + if (db->policy_version < POLICYDB_VERSION_COND_XPERMS) { > > + cil_tree_log(node, CIL_ERR, "Extended permission rules are not supported in policy version %d\n", > > + db->policy_version); > > + rc = SEPOL_ERR; > > + goto exit; > > + } > > + cil_avrule = node->data; > > + rc = cil_avrulex_to_hashtable(pdb, db, cil_avrule, &args->avrulex_xperm_tables); > > + if (rc != SEPOL_OK) { > > + cil_tree_log(node, CIL_ERR, "Failed to insert avrulex into avtab"); > > + goto exit; > > + } > > + break; > > + > > case CIL_CALL: > > case CIL_TUNABLEIF: > > break; > > @@ -2429,6 +2461,8 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c > > int was_created; > > int swapped = CIL_FALSE; > > cond_av_list_t tmp_cl; > > + hashtab_t avrulex_ioctl_table = NULL; > > + hashtab_t avrulex_nlmsg_table = NULL; > > > > tmp_cond = cond_node_create(pdb, NULL); > > if (tmp_cond == NULL) { > > @@ -2497,26 +2531,97 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c > > bool_args.cond_node = cond_node; > > > > if (true_node != NULL) { > > + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > + if (!avrulex_ioctl_table) { > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > + goto exit; > > + } > > + > > + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > + if (!avrulex_nlmsg_table) { > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > + goto exit; > > + } > > + > > bool_args.cond_flavor = CIL_CONDTRUE; > > + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > rc = cil_tree_walk(true_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); > > if (rc != SEPOL_OK) { > > cil_tree_log(true_node, CIL_ERR, "Failure while walking true conditional block"); > > goto exit; > > } > > + > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); > > + if (rc != SEPOL_OK) { > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > + goto exit; > > + } > > + > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); > > + if (rc != SEPOL_OK) { > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > + goto exit; > > + } > > + > > + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_nlmsg_table); > > + avrulex_nlmsg_table = NULL; > > + > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_ioctl_table); > > + avrulex_ioctl_table = NULL; > > } > > > > if (false_node != NULL) { > > + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > + if (!avrulex_ioctl_table) { > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > + goto exit; > > + } > > + > > + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > + if (!avrulex_nlmsg_table) { > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > + goto exit; > > + } > > + > > bool_args.cond_flavor = CIL_CONDFALSE; > > + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > rc = cil_tree_walk(false_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); > > if (rc != SEPOL_OK) { > > cil_tree_log(false_node, CIL_ERR, "Failure while walking false conditional block"); > > goto exit; > > } > > + > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); > > + if (rc != SEPOL_OK) { > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > + goto exit; > > + } > > + > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); > > + if (rc != SEPOL_OK) { > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > + goto exit; > > + } > > + > > + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_nlmsg_table); > > + avrulex_nlmsg_table = NULL; > > + > > + > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_ioctl_table); > > + avrulex_ioctl_table = NULL; > > } > > > > return SEPOL_OK; > > > > exit: > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_ioctl_table); > > if (tmp_cond) { > > if (tmp_cond->expr) > > cond_expr_destroy(tmp_cond->expr); > > @@ -4091,7 +4196,7 @@ static int __cil_node_to_policydb(struct cil_tree_node *node, void *extra_args) > > case CIL_AVRULEX: { > > struct cil_avrule *rule = node->data; > > if (rule->rule_kind != CIL_AVRULE_NEVERALLOW) { > > - rc = cil_avrulex_to_hashtable(pdb, db, node->data, args); > > + rc = cil_avrulex_to_hashtable(pdb, db, node->data, &args->avrulex_xperm_tables); > > } > > } > > break; > > @@ -5162,6 +5267,7 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > int rc = SEPOL_ERR; > > int i; > > struct cil_args_binary extra_args; > > + struct cil_args_booleanif booleanif_args; > > policydb_t *pdb = &policydb->p; > > struct cil_list *neverallows = NULL; > > hashtab_t role_trans_table = NULL; > > @@ -5226,10 +5332,15 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > extra_args.pdb = pdb; > > extra_args.neverallows = neverallows; > > extra_args.role_trans_table = role_trans_table; > > - extra_args.avrulex_ioctl_table = avrulex_ioctl_table; > > - extra_args.avrulex_nlmsg_table = avrulex_nlmsg_table; > > + extra_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > + extra_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > extra_args.type_value_to_cil = type_value_to_cil; > > > > + booleanif_args.db = db; > > + booleanif_args.pdb = pdb; > > + booleanif_args.cond_node = NULL; > > + booleanif_args.cond_flavor = CIL_NONE; > > + > > for (i = 1; i <= 3; i++) { > > extra_args.pass = i; > > > > @@ -5248,12 +5359,12 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > } > > > > if (i == 3) { > > - rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, pdb); > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &booleanif_args); > > if (rc != SEPOL_OK) { > > cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > goto exit; > > } > > - rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, pdb); > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &booleanif_args); > > if (rc != SEPOL_OK) { > > cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > goto exit; > > diff --git a/libsepol/cil/src/cil_build_ast.c b/libsepol/cil/src/cil_build_ast.c > > index 19fbb04e..8cc3f9b2 100644 > > --- a/libsepol/cil/src/cil_build_ast.c > > +++ b/libsepol/cil/src/cil_build_ast.c > > @@ -6158,7 +6158,11 @@ static int check_for_illegal_statement(struct cil_tree_node *parse_current, stru > > parse_current->data != CIL_KEY_AUDITALLOW && > > parse_current->data != CIL_KEY_TYPETRANSITION && > > parse_current->data != CIL_KEY_TYPECHANGE && > > - parse_current->data != CIL_KEY_TYPEMEMBER) { > > + parse_current->data != CIL_KEY_TYPEMEMBER && > > + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || > > + (parse_current->data != CIL_KEY_ALLOWX && > > + parse_current->data != CIL_KEY_DONTAUDITX && > > + parse_current->data != CIL_KEY_AUDITALLOWX))) { > > if (((struct cil_booleanif*)args->boolif->data)->preserved_tunable) { > > cil_tree_log(parse_current, CIL_ERR, "%s is not allowed in tunableif being treated as a booleanif", (char *)parse_current->data); > > } else { > > diff --git a/libsepol/cil/src/cil_resolve_ast.c b/libsepol/cil/src/cil_resolve_ast.c > > index da8863c4..a8fa89df 100644 > > --- a/libsepol/cil/src/cil_resolve_ast.c > > +++ b/libsepol/cil/src/cil_resolve_ast.c > > @@ -3848,9 +3848,11 @@ static int __cil_resolve_ast_node_helper(struct cil_tree_node *node, uint32_t *f > > node->flavor != CIL_CONDBLOCK && > > node->flavor != CIL_AVRULE && > > node->flavor != CIL_TYPE_RULE && > > - node->flavor != CIL_NAMETYPETRANSITION) { > > + node->flavor != CIL_NAMETYPETRANSITION && > > + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || > > + (node->flavor != CIL_AVRULEX))) { > > rc = SEPOL_ERR; > > - } else if (node->flavor == CIL_AVRULE) { > > + } else if (node->flavor == CIL_AVRULE || node->flavor == CIL_AVRULEX) { > > struct cil_avrule *rule = node->data; > > if (rule->rule_kind == CIL_AVRULE_NEVERALLOW) { > > rc = SEPOL_ERR; > > diff --git a/libsepol/cil/src/cil_verify.c b/libsepol/cil/src/cil_verify.c > > index 9621a247..550b4542 100644 > > --- a/libsepol/cil/src/cil_verify.c > > +++ b/libsepol/cil/src/cil_verify.c > > @@ -1101,7 +1101,8 @@ static int __cil_verify_booleanif_helper(struct cil_tree_node *node, __attribute > > struct cil_booleanif *bif = node->parent->parent->data; > > > > switch (rule_node->flavor) { > > - case CIL_AVRULE: { > > + case CIL_AVRULE: > > + case CIL_AVRULEX: { > > struct cil_avrule *avrule = NULL; > > avrule = rule_node->data; > > if (avrule->rule_kind == CIL_AVRULE_NEVERALLOW) { > > diff --git a/secilc/test/policy.cil b/secilc/test/policy.cil > > index e6b78618..d0d52d0d 100644 > > --- a/secilc/test/policy.cil > > +++ b/secilc/test/policy.cil > > @@ -47,8 +47,9 @@ > > > > (block policy > > (class file (execute_no_trans entrypoint execmod open audit_access a b c d e)) > > - ; order should be: file char b c a dir d e f > > - (classorder (file char)) > > + (class socket (nlmsg)) > > + ; order should be: file socket char b c a dir d e f > > + (classorder (file socket char)) > > (classorder (unordered dir)) > > (classorder (unordered c a b d e f)) > > (classorder (char b c a)) > > @@ -161,7 +162,10 @@ > > ;;(allow bad_t not_bad_type (file (execute))) > > ;;(allow bad_t exec_t (file (execute))) > > (neverallow bad_t not_bad_type (file (execute))) > > - > > + > > + (auditallowx getty_t console_device_t (ioctl file (range 0x1000 0x10FF))) > > + (auditallowx getty_t kernel_t (nlmsg socket (range 0x1000 0x10FF))) > > + > > (booleanif secure_mode > > (true > > (auditallow device_t exec_t (file (read write))) > > @@ -172,9 +176,12 @@ > > (true > > (typechange auditadm_t console_device_t file user_tty_device_t) > > (allow getty_t console_device_t (file (getattr open read write append))) > > + (auditallowx getty_t console_device_t (ioctl file (range 0x2000 0x21FF))) > > + (auditallowx getty_t kernel_t (nlmsg socket (0x1))) > > ) > > (false > > (dontaudit getty_t console_device_t (file (getattr open read write append))) > > + (dontauditx getty_t console_device_t (ioctl file (range 0x3000 0x31FF))) > > ) > > ) > > > > -- > > 2.45.2 > > > >
On Mon, Oct 28, 2024 at 12:02 PM Christian Göttsche <cgzones@googlemail.com> wrote: > > On Mon, 28 Oct 2024 at 16:17, James Carter <jwcart2@gmail.com> wrote: > > > > On Fri, Oct 25, 2024 at 12:12 PM Christian Göttsche > > <cgoettsche@seltendoof.de> wrote: > > > > > > From: Christian Göttsche <cgzones@googlemail.com> > > > > > > Add support for extended permission rules in conditional policies. > > > > > > Signed-off-by: Christian Göttsche <cgzones@googlemail.com> > > > > Testing reveals a couple of issues handling assertions in CIL that > > works as expected in checkpolicy. > > > > (type tp21) > > (boolean bb02 true) > > (booleanif bb02 > > (true > > (allow tp21 tpx (clx (ioctl))) > > (allowx tp21 tpx (ioctl clx (0x1101))) > > ) > > ) > > (neverallowx tp21 tpx (ioctl clx (0x4101))) > > This neverallowx should is not a violation, but is reported as one. > > > > (type tp51) > > (boolean bb05 true) > > (allow tp51 tpx (clx (ioctl))) > > (booleanif bb05 > > (true > > (allowx tp51 tpx (ioctl clx (0x1101))) > > ) > > (false > > (allowx tp51 tpx (ioctl clx (0x1101))) > > ) > > ) > > (neverallowx tp51 tpx (ioctl clx (0x4101))) > > Same for this neverallowx. It is not a violation, but is reported as one. > > > > CIL does most of its checking using libsepol, so I am not sure what > > the problem is. > > Thanks again for testing. > > It seems CIL is setting the ioctl/nlmsg permission bit into the `data` > member of `avtab_datum_t` for extended av rules while checkpolicy is > not. > > The following fixup for patch 3/6 solves the issue for me: > > diff --git a/libsepol/src/assertion.c b/libsepol/src/assertion.c > index 20a368e4..2a9ae6e0 100644 > --- a/libsepol/src/assertion.c > +++ b/libsepol/src/assertion.c > @@ -546,7 +546,7 @@ static bool > check_assertion_extended_permissions_avtab(const avrule_t *narule, > if (!match_node_key(node, &tmp_key)) > continue; > > - if > (match_any_class_permissions(narule->perms, node->key.target_class, > node->datum.data)) { > + if ((node->key.specified & > AVTAB_ALLOWED) && match_any_class_permissions(narule->perms, > node->key.target_class, node->datum.data)) { > found_true_base = true; > continue; > } > @@ -607,7 +607,7 @@ static bool > check_assertion_extended_permissions_avtab(const avrule_t *narule, > if (!match_node_key(node, &tmp_key)) > continue; > > - if > (match_any_class_permissions(narule->perms, node->key.target_class, > node->datum.data)) { > + if ((node->key.specified & > AVTAB_ALLOWED) && match_any_class_permissions(narule->perms, > node->key.target_class, node->datum.data)) { > found_false_base = true; > continue; > } > > That fixes the problem. Thanks, Jim > > > > Thanks, > > Jim > > > > > > > --- > > > libsepol/cil/src/cil_binary.c | 153 +++++++++++++++++++++++++---- > > > libsepol/cil/src/cil_build_ast.c | 6 +- > > > libsepol/cil/src/cil_resolve_ast.c | 6 +- > > > libsepol/cil/src/cil_verify.c | 3 +- > > > secilc/test/policy.cil | 13 ++- > > > 5 files changed, 153 insertions(+), 28 deletions(-) > > > > > > diff --git a/libsepol/cil/src/cil_binary.c b/libsepol/cil/src/cil_binary.c > > > index 3dec1883..086dccb0 100644 > > > --- a/libsepol/cil/src/cil_binary.c > > > +++ b/libsepol/cil/src/cil_binary.c > > > @@ -59,14 +59,18 @@ > > > #define AVRULEX_TABLE_SIZE (1 << 10) > > > #define PERMS_PER_CLASS 32 > > > > > > +struct cil_args_xperm_tables { > > > + hashtab_t ioctl; > > > + hashtab_t nlmsg; > > > +}; > > > + > > > struct cil_args_binary { > > > const struct cil_db *db; > > > policydb_t *pdb; > > > struct cil_list *neverallows; > > > int pass; > > > hashtab_t role_trans_table; > > > - hashtab_t avrulex_ioctl_table; > > > - hashtab_t avrulex_nlmsg_table; > > > + struct cil_args_xperm_tables avrulex_xperm_tables; > > > void **type_value_to_cil; > > > }; > > > > > > @@ -75,8 +79,14 @@ struct cil_args_booleanif { > > > policydb_t *pdb; > > > cond_node_t *cond_node; > > > enum cil_flavor cond_flavor; > > > + struct cil_args_xperm_tables avrulex_xperm_tables; > > > }; > > > > > > +static unsigned int avrulex_hash(__attribute__((unused)) hashtab_t h, const_hashtab_key_t key); > > > +static int avrulex_compare(hashtab_t h > > > + __attribute__ ((unused)), const_hashtab_key_t key1, > > > + const_hashtab_key_t key2); > > > + > > > static int __cil_get_sepol_user_datum(policydb_t *pdb, struct cil_symtab_datum *datum, user_datum_t **sepol_user) > > > { > > > *sepol_user = hashtab_search(pdb->p_users.table, datum->fqn); > > > @@ -1762,7 +1772,10 @@ static int __cil_permx_bitmap_to_sepol_xperms_list(uint32_t kind, ebitmap_t *xpe > > > static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datum, uint32_t xperm_kind, void *args) > > > { > > > int rc = SEPOL_OK; > > > - struct policydb *pdb; > > > + struct cil_args_booleanif *booleanif_args = args; > > > + struct policydb *pdb = booleanif_args->pdb; > > > + cond_node_t *cond_node = booleanif_args->cond_node; > > > + enum cil_flavor cond_flavor = booleanif_args->cond_flavor; > > > avtab_key_t *avtab_key; > > > avtab_datum_t avtab_datum; > > > struct cil_list *xperms_list = NULL; > > > @@ -1772,7 +1785,6 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu > > > char *kind = NULL; > > > > > > avtab_key = (avtab_key_t *)k; > > > - pdb = args; > > > > > > sepol_obj = pdb->class_val_to_struct[avtab_key->target_class - 1]; > > > > > > @@ -1793,7 +1805,12 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu > > > > > > cil_list_for_each(item, xperms_list) { > > > avtab_datum.xperms = item->data; > > > - rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); > > > + > > > + if (cond_node) { > > > + rc = __cil_cond_insert_rule(&pdb->te_cond_avtab, avtab_key, &avtab_datum, cond_node, cond_flavor); > > > + } else { > > > + rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); > > > + } > > > if (rc != SEPOL_OK) { > > > goto exit; > > > } > > > @@ -1876,7 +1893,7 @@ exit: > > > return rc; > > > } > > > > > > -static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_binary *args) > > > +static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_xperm_tables *xt) > > > { > > > int rc = SEPOL_ERR; > > > type_datum_t *sepol_src = NULL; > > > @@ -1899,11 +1916,11 @@ static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, str > > > > > > switch (permx->kind) { > > > case CIL_PERMX_KIND_IOCTL: > > > - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_ioctl_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > > + rc = __cil_avrulex_xperm_to_hashtable(xt->ioctl, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > > if (rc != SEPOL_OK) goto exit; > > > break; > > > case CIL_PERMX_KIND_NLMSG: > > > - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_nlmsg_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > > + rc = __cil_avrulex_xperm_to_hashtable(xt->nlmsg, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > > if (rc != SEPOL_OK) goto exit; > > > break; > > > default: > > > @@ -1920,7 +1937,7 @@ exit: > > > return rc; > > > } > > > > > > -static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_binary *args) > > > +static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_xperm_tables *xt) > > > { > > > int rc = SEPOL_ERR; > > > uint16_t kind; > > > @@ -1946,7 +1963,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > > > > ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { > > > src = DATUM(db->val_to_type[s]); > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, args); > > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, xt); > > > if (rc != SEPOL_OK) { > > > ebitmap_destroy(&src_bitmap); > > > goto exit; > > > @@ -1964,7 +1981,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > for (t = 0; t < (unsigned int)db->num_types; t++) { > > > if (s != t) { > > > tgt = DATUM(db->val_to_type[t]); > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > > if (rc != SEPOL_OK) { > > > ebitmap_destroy(&src_bitmap); > > > goto exit; > > > @@ -1984,7 +2001,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > ebitmap_for_each_positive_bit(&src_bitmap, tnode, t) { > > > if (s != t) { > > > tgt = DATUM(db->val_to_type[t]); > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > > if (rc != SEPOL_OK) { > > > ebitmap_destroy(&src_bitmap); > > > goto exit; > > > @@ -1998,7 +2015,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > int expand_tgt = __cil_should_expand_attribute(db, tgt); > > > > > > if (!expand_src && !expand_tgt) { > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > > if (rc != SEPOL_OK) { > > > goto exit; > > > } > > > @@ -2019,7 +2036,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { > > > tgt = DATUM(db->val_to_type[t]); > > > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > > if (rc != SEPOL_OK) { > > > ebitmap_destroy(&src_bitmap); > > > ebitmap_destroy(&tgt_bitmap); > > > @@ -2038,7 +2055,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { > > > src = DATUM(db->val_to_type[s]); > > > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > > if (rc != SEPOL_OK) { > > > ebitmap_destroy(&src_bitmap); > > > goto exit; > > > @@ -2054,7 +2071,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { > > > tgt = DATUM(db->val_to_type[t]); > > > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > > if (rc != SEPOL_OK) { > > > ebitmap_destroy(&tgt_bitmap); > > > goto exit; > > > @@ -2123,6 +2140,21 @@ static int __cil_cond_to_policydb_helper(struct cil_tree_node *node, __attribute > > > goto exit; > > > } > > > break; > > > + case CIL_AVRULEX: > > > + if (db->policy_version < POLICYDB_VERSION_COND_XPERMS) { > > > + cil_tree_log(node, CIL_ERR, "Extended permission rules are not supported in policy version %d\n", > > > + db->policy_version); > > > + rc = SEPOL_ERR; > > > + goto exit; > > > + } > > > + cil_avrule = node->data; > > > + rc = cil_avrulex_to_hashtable(pdb, db, cil_avrule, &args->avrulex_xperm_tables); > > > + if (rc != SEPOL_OK) { > > > + cil_tree_log(node, CIL_ERR, "Failed to insert avrulex into avtab"); > > > + goto exit; > > > + } > > > + break; > > > + > > > case CIL_CALL: > > > case CIL_TUNABLEIF: > > > break; > > > @@ -2429,6 +2461,8 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c > > > int was_created; > > > int swapped = CIL_FALSE; > > > cond_av_list_t tmp_cl; > > > + hashtab_t avrulex_ioctl_table = NULL; > > > + hashtab_t avrulex_nlmsg_table = NULL; > > > > > > tmp_cond = cond_node_create(pdb, NULL); > > > if (tmp_cond == NULL) { > > > @@ -2497,26 +2531,97 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c > > > bool_args.cond_node = cond_node; > > > > > > if (true_node != NULL) { > > > + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > > + if (!avrulex_ioctl_table) { > > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > > + goto exit; > > > + } > > > + > > > + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > > + if (!avrulex_nlmsg_table) { > > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > > + goto exit; > > > + } > > > + > > > bool_args.cond_flavor = CIL_CONDTRUE; > > > + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > > + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > > rc = cil_tree_walk(true_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); > > > if (rc != SEPOL_OK) { > > > cil_tree_log(true_node, CIL_ERR, "Failure while walking true conditional block"); > > > goto exit; > > > } > > > + > > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); > > > + if (rc != SEPOL_OK) { > > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > > + goto exit; > > > + } > > > + > > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); > > > + if (rc != SEPOL_OK) { > > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > > + goto exit; > > > + } > > > + > > > + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); > > > + hashtab_destroy(avrulex_nlmsg_table); > > > + avrulex_nlmsg_table = NULL; > > > + > > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > > + hashtab_destroy(avrulex_ioctl_table); > > > + avrulex_ioctl_table = NULL; > > > } > > > > > > if (false_node != NULL) { > > > + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > > + if (!avrulex_ioctl_table) { > > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > > + goto exit; > > > + } > > > + > > > + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > > + if (!avrulex_nlmsg_table) { > > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > > + goto exit; > > > + } > > > + > > > bool_args.cond_flavor = CIL_CONDFALSE; > > > + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > > + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > > rc = cil_tree_walk(false_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); > > > if (rc != SEPOL_OK) { > > > cil_tree_log(false_node, CIL_ERR, "Failure while walking false conditional block"); > > > goto exit; > > > } > > > + > > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); > > > + if (rc != SEPOL_OK) { > > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > > + goto exit; > > > + } > > > + > > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); > > > + if (rc != SEPOL_OK) { > > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > > + goto exit; > > > + } > > > + > > > + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); > > > + hashtab_destroy(avrulex_nlmsg_table); > > > + avrulex_nlmsg_table = NULL; > > > + > > > + > > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > > + hashtab_destroy(avrulex_ioctl_table); > > > + avrulex_ioctl_table = NULL; > > > } > > > > > > return SEPOL_OK; > > > > > > exit: > > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > > + hashtab_destroy(avrulex_ioctl_table); > > > if (tmp_cond) { > > > if (tmp_cond->expr) > > > cond_expr_destroy(tmp_cond->expr); > > > @@ -4091,7 +4196,7 @@ static int __cil_node_to_policydb(struct cil_tree_node *node, void *extra_args) > > > case CIL_AVRULEX: { > > > struct cil_avrule *rule = node->data; > > > if (rule->rule_kind != CIL_AVRULE_NEVERALLOW) { > > > - rc = cil_avrulex_to_hashtable(pdb, db, node->data, args); > > > + rc = cil_avrulex_to_hashtable(pdb, db, node->data, &args->avrulex_xperm_tables); > > > } > > > } > > > break; > > > @@ -5162,6 +5267,7 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > > int rc = SEPOL_ERR; > > > int i; > > > struct cil_args_binary extra_args; > > > + struct cil_args_booleanif booleanif_args; > > > policydb_t *pdb = &policydb->p; > > > struct cil_list *neverallows = NULL; > > > hashtab_t role_trans_table = NULL; > > > @@ -5226,10 +5332,15 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > > extra_args.pdb = pdb; > > > extra_args.neverallows = neverallows; > > > extra_args.role_trans_table = role_trans_table; > > > - extra_args.avrulex_ioctl_table = avrulex_ioctl_table; > > > - extra_args.avrulex_nlmsg_table = avrulex_nlmsg_table; > > > + extra_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > > + extra_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > > extra_args.type_value_to_cil = type_value_to_cil; > > > > > > + booleanif_args.db = db; > > > + booleanif_args.pdb = pdb; > > > + booleanif_args.cond_node = NULL; > > > + booleanif_args.cond_flavor = CIL_NONE; > > > + > > > for (i = 1; i <= 3; i++) { > > > extra_args.pass = i; > > > > > > @@ -5248,12 +5359,12 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > > } > > > > > > if (i == 3) { > > > - rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, pdb); > > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &booleanif_args); > > > if (rc != SEPOL_OK) { > > > cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > > goto exit; > > > } > > > - rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, pdb); > > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &booleanif_args); > > > if (rc != SEPOL_OK) { > > > cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > > goto exit; > > > diff --git a/libsepol/cil/src/cil_build_ast.c b/libsepol/cil/src/cil_build_ast.c > > > index 19fbb04e..8cc3f9b2 100644 > > > --- a/libsepol/cil/src/cil_build_ast.c > > > +++ b/libsepol/cil/src/cil_build_ast.c > > > @@ -6158,7 +6158,11 @@ static int check_for_illegal_statement(struct cil_tree_node *parse_current, stru > > > parse_current->data != CIL_KEY_AUDITALLOW && > > > parse_current->data != CIL_KEY_TYPETRANSITION && > > > parse_current->data != CIL_KEY_TYPECHANGE && > > > - parse_current->data != CIL_KEY_TYPEMEMBER) { > > > + parse_current->data != CIL_KEY_TYPEMEMBER && > > > + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || > > > + (parse_current->data != CIL_KEY_ALLOWX && > > > + parse_current->data != CIL_KEY_DONTAUDITX && > > > + parse_current->data != CIL_KEY_AUDITALLOWX))) { > > > if (((struct cil_booleanif*)args->boolif->data)->preserved_tunable) { > > > cil_tree_log(parse_current, CIL_ERR, "%s is not allowed in tunableif being treated as a booleanif", (char *)parse_current->data); > > > } else { > > > diff --git a/libsepol/cil/src/cil_resolve_ast.c b/libsepol/cil/src/cil_resolve_ast.c > > > index da8863c4..a8fa89df 100644 > > > --- a/libsepol/cil/src/cil_resolve_ast.c > > > +++ b/libsepol/cil/src/cil_resolve_ast.c > > > @@ -3848,9 +3848,11 @@ static int __cil_resolve_ast_node_helper(struct cil_tree_node *node, uint32_t *f > > > node->flavor != CIL_CONDBLOCK && > > > node->flavor != CIL_AVRULE && > > > node->flavor != CIL_TYPE_RULE && > > > - node->flavor != CIL_NAMETYPETRANSITION) { > > > + node->flavor != CIL_NAMETYPETRANSITION && > > > + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || > > > + (node->flavor != CIL_AVRULEX))) { > > > rc = SEPOL_ERR; > > > - } else if (node->flavor == CIL_AVRULE) { > > > + } else if (node->flavor == CIL_AVRULE || node->flavor == CIL_AVRULEX) { > > > struct cil_avrule *rule = node->data; > > > if (rule->rule_kind == CIL_AVRULE_NEVERALLOW) { > > > rc = SEPOL_ERR; > > > diff --git a/libsepol/cil/src/cil_verify.c b/libsepol/cil/src/cil_verify.c > > > index 9621a247..550b4542 100644 > > > --- a/libsepol/cil/src/cil_verify.c > > > +++ b/libsepol/cil/src/cil_verify.c > > > @@ -1101,7 +1101,8 @@ static int __cil_verify_booleanif_helper(struct cil_tree_node *node, __attribute > > > struct cil_booleanif *bif = node->parent->parent->data; > > > > > > switch (rule_node->flavor) { > > > - case CIL_AVRULE: { > > > + case CIL_AVRULE: > > > + case CIL_AVRULEX: { > > > struct cil_avrule *avrule = NULL; > > > avrule = rule_node->data; > > > if (avrule->rule_kind == CIL_AVRULE_NEVERALLOW) { > > > diff --git a/secilc/test/policy.cil b/secilc/test/policy.cil > > > index e6b78618..d0d52d0d 100644 > > > --- a/secilc/test/policy.cil > > > +++ b/secilc/test/policy.cil > > > @@ -47,8 +47,9 @@ > > > > > > (block policy > > > (class file (execute_no_trans entrypoint execmod open audit_access a b c d e)) > > > - ; order should be: file char b c a dir d e f > > > - (classorder (file char)) > > > + (class socket (nlmsg)) > > > + ; order should be: file socket char b c a dir d e f > > > + (classorder (file socket char)) > > > (classorder (unordered dir)) > > > (classorder (unordered c a b d e f)) > > > (classorder (char b c a)) > > > @@ -161,7 +162,10 @@ > > > ;;(allow bad_t not_bad_type (file (execute))) > > > ;;(allow bad_t exec_t (file (execute))) > > > (neverallow bad_t not_bad_type (file (execute))) > > > - > > > + > > > + (auditallowx getty_t console_device_t (ioctl file (range 0x1000 0x10FF))) > > > + (auditallowx getty_t kernel_t (nlmsg socket (range 0x1000 0x10FF))) > > > + > > > (booleanif secure_mode > > > (true > > > (auditallow device_t exec_t (file (read write))) > > > @@ -172,9 +176,12 @@ > > > (true > > > (typechange auditadm_t console_device_t file user_tty_device_t) > > > (allow getty_t console_device_t (file (getattr open read write append))) > > > + (auditallowx getty_t console_device_t (ioctl file (range 0x2000 0x21FF))) > > > + (auditallowx getty_t kernel_t (nlmsg socket (0x1))) > > > ) > > > (false > > > (dontaudit getty_t console_device_t (file (getattr open read write append))) > > > + (dontauditx getty_t console_device_t (ioctl file (range 0x3000 0x31FF))) > > > ) > > > ) > > > > > > -- > > > 2.45.2 > > > > > >
diff --git a/libsepol/cil/src/cil_binary.c b/libsepol/cil/src/cil_binary.c index 3dec1883..086dccb0 100644 --- a/libsepol/cil/src/cil_binary.c +++ b/libsepol/cil/src/cil_binary.c @@ -59,14 +59,18 @@ #define AVRULEX_TABLE_SIZE (1 << 10) #define PERMS_PER_CLASS 32 +struct cil_args_xperm_tables { + hashtab_t ioctl; + hashtab_t nlmsg; +}; + struct cil_args_binary { const struct cil_db *db; policydb_t *pdb; struct cil_list *neverallows; int pass; hashtab_t role_trans_table; - hashtab_t avrulex_ioctl_table; - hashtab_t avrulex_nlmsg_table; + struct cil_args_xperm_tables avrulex_xperm_tables; void **type_value_to_cil; }; @@ -75,8 +79,14 @@ struct cil_args_booleanif { policydb_t *pdb; cond_node_t *cond_node; enum cil_flavor cond_flavor; + struct cil_args_xperm_tables avrulex_xperm_tables; }; +static unsigned int avrulex_hash(__attribute__((unused)) hashtab_t h, const_hashtab_key_t key); +static int avrulex_compare(hashtab_t h + __attribute__ ((unused)), const_hashtab_key_t key1, + const_hashtab_key_t key2); + static int __cil_get_sepol_user_datum(policydb_t *pdb, struct cil_symtab_datum *datum, user_datum_t **sepol_user) { *sepol_user = hashtab_search(pdb->p_users.table, datum->fqn); @@ -1762,7 +1772,10 @@ static int __cil_permx_bitmap_to_sepol_xperms_list(uint32_t kind, ebitmap_t *xpe static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datum, uint32_t xperm_kind, void *args) { int rc = SEPOL_OK; - struct policydb *pdb; + struct cil_args_booleanif *booleanif_args = args; + struct policydb *pdb = booleanif_args->pdb; + cond_node_t *cond_node = booleanif_args->cond_node; + enum cil_flavor cond_flavor = booleanif_args->cond_flavor; avtab_key_t *avtab_key; avtab_datum_t avtab_datum; struct cil_list *xperms_list = NULL; @@ -1772,7 +1785,6 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu char *kind = NULL; avtab_key = (avtab_key_t *)k; - pdb = args; sepol_obj = pdb->class_val_to_struct[avtab_key->target_class - 1]; @@ -1793,7 +1805,12 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu cil_list_for_each(item, xperms_list) { avtab_datum.xperms = item->data; - rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); + + if (cond_node) { + rc = __cil_cond_insert_rule(&pdb->te_cond_avtab, avtab_key, &avtab_datum, cond_node, cond_flavor); + } else { + rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); + } if (rc != SEPOL_OK) { goto exit; } @@ -1876,7 +1893,7 @@ exit: return rc; } -static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_binary *args) +static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_xperm_tables *xt) { int rc = SEPOL_ERR; type_datum_t *sepol_src = NULL; @@ -1899,11 +1916,11 @@ static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, str switch (permx->kind) { case CIL_PERMX_KIND_IOCTL: - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_ioctl_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); + rc = __cil_avrulex_xperm_to_hashtable(xt->ioctl, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); if (rc != SEPOL_OK) goto exit; break; case CIL_PERMX_KIND_NLMSG: - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_nlmsg_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); + rc = __cil_avrulex_xperm_to_hashtable(xt->nlmsg, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); if (rc != SEPOL_OK) goto exit; break; default: @@ -1920,7 +1937,7 @@ exit: return rc; } -static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_binary *args) +static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_xperm_tables *xt) { int rc = SEPOL_ERR; uint16_t kind; @@ -1946,7 +1963,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { src = DATUM(db->val_to_type[s]); - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, args); + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, xt); if (rc != SEPOL_OK) { ebitmap_destroy(&src_bitmap); goto exit; @@ -1964,7 +1981,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st for (t = 0; t < (unsigned int)db->num_types; t++) { if (s != t) { tgt = DATUM(db->val_to_type[t]); - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); if (rc != SEPOL_OK) { ebitmap_destroy(&src_bitmap); goto exit; @@ -1984,7 +2001,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st ebitmap_for_each_positive_bit(&src_bitmap, tnode, t) { if (s != t) { tgt = DATUM(db->val_to_type[t]); - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); if (rc != SEPOL_OK) { ebitmap_destroy(&src_bitmap); goto exit; @@ -1998,7 +2015,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st int expand_tgt = __cil_should_expand_attribute(db, tgt); if (!expand_src && !expand_tgt) { - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); if (rc != SEPOL_OK) { goto exit; } @@ -2019,7 +2036,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { tgt = DATUM(db->val_to_type[t]); - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); if (rc != SEPOL_OK) { ebitmap_destroy(&src_bitmap); ebitmap_destroy(&tgt_bitmap); @@ -2038,7 +2055,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { src = DATUM(db->val_to_type[s]); - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); if (rc != SEPOL_OK) { ebitmap_destroy(&src_bitmap); goto exit; @@ -2054,7 +2071,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { tgt = DATUM(db->val_to_type[t]); - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); if (rc != SEPOL_OK) { ebitmap_destroy(&tgt_bitmap); goto exit; @@ -2123,6 +2140,21 @@ static int __cil_cond_to_policydb_helper(struct cil_tree_node *node, __attribute goto exit; } break; + case CIL_AVRULEX: + if (db->policy_version < POLICYDB_VERSION_COND_XPERMS) { + cil_tree_log(node, CIL_ERR, "Extended permission rules are not supported in policy version %d\n", + db->policy_version); + rc = SEPOL_ERR; + goto exit; + } + cil_avrule = node->data; + rc = cil_avrulex_to_hashtable(pdb, db, cil_avrule, &args->avrulex_xperm_tables); + if (rc != SEPOL_OK) { + cil_tree_log(node, CIL_ERR, "Failed to insert avrulex into avtab"); + goto exit; + } + break; + case CIL_CALL: case CIL_TUNABLEIF: break; @@ -2429,6 +2461,8 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c int was_created; int swapped = CIL_FALSE; cond_av_list_t tmp_cl; + hashtab_t avrulex_ioctl_table = NULL; + hashtab_t avrulex_nlmsg_table = NULL; tmp_cond = cond_node_create(pdb, NULL); if (tmp_cond == NULL) { @@ -2497,26 +2531,97 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c bool_args.cond_node = cond_node; if (true_node != NULL) { + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); + if (!avrulex_ioctl_table) { + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); + goto exit; + } + + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); + if (!avrulex_nlmsg_table) { + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); + goto exit; + } + bool_args.cond_flavor = CIL_CONDTRUE; + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; rc = cil_tree_walk(true_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); if (rc != SEPOL_OK) { cil_tree_log(true_node, CIL_ERR, "Failure while walking true conditional block"); goto exit; } + + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); + if (rc != SEPOL_OK) { + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); + goto exit; + } + + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); + if (rc != SEPOL_OK) { + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); + goto exit; + } + + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); + hashtab_destroy(avrulex_nlmsg_table); + avrulex_nlmsg_table = NULL; + + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); + hashtab_destroy(avrulex_ioctl_table); + avrulex_ioctl_table = NULL; } if (false_node != NULL) { + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); + if (!avrulex_ioctl_table) { + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); + goto exit; + } + + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); + if (!avrulex_nlmsg_table) { + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); + goto exit; + } + bool_args.cond_flavor = CIL_CONDFALSE; + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; rc = cil_tree_walk(false_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); if (rc != SEPOL_OK) { cil_tree_log(false_node, CIL_ERR, "Failure while walking false conditional block"); goto exit; } + + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); + if (rc != SEPOL_OK) { + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); + goto exit; + } + + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); + if (rc != SEPOL_OK) { + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); + goto exit; + } + + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); + hashtab_destroy(avrulex_nlmsg_table); + avrulex_nlmsg_table = NULL; + + + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); + hashtab_destroy(avrulex_ioctl_table); + avrulex_ioctl_table = NULL; } return SEPOL_OK; exit: + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); + hashtab_destroy(avrulex_ioctl_table); if (tmp_cond) { if (tmp_cond->expr) cond_expr_destroy(tmp_cond->expr); @@ -4091,7 +4196,7 @@ static int __cil_node_to_policydb(struct cil_tree_node *node, void *extra_args) case CIL_AVRULEX: { struct cil_avrule *rule = node->data; if (rule->rule_kind != CIL_AVRULE_NEVERALLOW) { - rc = cil_avrulex_to_hashtable(pdb, db, node->data, args); + rc = cil_avrulex_to_hashtable(pdb, db, node->data, &args->avrulex_xperm_tables); } } break; @@ -5162,6 +5267,7 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p int rc = SEPOL_ERR; int i; struct cil_args_binary extra_args; + struct cil_args_booleanif booleanif_args; policydb_t *pdb = &policydb->p; struct cil_list *neverallows = NULL; hashtab_t role_trans_table = NULL; @@ -5226,10 +5332,15 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p extra_args.pdb = pdb; extra_args.neverallows = neverallows; extra_args.role_trans_table = role_trans_table; - extra_args.avrulex_ioctl_table = avrulex_ioctl_table; - extra_args.avrulex_nlmsg_table = avrulex_nlmsg_table; + extra_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; + extra_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; extra_args.type_value_to_cil = type_value_to_cil; + booleanif_args.db = db; + booleanif_args.pdb = pdb; + booleanif_args.cond_node = NULL; + booleanif_args.cond_flavor = CIL_NONE; + for (i = 1; i <= 3; i++) { extra_args.pass = i; @@ -5248,12 +5359,12 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p } if (i == 3) { - rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, pdb); + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &booleanif_args); if (rc != SEPOL_OK) { cil_log(CIL_INFO, "Failure creating avrulex rules\n"); goto exit; } - rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, pdb); + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &booleanif_args); if (rc != SEPOL_OK) { cil_log(CIL_INFO, "Failure creating avrulex rules\n"); goto exit; diff --git a/libsepol/cil/src/cil_build_ast.c b/libsepol/cil/src/cil_build_ast.c index 19fbb04e..8cc3f9b2 100644 --- a/libsepol/cil/src/cil_build_ast.c +++ b/libsepol/cil/src/cil_build_ast.c @@ -6158,7 +6158,11 @@ static int check_for_illegal_statement(struct cil_tree_node *parse_current, stru parse_current->data != CIL_KEY_AUDITALLOW && parse_current->data != CIL_KEY_TYPETRANSITION && parse_current->data != CIL_KEY_TYPECHANGE && - parse_current->data != CIL_KEY_TYPEMEMBER) { + parse_current->data != CIL_KEY_TYPEMEMBER && + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || + (parse_current->data != CIL_KEY_ALLOWX && + parse_current->data != CIL_KEY_DONTAUDITX && + parse_current->data != CIL_KEY_AUDITALLOWX))) { if (((struct cil_booleanif*)args->boolif->data)->preserved_tunable) { cil_tree_log(parse_current, CIL_ERR, "%s is not allowed in tunableif being treated as a booleanif", (char *)parse_current->data); } else { diff --git a/libsepol/cil/src/cil_resolve_ast.c b/libsepol/cil/src/cil_resolve_ast.c index da8863c4..a8fa89df 100644 --- a/libsepol/cil/src/cil_resolve_ast.c +++ b/libsepol/cil/src/cil_resolve_ast.c @@ -3848,9 +3848,11 @@ static int __cil_resolve_ast_node_helper(struct cil_tree_node *node, uint32_t *f node->flavor != CIL_CONDBLOCK && node->flavor != CIL_AVRULE && node->flavor != CIL_TYPE_RULE && - node->flavor != CIL_NAMETYPETRANSITION) { + node->flavor != CIL_NAMETYPETRANSITION && + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || + (node->flavor != CIL_AVRULEX))) { rc = SEPOL_ERR; - } else if (node->flavor == CIL_AVRULE) { + } else if (node->flavor == CIL_AVRULE || node->flavor == CIL_AVRULEX) { struct cil_avrule *rule = node->data; if (rule->rule_kind == CIL_AVRULE_NEVERALLOW) { rc = SEPOL_ERR; diff --git a/libsepol/cil/src/cil_verify.c b/libsepol/cil/src/cil_verify.c index 9621a247..550b4542 100644 --- a/libsepol/cil/src/cil_verify.c +++ b/libsepol/cil/src/cil_verify.c @@ -1101,7 +1101,8 @@ static int __cil_verify_booleanif_helper(struct cil_tree_node *node, __attribute struct cil_booleanif *bif = node->parent->parent->data; switch (rule_node->flavor) { - case CIL_AVRULE: { + case CIL_AVRULE: + case CIL_AVRULEX: { struct cil_avrule *avrule = NULL; avrule = rule_node->data; if (avrule->rule_kind == CIL_AVRULE_NEVERALLOW) { diff --git a/secilc/test/policy.cil b/secilc/test/policy.cil index e6b78618..d0d52d0d 100644 --- a/secilc/test/policy.cil +++ b/secilc/test/policy.cil @@ -47,8 +47,9 @@ (block policy (class file (execute_no_trans entrypoint execmod open audit_access a b c d e)) - ; order should be: file char b c a dir d e f - (classorder (file char)) + (class socket (nlmsg)) + ; order should be: file socket char b c a dir d e f + (classorder (file socket char)) (classorder (unordered dir)) (classorder (unordered c a b d e f)) (classorder (char b c a)) @@ -161,7 +162,10 @@ ;;(allow bad_t not_bad_type (file (execute))) ;;(allow bad_t exec_t (file (execute))) (neverallow bad_t not_bad_type (file (execute))) - + + (auditallowx getty_t console_device_t (ioctl file (range 0x1000 0x10FF))) + (auditallowx getty_t kernel_t (nlmsg socket (range 0x1000 0x10FF))) + (booleanif secure_mode (true (auditallow device_t exec_t (file (read write))) @@ -172,9 +176,12 @@ (true (typechange auditadm_t console_device_t file user_tty_device_t) (allow getty_t console_device_t (file (getattr open read write append))) + (auditallowx getty_t console_device_t (ioctl file (range 0x2000 0x21FF))) + (auditallowx getty_t kernel_t (nlmsg socket (0x1))) ) (false (dontaudit getty_t console_device_t (file (getattr open read write append))) + (dontauditx getty_t console_device_t (ioctl file (range 0x3000 0x31FF))) ) )