libsepol/cil: Sync checks for invalid rules in booleanifs
When building the AST, typemember rules in a booleanif block will be incorrectly called invalid. They are allowed in the kernel policy and should be allowed in CIL. When resolving the AST, if a neverallow rule is copied into a booleanif block, it will not be considered an invalid rule, even though this is not allowed in the kernel policy. Update the booleanif checks to allow typemember rules and to not allow neverallow rules in booleanifs. Also use the same form of conditional for the checks when building and resolving the AST. Signed-off-by: James Carter <jwcart2@gmail.com>
This commit is contained in:
parent
ef533c8fd9
commit
8a74c05b97
2 changed files with 17 additions and 9 deletions
|
@ -6130,7 +6130,8 @@ int __cil_build_ast_node_helper(struct cil_tree_node *parse_current, uint32_t *f
|
|||
parse_current->data != CIL_KEY_DONTAUDIT &&
|
||||
parse_current->data != CIL_KEY_AUDITALLOW &&
|
||||
parse_current->data != CIL_KEY_TYPETRANSITION &&
|
||||
parse_current->data != CIL_KEY_TYPECHANGE) {
|
||||
parse_current->data != CIL_KEY_TYPECHANGE &&
|
||||
parse_current->data != CIL_KEY_TYPEMEMBER) {
|
||||
rc = SEPOL_ERR;
|
||||
cil_tree_log(parse_current, CIL_ERR, "Found %s", (char*)parse_current->data);
|
||||
if (((struct cil_booleanif*)boolif->data)->preserved_tunable) {
|
||||
|
|
|
@ -3774,7 +3774,7 @@ exit:
|
|||
|
||||
int __cil_resolve_ast_node_helper(struct cil_tree_node *node, uint32_t *finished, void *extra_args)
|
||||
{
|
||||
int rc = SEPOL_ERR;
|
||||
int rc = SEPOL_OK;
|
||||
struct cil_args_resolve *args = extra_args;
|
||||
enum cil_pass pass = args->pass;
|
||||
struct cil_tree_node *block = args->block;
|
||||
|
@ -3817,18 +3817,25 @@ int __cil_resolve_ast_node_helper(struct cil_tree_node *node, uint32_t *finished
|
|||
}
|
||||
|
||||
if (boolif != NULL) {
|
||||
if (!(node->flavor == CIL_TUNABLEIF ||
|
||||
node->flavor == CIL_CALL ||
|
||||
node->flavor == CIL_CONDBLOCK ||
|
||||
node->flavor == CIL_AVRULE ||
|
||||
node->flavor == CIL_TYPE_RULE ||
|
||||
node->flavor == CIL_NAMETYPETRANSITION)) {
|
||||
if (node->flavor != CIL_TUNABLEIF &&
|
||||
node->flavor != CIL_CALL &&
|
||||
node->flavor != CIL_CONDBLOCK &&
|
||||
node->flavor != CIL_AVRULE &&
|
||||
node->flavor != CIL_TYPE_RULE &&
|
||||
node->flavor != CIL_NAMETYPETRANSITION) {
|
||||
rc = SEPOL_ERR;
|
||||
} else if (node->flavor == CIL_AVRULE) {
|
||||
struct cil_avrule *rule = node->data;
|
||||
if (rule->rule_kind == CIL_AVRULE_NEVERALLOW) {
|
||||
rc = SEPOL_ERR;
|
||||
}
|
||||
}
|
||||
if (rc == SEPOL_ERR) {
|
||||
if (((struct cil_booleanif*)boolif->data)->preserved_tunable) {
|
||||
cil_tree_log(node, CIL_ERR, "%s statement is not allowed in booleanifs (tunableif treated as a booleanif)", cil_node_to_string(node));
|
||||
} else {
|
||||
cil_tree_log(node, CIL_ERR, "%s statement is not allowed in booleanifs", cil_node_to_string(node));
|
||||
}
|
||||
rc = SEPOL_ERR;
|
||||
goto exit;
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue