2011-04-12 17:12:30 +00:00
|
|
|
diff --git a/checkpolicy/module_compiler.c b/checkpolicy/module_compiler.c
|
|
|
|
index d6ebd78..0946ff6 100644
|
|
|
|
--- a/checkpolicy/module_compiler.c
|
|
|
|
+++ b/checkpolicy/module_compiler.c
|
|
|
|
@@ -1313,6 +1313,18 @@ void append_role_allow(role_allow_rule_t * role_allow_rules)
|
2011-03-29 19:42:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* this doesn't actually append, but really prepends it */
|
|
|
|
+void append_filename_trans(filename_trans_rule_t * filename_trans_rules)
|
|
|
|
+{
|
|
|
|
+ avrule_decl_t *decl = stack_top->decl;
|
|
|
|
+
|
|
|
|
+ /* filename transitions are not allowed within conditionals */
|
|
|
|
+ assert(stack_top->type == 1);
|
|
|
|
+
|
|
|
|
+ filename_trans_rules->next = decl->filename_trans_rules;
|
|
|
|
+ decl->filename_trans_rules = filename_trans_rules;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+/* this doesn't actually append, but really prepends it */
|
|
|
|
void append_range_trans(range_trans_rule_t * range_tr_rules)
|
|
|
|
{
|
|
|
|
avrule_decl_t *decl = stack_top->decl;
|
2011-04-12 17:12:30 +00:00
|
|
|
diff --git a/checkpolicy/module_compiler.h b/checkpolicy/module_compiler.h
|
|
|
|
index fa91400..ae33753 100644
|
|
|
|
--- a/checkpolicy/module_compiler.h
|
|
|
|
+++ b/checkpolicy/module_compiler.h
|
2011-03-29 19:42:16 +00:00
|
|
|
@@ -80,6 +80,7 @@ void append_avrule(avrule_t * avrule);
|
|
|
|
void append_role_trans(role_trans_rule_t * role_tr_rules);
|
|
|
|
void append_role_allow(role_allow_rule_t * role_allow_rules);
|
|
|
|
void append_range_trans(range_trans_rule_t * range_tr_rules);
|
|
|
|
+void append_filename_trans(filename_trans_rule_t * filename_trans_rules);
|
|
|
|
|
|
|
|
/* Create a new optional block and add it to the global policy.
|
|
|
|
* During the second pass resolve the block's requirements. Return 0
|
2011-04-12 17:12:30 +00:00
|
|
|
diff --git a/checkpolicy/policy_define.c b/checkpolicy/policy_define.c
|
|
|
|
index 5e99b30..f75a682 100644
|
|
|
|
--- a/checkpolicy/policy_define.c
|
|
|
|
+++ b/checkpolicy/policy_define.c
|
|
|
|
@@ -2241,6 +2241,190 @@ int define_role_allow(void)
|
2011-03-29 19:42:16 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
+avrule_t *define_cond_filename_trans(void)
|
|
|
|
+{
|
|
|
|
+ yyerror("type transitions with a filename not allowed inside "
|
|
|
|
+ "conditionals\n");
|
|
|
|
+ return COND_ERR;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
+int define_filename_trans(void)
|
|
|
|
+{
|
|
|
|
+ char *id, *name = NULL;
|
|
|
|
+ type_set_t stypes, ttypes;
|
|
|
|
+ ebitmap_t e_stypes, e_ttypes;
|
|
|
|
+ ebitmap_t e_tclasses;
|
|
|
|
+ ebitmap_node_t *snode, *tnode, *cnode;
|
|
|
|
+ filename_trans_t *ft;
|
|
|
|
+ filename_trans_rule_t *ftr;
|
|
|
|
+ class_datum_t *cladatum;
|
|
|
|
+ type_datum_t *typdatum;
|
|
|
|
+ uint32_t otype;
|
|
|
|
+ unsigned int c, s, t;
|
|
|
|
+ int add;
|
|
|
|
+
|
|
|
|
+ if (pass == 1) {
|
|
|
|
+ /* stype */
|
|
|
|
+ while ((id = queue_remove(id_queue)))
|
|
|
|
+ free(id);
|
|
|
|
+ /* ttype */
|
|
|
|
+ while ((id = queue_remove(id_queue)))
|
|
|
|
+ free(id);
|
|
|
|
+ /* tclass */
|
|
|
|
+ while ((id = queue_remove(id_queue)))
|
|
|
|
+ free(id);
|
|
|
|
+ /* otype */
|
|
|
|
+ id = queue_remove(id_queue);
|
|
|
|
+ free(id);
|
|
|
|
+ /* name */
|
|
|
|
+ id = queue_remove(id_queue);
|
|
|
|
+ free(id);
|
|
|
|
+ return 0;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+
|
|
|
|
+ add = 1;
|
|
|
|
+ type_set_init(&stypes);
|
|
|
|
+ while ((id = queue_remove(id_queue))) {
|
|
|
|
+ if (set_types(&stypes, id, &add, 0))
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ add =1;
|
|
|
|
+ type_set_init(&ttypes);
|
|
|
|
+ while ((id = queue_remove(id_queue))) {
|
|
|
|
+ if (set_types(&ttypes, id, &add, 0))
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ ebitmap_init(&e_tclasses);
|
|
|
|
+ while ((id = queue_remove(id_queue))) {
|
|
|
|
+ if (!is_id_in_scope(SYM_CLASSES, id)) {
|
|
|
|
+ yyerror2("class %s is not within scope", id);
|
|
|
|
+ free(id);
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ cladatum = hashtab_search(policydbp->p_classes.table, id);
|
|
|
|
+ if (!cladatum) {
|
|
|
|
+ yyerror2("unknown class %s", id);
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ if (ebitmap_set_bit(&e_tclasses, cladatum->s.value - 1, TRUE)) {
|
|
|
|
+ yyerror("Out of memory");
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ free(id);
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ id = (char *)queue_remove(id_queue);
|
|
|
|
+ if (!id) {
|
|
|
|
+ yyerror("no otype in transition definition?");
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ if (!is_id_in_scope(SYM_TYPES, id)) {
|
|
|
|
+ yyerror2("type %s is not within scope", id);
|
|
|
|
+ free(id);
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ typdatum = hashtab_search(policydbp->p_types.table, id);
|
|
|
|
+ if (!typdatum) {
|
|
|
|
+ yyerror2("unknown type %s used in transition definition", id);
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ free(id);
|
|
|
|
+ otype = typdatum->s.value;
|
|
|
|
+
|
|
|
|
+ name = queue_remove(id_queue);
|
|
|
|
+ if (!name) {
|
|
|
|
+ yyerror("no pathname specified in filename_trans definition?");
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ /* We expand the class set into seperate rules. We expand the types
|
|
|
|
+ * just to make sure there are not duplicates. They will get turned
|
|
|
|
+ * into seperate rules later */
|
|
|
|
+ ebitmap_init(&e_stypes);
|
|
|
|
+ if (type_set_expand(&stypes, &e_stypes, policydbp, 1))
|
|
|
|
+ goto bad;
|
|
|
|
+
|
|
|
|
+ ebitmap_init(&e_ttypes);
|
|
|
|
+ if (type_set_expand(&ttypes, &e_ttypes, policydbp, 1))
|
|
|
|
+ goto bad;
|
|
|
|
+
|
|
|
|
+ ebitmap_for_each_bit(&e_tclasses, cnode, c) {
|
|
|
|
+ if (!ebitmap_node_get_bit(cnode, c))
|
|
|
|
+ continue;
|
|
|
|
+ ebitmap_for_each_bit(&e_stypes, snode, s) {
|
|
|
|
+ if (!ebitmap_node_get_bit(snode, s))
|
|
|
|
+ continue;
|
|
|
|
+ ebitmap_for_each_bit(&e_ttypes, tnode, t) {
|
|
|
|
+ if (!ebitmap_node_get_bit(tnode, t))
|
|
|
|
+ continue;
|
|
|
|
+
|
|
|
|
+ for (ft = policydbp->filename_trans; ft; ft = ft->next) {
|
|
|
|
+ if (ft->stype == (s + 1) &&
|
|
|
|
+ ft->ttype == (t + 1) &&
|
|
|
|
+ ft->tclass == (c + 1) &&
|
|
|
|
+ !strcmp(ft->name, name)) {
|
|
|
|
+ yyerror2("duplicate filename transition for: filename_trans %s %s %s:%s",
|
|
|
|
+ name,
|
|
|
|
+ policydbp->p_type_val_to_name[s],
|
|
|
|
+ policydbp->p_type_val_to_name[t],
|
|
|
|
+ policydbp->p_class_val_to_name[c]);
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ ft = malloc(sizeof(*ft));
|
|
|
|
+ if (!ft) {
|
|
|
|
+ yyerror("out of memory");
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ memset(ft, 0, sizeof(*ft));
|
|
|
|
+
|
|
|
|
+ ft->next = policydbp->filename_trans;
|
|
|
|
+ policydbp->filename_trans = ft;
|
|
|
|
+
|
|
|
|
+ ft->name = strdup(name);
|
|
|
|
+ if (!ft->name) {
|
|
|
|
+ yyerror("out of memory");
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ ft->stype = s + 1;
|
|
|
|
+ ft->ttype = t + 1;
|
|
|
|
+ ft->tclass = c + 1;
|
|
|
|
+ ft->otype = otype;
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ /* Now add the real rule since we didn't find any duplicates */
|
|
|
|
+ ftr = malloc(sizeof(*ftr));
|
|
|
|
+ if (!ftr) {
|
|
|
|
+ yyerror("out of memory");
|
|
|
|
+ goto bad;
|
|
|
|
+ }
|
|
|
|
+ filename_trans_rule_init(ftr);
|
|
|
|
+ append_filename_trans(ftr);
|
|
|
|
+
|
|
|
|
+ ftr->name = strdup(name);
|
|
|
|
+ ftr->stypes = stypes;
|
|
|
|
+ ftr->ttypes = ttypes;
|
|
|
|
+ ftr->tclass = c + 1;
|
|
|
|
+ ftr->otype = otype;
|
|
|
|
+ }
|
|
|
|
+
|
|
|
|
+ free(name);
|
|
|
|
+ ebitmap_destroy(&e_stypes);
|
|
|
|
+ ebitmap_destroy(&e_ttypes);
|
|
|
|
+ ebitmap_destroy(&e_tclasses);
|
|
|
|
+
|
|
|
|
+ return 0;
|
|
|
|
+
|
|
|
|
+bad:
|
|
|
|
+ free(name);
|
|
|
|
+ return -1;
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
static constraint_expr_t *constraint_expr_clone(constraint_expr_t * expr)
|
|
|
|
{
|
|
|
|
constraint_expr_t *h = NULL, *l = NULL, *e, *newe;
|
2011-04-12 17:12:30 +00:00
|
|
|
diff --git a/checkpolicy/policy_define.h b/checkpolicy/policy_define.h
|
|
|
|
index 2f7a78f..890a6af 100644
|
|
|
|
--- a/checkpolicy/policy_define.h
|
|
|
|
+++ b/checkpolicy/policy_define.h
|
2011-03-29 19:42:16 +00:00
|
|
|
@@ -16,6 +16,7 @@
|
|
|
|
avrule_t *define_cond_compute_type(int which);
|
|
|
|
avrule_t *define_cond_pol_list(avrule_t *avlist, avrule_t *stmt);
|
|
|
|
avrule_t *define_cond_te_avtab(int which);
|
|
|
|
+avrule_t *define_cond_filename_trans(void);
|
|
|
|
cond_expr_t *define_cond_expr(uint32_t expr_type, void *arg1, void* arg2);
|
|
|
|
int define_attrib(void);
|
|
|
|
int define_av_perms(int inherits);
|
2011-04-12 17:12:30 +00:00
|
|
|
@@ -47,6 +48,7 @@ int define_range_trans(int class_specified);
|
2011-03-29 19:42:16 +00:00
|
|
|
int define_role_allow(void);
|
2011-04-12 17:12:30 +00:00
|
|
|
int define_role_trans(int class_specified);
|
2011-03-29 19:42:16 +00:00
|
|
|
int define_role_types(void);
|
|
|
|
+int define_filename_trans(void);
|
|
|
|
int define_sens(void);
|
|
|
|
int define_te_avtab(int which);
|
|
|
|
int define_typealias(void);
|
2011-04-12 17:12:30 +00:00
|
|
|
diff --git a/checkpolicy/policy_parse.y b/checkpolicy/policy_parse.y
|
|
|
|
index 8c29e2b..8274d36 100644
|
|
|
|
--- a/checkpolicy/policy_parse.y
|
|
|
|
+++ b/checkpolicy/policy_parse.y
|
|
|
|
@@ -81,6 +81,7 @@ typedef int (* require_func_t)();
|
|
|
|
%type <require_func> require_decl_def
|
|
|
|
|
|
|
|
%token PATH
|
|
|
|
+%token FILENAME
|
|
|
|
%token CLONE
|
|
|
|
%token COMMON
|
|
|
|
%token CLASS
|
|
|
|
@@ -341,7 +342,10 @@ cond_rule_def : cond_transition_def
|
2011-03-29 19:42:16 +00:00
|
|
|
| require_block
|
|
|
|
{ $$ = NULL; }
|
|
|
|
;
|
|
|
|
-cond_transition_def : TYPE_TRANSITION names names ':' names identifier ';'
|
2011-04-12 17:12:30 +00:00
|
|
|
+cond_transition_def : TYPE_TRANSITION names names ':' names identifier filename ';'
|
2011-03-29 19:42:16 +00:00
|
|
|
+ { $$ = define_cond_filename_trans() ;
|
|
|
|
+ if ($$ == COND_ERR) return -1;}
|
|
|
|
+ | TYPE_TRANSITION names names ':' names identifier ';'
|
|
|
|
{ $$ = define_cond_compute_type(AVRULE_TRANSITION) ;
|
|
|
|
if ($$ == COND_ERR) return -1;}
|
|
|
|
| TYPE_MEMBER names names ':' names identifier ';'
|
2011-04-12 17:12:30 +00:00
|
|
|
@@ -376,7 +380,9 @@ cond_dontaudit_def : DONTAUDIT names names ':' names names ';'
|
2011-03-29 19:42:16 +00:00
|
|
|
{ $$ = define_cond_te_avtab(AVRULE_DONTAUDIT);
|
|
|
|
if ($$ == COND_ERR) return -1; }
|
|
|
|
;
|
|
|
|
-transition_def : TYPE_TRANSITION names names ':' names identifier ';'
|
2011-04-12 17:12:30 +00:00
|
|
|
+transition_def : TYPE_TRANSITION names names ':' names identifier filename';'
|
|
|
|
+ {if (define_filename_trans()) return -1; }
|
|
|
|
+ |TYPE_TRANSITION names names ':' names identifier ';'
|
2011-03-29 19:42:16 +00:00
|
|
|
{if (define_compute_type(AVRULE_TRANSITION)) return -1;}
|
|
|
|
| TYPE_MEMBER names names ':' names identifier ';'
|
|
|
|
{if (define_compute_type(AVRULE_MEMBER)) return -1;}
|
2011-04-12 17:12:30 +00:00
|
|
|
@@ -639,7 +645,7 @@ opt_fs_uses : fs_uses
|
|
|
|
fs_uses : fs_use_def
|
|
|
|
| fs_uses fs_use_def
|
|
|
|
;
|
|
|
|
-fs_use_def : FSUSEXATTR identifier security_context_def ';'
|
|
|
|
+fs_use_def : FSUSEXATTR filename security_context_def ';'
|
|
|
|
{if (define_fs_use(SECURITY_FS_USE_XATTR)) return -1;}
|
|
|
|
| FSUSETASK identifier security_context_def ';'
|
|
|
|
{if (define_fs_use(SECURITY_FS_USE_TASK)) return -1;}
|
|
|
|
@@ -652,11 +658,11 @@ opt_genfs_contexts : genfs_contexts
|
|
|
|
genfs_contexts : genfs_context_def
|
|
|
|
| genfs_contexts genfs_context_def
|
|
|
|
;
|
|
|
|
-genfs_context_def : GENFSCON identifier path '-' identifier security_context_def
|
|
|
|
+genfs_context_def : GENFSCON filename path '-' identifier security_context_def
|
|
|
|
{if (define_genfs_context(1)) return -1;}
|
|
|
|
- | GENFSCON identifier path '-' '-' {insert_id("-", 0);} security_context_def
|
|
|
|
+ | GENFSCON filename path '-' '-' {insert_id("-", 0);} security_context_def
|
|
|
|
{if (define_genfs_context(1)) return -1;}
|
|
|
|
- | GENFSCON identifier path security_context_def
|
|
|
|
+ | GENFSCON filename path security_context_def
|
|
|
|
{if (define_genfs_context(0)) return -1;}
|
|
|
|
;
|
|
|
|
ipv4_addr_def : IPV4_ADDR
|
|
|
|
@@ -733,6 +739,17 @@ identifier : IDENTIFIER
|
|
|
|
path : PATH
|
|
|
|
{ if (insert_id(yytext,0)) return -1; }
|
|
|
|
;
|
|
|
|
+filename : FILENAME
|
|
|
|
+ { if (insert_id(yytext,0)) return -1; }
|
|
|
|
+ | NUMBER
|
|
|
|
+ { if (insert_id(yytext,0)) return -1; }
|
|
|
|
+ | IPV4_ADDR
|
|
|
|
+ { if (insert_id(yytext,0)) return -1; }
|
|
|
|
+ | VERSION_IDENTIFIER
|
|
|
|
+ { if (insert_id(yytext,0)) return -1; }
|
|
|
|
+ | IDENTIFIER
|
|
|
|
+ { if (insert_id(yytext,0)) return -1; }
|
|
|
|
+ ;
|
|
|
|
number : NUMBER
|
|
|
|
{ $$ = strtoul(yytext,NULL,0); }
|
|
|
|
;
|
|
|
|
@@ -757,6 +774,8 @@ module_def : MODULE identifier version_identifier ';'
|
|
|
|
;
|
|
|
|
version_identifier : VERSION_IDENTIFIER
|
|
|
|
{ if (insert_id(yytext,0)) return -1; }
|
|
|
|
+ | number
|
|
|
|
+ { if (insert_id(yytext,0)) return -1; }
|
|
|
|
| ipv4_addr_def /* version can look like ipv4 address */
|
|
|
|
;
|
|
|
|
avrules_block : avrule_decls avrule_user_defs
|
|
|
|
diff --git a/checkpolicy/policy_scan.l b/checkpolicy/policy_scan.l
|
2011-04-15 18:10:50 +00:00
|
|
|
index 48128a8..1331c04 100644
|
2011-04-12 17:12:30 +00:00
|
|
|
--- a/checkpolicy/policy_scan.l
|
|
|
|
+++ b/checkpolicy/policy_scan.l
|
2011-04-15 18:10:50 +00:00
|
|
|
@@ -218,9 +218,13 @@ PERMISSIVE { return(PERMISSIVE); }
|
2011-04-12 17:12:30 +00:00
|
|
|
"/"({alnum}|[_\.\-/])* { return(PATH); }
|
|
|
|
{letter}({alnum}|[_\-])*([\.]?({alnum}|[_\-]))* { return(IDENTIFIER); }
|
|
|
|
{digit}+|0x{hexval}+ { return(NUMBER); }
|
|
|
|
+{alnum}* { return(FILENAME); }
|
2011-04-15 18:10:50 +00:00
|
|
|
+\.({alnum}|[_\.\-])* { return(FILENAME); }
|
2011-04-12 17:12:30 +00:00
|
|
|
{digit}{1,3}(\.{digit}{1,3}){3} { return(IPV4_ADDR); }
|
|
|
|
{hexval}{0,4}":"{hexval}{0,4}":"({hexval}|[:.])* { return(IPV6_ADDR); }
|
|
|
|
{digit}+(\.({alnum}|[_.])*)? { return(VERSION_IDENTIFIER); }
|
2011-04-15 18:10:50 +00:00
|
|
|
+{letter}+([-_\.]|{alnum})+ { return(FILENAME); }
|
2011-04-12 17:12:30 +00:00
|
|
|
+([_\.]){alnum}+ { return(FILENAME); }
|
|
|
|
#line[ ]1[ ]\"[^\n]*\" { set_source_file(yytext+9); }
|
|
|
|
#line[ ]{digit}+ { source_lineno = atoi(yytext+6)-1; }
|
|
|
|
#[^\n]* { /* delete comments */ }
|
|
|
|
diff --git a/checkpolicy/test/dismod.c b/checkpolicy/test/dismod.c
|
|
|
|
index 33a29e4..66f976f 100644
|
|
|
|
--- a/checkpolicy/test/dismod.c
|
|
|
|
+++ b/checkpolicy/test/dismod.c
|
|
|
|
@@ -45,6 +45,15 @@
|
|
|
|
#define le32_to_cpu(x) bswap_32(x)
|
|
|
|
#endif
|
2011-03-29 19:42:16 +00:00
|
|
|
|
2011-04-12 17:12:30 +00:00
|
|
|
+#define DISPLAY_AVBLOCK_COND_AVTAB 0
|
|
|
|
+#define DISPLAY_AVBLOCK_UNCOND_AVTAB 1
|
|
|
|
+#define DISPLAY_AVBLOCK_ROLE_TYPE_NODE 2 /* unused? */
|
|
|
|
+#define DISPLAY_AVBLOCK_ROLE_TRANS 3
|
|
|
|
+#define DISPLAY_AVBLOCK_ROLE_ALLOW 4
|
|
|
|
+#define DISPLAY_AVBLOCK_REQUIRES 5
|
|
|
|
+#define DISPLAY_AVBLOCK_DECLARES 6
|
|
|
|
+#define DISPLAY_AVBLOCK_FILENAME_TRANS 7
|
|
|
|
+
|
2011-03-29 19:42:16 +00:00
|
|
|
static policydb_t policydb;
|
|
|
|
extern unsigned int ss_initialized;
|
2011-04-12 17:12:30 +00:00
|
|
|
|
|
|
|
@@ -497,6 +506,18 @@ void display_role_allow(role_allow_rule_t * ra, policydb_t * p, FILE * fp)
|
2011-03-29 19:42:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
+void display_filename_trans(filename_trans_rule_t * tr, policydb_t * p, FILE * fp)
|
|
|
|
+{
|
|
|
|
+ for (; tr; tr = tr->next) {
|
|
|
|
+ fprintf(fp, "filename transition %s", tr->name);
|
|
|
|
+ display_type_set(&tr->stypes, 0, p, fp);
|
|
|
|
+ display_type_set(&tr->ttypes, 0, p, fp);
|
|
|
|
+ display_id(p, fp, SYM_CLASSES, tr->tclass - 1, ":");
|
|
|
|
+ display_id(p, fp, SYM_TYPES, tr->otype - 1, "");
|
|
|
|
+ fprintf(fp, "\n");
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
int role_display_callback(hashtab_key_t key, hashtab_datum_t datum, void *data)
|
|
|
|
{
|
|
|
|
role_datum_t *role;
|
2011-04-12 17:12:30 +00:00
|
|
|
@@ -596,7 +617,7 @@ int display_avdecl(avrule_decl_t * decl, int field, uint32_t what,
|
|
|
|
fprintf(out_fp, "decl %u:%s\n", decl->decl_id,
|
|
|
|
(decl->enabled ? " [enabled]" : ""));
|
|
|
|
switch (field) {
|
|
|
|
- case 0:{
|
|
|
|
+ case DISPLAY_AVBLOCK_COND_AVTAB:{
|
|
|
|
cond_list_t *cond = decl->cond_list;
|
|
|
|
avrule_t *avrule;
|
|
|
|
while (cond) {
|
|
|
|
@@ -624,7 +645,7 @@ int display_avdecl(avrule_decl_t * decl, int field, uint32_t what,
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
- case 1:{
|
|
|
|
+ case DISPLAY_AVBLOCK_UNCOND_AVTAB:{
|
|
|
|
avrule_t *avrule = decl->avrules;
|
|
|
|
if (avrule == NULL) {
|
|
|
|
fprintf(out_fp, " <empty>\n");
|
|
|
|
@@ -638,32 +659,37 @@ int display_avdecl(avrule_decl_t * decl, int field, uint32_t what,
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
- case 2:{ /* role_type_node */
|
|
|
|
+ case DISPLAY_AVBLOCK_ROLE_TYPE_NODE:{ /* role_type_node */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
- case 3:{
|
|
|
|
+ case DISPLAY_AVBLOCK_ROLE_TRANS:{
|
|
|
|
display_role_trans(decl->role_tr_rules, policy, out_fp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
- case 4:{
|
|
|
|
+ case DISPLAY_AVBLOCK_ROLE_ALLOW:{
|
|
|
|
display_role_allow(decl->role_allow_rules, policy,
|
|
|
|
out_fp);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
- case 5:{
|
|
|
|
+ case DISPLAY_AVBLOCK_REQUIRES:{
|
|
|
|
if (display_scope_index
|
|
|
|
(&decl->required, policy, out_fp)) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
- case 6:{
|
|
|
|
+ case DISPLAY_AVBLOCK_DECLARES:{
|
|
|
|
if (display_scope_index
|
|
|
|
(&decl->declared, policy, out_fp)) {
|
|
|
|
return -1;
|
2011-03-29 19:42:16 +00:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
+ case DISPLAY_AVBLOCK_FILENAME_TRANS:
|
|
|
|
+ display_filename_trans(decl->filename_trans_rules, policy,
|
|
|
|
+ out_fp);
|
|
|
|
+ return -1;
|
|
|
|
+ break;
|
|
|
|
default:{
|
|
|
|
assert(0);
|
|
|
|
}
|
2011-04-12 17:12:30 +00:00
|
|
|
@@ -829,6 +855,7 @@ int menu()
|
2011-03-29 19:42:16 +00:00
|
|
|
printf("c) Display policy capabilities\n");
|
|
|
|
printf("l) Link in a module\n");
|
|
|
|
printf("u) Display the unknown handling setting\n");
|
|
|
|
+ printf("F) Display filename_trans rules\n");
|
|
|
|
printf("\n");
|
|
|
|
printf("f) set output file\n");
|
|
|
|
printf("m) display menu\n");
|
2011-04-12 17:12:30 +00:00
|
|
|
@@ -886,15 +913,16 @@ int main(int argc, char **argv)
|
|
|
|
fgets(ans, sizeof(ans), stdin);
|
|
|
|
switch (ans[0]) {
|
|
|
|
|
|
|
|
- case '1':{
|
|
|
|
- fprintf(out_fp, "unconditional avtab:\n");
|
|
|
|
- display_avblock(1, RENDER_UNCONDITIONAL,
|
|
|
|
- &policydb, out_fp);
|
|
|
|
- break;
|
|
|
|
- }
|
|
|
|
+ case '1':
|
|
|
|
+ fprintf(out_fp, "unconditional avtab:\n");
|
|
|
|
+ display_avblock(DISPLAY_AVBLOCK_UNCOND_AVTAB,
|
|
|
|
+ RENDER_UNCONDITIONAL, &policydb,
|
|
|
|
+ out_fp);
|
|
|
|
+ break;
|
|
|
|
case '2':
|
|
|
|
fprintf(out_fp, "conditional avtab:\n");
|
|
|
|
- display_avblock(0, RENDER_UNCONDITIONAL, &policydb,
|
|
|
|
+ display_avblock(DISPLAY_AVBLOCK_COND_AVTAB,
|
|
|
|
+ RENDER_UNCONDITIONAL, &policydb,
|
|
|
|
out_fp);
|
|
|
|
break;
|
|
|
|
case '3':
|
|
|
|
@@ -917,11 +945,13 @@ int main(int argc, char **argv)
|
|
|
|
break;
|
|
|
|
case '7':
|
|
|
|
fprintf(out_fp, "role transitions:\n");
|
|
|
|
- display_avblock(3, 0, &policydb, out_fp);
|
|
|
|
+ display_avblock(DISPLAY_AVBLOCK_ROLE_TRANS, 0,
|
|
|
|
+ &policydb, out_fp);
|
|
|
|
break;
|
|
|
|
case '8':
|
|
|
|
fprintf(out_fp, "role allows:\n");
|
|
|
|
- display_avblock(4, 0, &policydb, out_fp);
|
|
|
|
+ display_avblock(DISPLAY_AVBLOCK_ROLE_ALLOW, 0,
|
|
|
|
+ &policydb, out_fp);
|
|
|
|
break;
|
|
|
|
case '9':
|
|
|
|
display_policycon(&policydb, out_fp);
|
|
|
|
@@ -931,11 +961,13 @@ int main(int argc, char **argv)
|
|
|
|
break;
|
|
|
|
case 'a':
|
|
|
|
fprintf(out_fp, "avrule block requirements:\n");
|
|
|
|
- display_avblock(5, 0, &policydb, out_fp);
|
|
|
|
+ display_avblock(DISPLAY_AVBLOCK_REQUIRES, 0,
|
|
|
|
+ &policydb, out_fp);
|
|
|
|
break;
|
|
|
|
case 'b':
|
|
|
|
fprintf(out_fp, "avrule block declarations:\n");
|
|
|
|
- display_avblock(6, 0, &policydb, out_fp);
|
|
|
|
+ display_avblock(DISPLAY_AVBLOCK_DECLARES, 0,
|
|
|
|
+ &policydb, out_fp);
|
|
|
|
break;
|
|
|
|
case 'c':
|
|
|
|
display_policycaps(&policydb, out_fp);
|
|
|
|
@@ -959,6 +991,11 @@ int main(int argc, char **argv)
|
2011-03-29 19:42:16 +00:00
|
|
|
if (out_fp != stdout)
|
|
|
|
printf("\nOutput to file: %s\n", OutfileName);
|
|
|
|
break;
|
|
|
|
+ case 'F':
|
|
|
|
+ fprintf(out_fp, "filename_trans rules:\n");
|
|
|
|
+ display_avblock(DISPLAY_AVBLOCK_FILENAME_TRANS,
|
|
|
|
+ 0, &policydb, out_fp);
|
|
|
|
+ break;
|
|
|
|
case 'l':
|
|
|
|
link_module(&policydb, out_fp);
|
|
|
|
break;
|
2011-04-12 17:12:30 +00:00
|
|
|
diff --git a/checkpolicy/test/dispol.c b/checkpolicy/test/dispol.c
|
|
|
|
index f8c05e6..ee2cf02 100644
|
|
|
|
--- a/checkpolicy/test/dispol.c
|
|
|
|
+++ b/checkpolicy/test/dispol.c
|
|
|
|
@@ -341,6 +341,21 @@ static void display_permissive(policydb_t *p, FILE *fp)
|
2011-03-29 19:42:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
+static void display_filename_trans(policydb_t *p, FILE *fp)
|
|
|
|
+{
|
|
|
|
+ filename_trans_t *ft;
|
|
|
|
+
|
|
|
|
+ fprintf(fp, "filename_trans rules:\n");
|
|
|
|
+ for (ft = p->filename_trans; ft; ft = ft->next) {
|
|
|
|
+ fprintf(fp, "%s\n", ft->name);
|
|
|
|
+ display_id(p, fp, SYM_TYPES, ft->stype - 1, "");
|
|
|
|
+ display_id(p, fp, SYM_TYPES, ft->ttype - 1, "");
|
|
|
|
+ display_id(p, fp, SYM_CLASSES, ft->tclass - 1, ":");
|
|
|
|
+ display_id(p, fp, SYM_TYPES, ft->otype - 1, "");
|
|
|
|
+ fprintf(fp, "\n");
|
|
|
|
+ }
|
|
|
|
+}
|
|
|
|
+
|
|
|
|
int menu()
|
|
|
|
{
|
|
|
|
printf("\nSelect a command:\n");
|
|
|
|
@@ -355,6 +370,8 @@ int menu()
|
|
|
|
printf("c) display policy capabilities\n");
|
|
|
|
printf("p) display the list of permissive types\n");
|
|
|
|
printf("u) display unknown handling setting\n");
|
|
|
|
+ printf("F) display filename_trans rules\n");
|
|
|
|
+ printf("\n");
|
|
|
|
printf("f) set output file\n");
|
|
|
|
printf("m) display menu\n");
|
|
|
|
printf("q) quit\n");
|
|
|
|
@@ -492,6 +509,9 @@ int main(int argc, char **argv)
|
|
|
|
if (out_fp != stdout)
|
|
|
|
printf("\nOutput to file: %s\n", OutfileName);
|
|
|
|
break;
|
|
|
|
+ case 'F':
|
|
|
|
+ display_filename_trans(&policydb, out_fp);
|
|
|
|
+ break;
|
|
|
|
case 'q':
|
|
|
|
policydb_destroy(&policydb);
|
|
|
|
exit(0);
|