Re: [patch] sepolgen: fix role-type associations and role allow rules

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2008-06-19 at 11:42 -0400, Joshua Brindle wrote:
> This was written by Karl but he is currently unable to send patches

Also need to fix it to extract the right type (the new type from the
transition, not the tcontext type) from the error message.
Use audit2allow -r < avc with the attached avc to test.

Correct output is:
require {
	type updpwd_t;
	role unconfined_r;
}

role unconfined_r types updpwd_t;

> 
> 
> -----
> 
> Index: policycoreutils/audit2allow/audit2allow
> ===================================================================
> --- policycoreutils/audit2allow/audit2allow	(revision 2913)
> +++ policycoreutils/audit2allow/audit2allow	(working copy)
> @@ -154,10 +154,10 @@
>          if self.__options.type:
>              avcfilter = audit.TypeFilter(self.__options.type)
>              self.__avs = self.__parser.to_access(avcfilter)
> -            self.__selinux_errs = self.__parser.to_role(avcfilter)
> +            self.__role_types = self.__parser.to_role(avcfilter)
>          else:
>              self.__avs = self.__parser.to_access()
> -            self.__selinux_errs = self.__parser.to_role()
> +            self.__role_types = self.__parser.to_role()
>  
>      def __load_interface_info(self):
>          # Load interface info file
> @@ -310,6 +310,7 @@
>  
>          # Generate the policy
>          g.add_access(self.__avs)
> +        g.add_role_types(self.__role_types)
>  
>          # Output
>          writer = output.ModuleWriter()
> @@ -328,12 +329,6 @@
>                  fd = sys.stdout
>              writer.write(g.get_module(), fd)
>  
> -            if len(self.__selinux_errs) > 0:
> -                fd.write("\n=========== ROLES ===============\n")
> -
> -            for role in self.__selinux_errs:
> -                fd.write(role.output())
> -
>      def main(self):
>          try:
>              self.__parse_options()
> Index: sepolgen/src/sepolgen/policygen.py
> ===================================================================
> --- sepolgen/src/sepolgen/policygen.py	(revision 2913)
> +++ sepolgen/src/sepolgen/policygen.py	(working copy)
> @@ -167,7 +167,14 @@
>          if self.gen_requires:
>              gen_requires(self.module)
>  
> +    def add_role_types(self, role_type_set):
> +        for role_type in role_type_set:
> +            self.module.children.append(role_type)
>  
> +        # Generate the requires
> +        if self.gen_requires:
> +            gen_requires(self.module)
> +
>  def explain_access(av, ml=None, verbosity=SHORT_EXPLANATION):
>      """Explain why a policy statement was generated.
>  
> @@ -334,8 +341,12 @@
>                  # can actually figure those out.
>                  r.types.add(arg)
>  
> +        for role_type in node.role_types():
> +            r.roles.add(role_type.role)
> +            r.types.update(role_type.types)
> +                
>          r.types.discard("self")
> -                
> +
>          node.children.insert(0, r)
>  
>      # FUTURE - this is untested on modules with any sort of
> Index: sepolgen/src/sepolgen/refpolicy.py
> ===================================================================
> --- sepolgen/src/sepolgen/refpolicy.py	(revision 2913)
> +++ sepolgen/src/sepolgen/refpolicy.py	(working copy)
> @@ -122,6 +122,12 @@
>      def roles(self):
>          return itertools.ifilter(lambda x: isinstance(x, Role), walktree(self))
>  
> +    def role_allows(self):
> +        return itertools.ifilter(lambda x: isinstance(x, RoleAllow), walktree(self))
> +
> +    def role_types(self):
> +        return itertools.ifilter(lambda x: isinstance(x, RoleType), walktree(self))
> +
>      def __str__(self):
>          if self.comment:
>              return str(self.comment) + "\n" + self.to_string()
> @@ -494,6 +500,15 @@
>          return "allow %s %s;" % (self.src_roles.to_comma_str(),
>                                   self.tgt_roles.to_comma_str())
>  
> +class RoleType(Leaf):
> +    def __init__(self, parent=None):
> +        Leaf.__init__(self, parent)
> +        self.role = ""
> +        self.types = IdSet()
> +
> +    def to_string(self):
> +        return "role %s types %s;" % (self.role, self.types.to_comma_str())
> +
>  class ModuleDeclaration(Leaf):
>      def __init__(self, parent=None):
>          Leaf.__init__(self, parent)
> Index: sepolgen/src/sepolgen/output.py
> ===================================================================
> --- sepolgen/src/sepolgen/output.py	(revision 2913)
> +++ sepolgen/src/sepolgen/output.py	(working copy)
> @@ -101,6 +101,8 @@
>          else:
>              return id_set_cmp(a.src_types, [b.args[0]])
>                  
> +def role_type_cmp(a, b):
> +    return cmp(a.role, b.role)
>  
>  def sort_filter(module):
>      """Sort and group the output for readability.
> @@ -146,6 +148,18 @@
>  
>          c.extend(sep_rules)
>  
> +
> +        ras = []
> +        ras.extend(node.role_types())
> +        ras.sort(role_type_cmp)
> +        if len(ras):
> +            comment = refpolicy.Comment()
> +            comment.lines.append("============= ROLES ==============")
> +            c.append(comment)
> +        
> +
> +        c.extend(ras)
> +
>          # Everything else
>          for child in node.children:
>              if child not in c:
> Index: sepolgen/src/sepolgen/access.py
> ===================================================================
> --- sepolgen/src/sepolgen/access.py	(revision 2913)
> +++ sepolgen/src/sepolgen/access.py	(working copy)
> @@ -295,3 +295,32 @@
>              perms[av.obj_class] = s
>          s.update(av.perms)
>      return perms
> +
> +class RoleTypeSet:
> +    """A non-overlapping set of role type statements.
> +
> +    This clas allows the incremental addition of role type statements and
> +    maintains a non-overlapping list of statements.
> +    """
> +    def __init__(self):
> +        """Initialize an access vector set."""
> +        self.role_types = {}
> +
> +    def __iter__(self):
> +        """Iterate over all of the unique role allows statements in the set."""
> +        for role_type in self.role_types.values():
> +            yield role_type
> +
> +    def __len__(self):
> +        """Return the unique number of role allow statements."""
> +        return len(self.roles)
> +
> +    def add(self, role, type):
> +        if self.role_types.has_key(role):
> +            role_type = self.role_types[role]
> +        else:
> +            role_type = refpolicy.RoleType()
> +            role_type.role = role
> +            self.role_types[role] = role_type
> +
> +        role_type.types.add(type)
> Index: sepolgen/src/sepolgen/audit.py
> ===================================================================
> --- sepolgen/src/sepolgen/audit.py	(revision 2913)
> +++ sepolgen/src/sepolgen/audit.py	(working copy)
> @@ -405,7 +405,7 @@
>          self.__post_process()
>  
>      def to_role(self, role_filter=None):
> -        """Return list of SELINUX_ERR messages matching the specified filter
> +        """Return RoleAllowSet statements matching the specified filter
>  
>          Filter out types that match the filer, or all roles
>  
> @@ -416,13 +416,12 @@
>             Access vector set representing the denied access in the
>             audit logs parsed by this object.
>          """
> -        roles = []
> -        if role_filter:
> -            for selinux_err in self.compute_sid_msgs:
> -                if role_filter.filter(selinux_err):
> -                    roles.append(selinux_err)
> -            return roles
> -        return self.compute_sid_msgs
> +        role_types = access.RoleTypeSet()
> +        for selinux_err in self.compute_sid_msgs:
> +            if not role_filter or role_filter.filter(selinux_err):
> +                role_types.add(selinux_err.role, selinux_err.type)
> +        
> +        return role_types
>  
>      def to_access(self, avc_filter=None, only_denials=True):
>          """Convert the audit logs access into a an access vector set.
-- 
Stephen Smalley
National Security Agency
type=SELINUX_ERR msg=audit(1213435029.953:3208): security_compute_sid:  invalid context unconfined_u:unconfined_r:updpwd_t:s0-s0:c0.c1023 for scontext=unconfined_u:unconfined_r:unconfined_crontab_t:s0-s0:c0.c1023 tcontext=system_u:object_r:updpwd_exec_t:s0 tclass=process


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux