On Mon, 28 Oct 2024 at 16:17, James Carter <jwcart2@xxxxxxxxx> wrote: > > On Fri, Oct 25, 2024 at 12:12 PM Christian Göttsche > <cgoettsche@xxxxxxxxxxxxx> wrote: > > > > From: Christian Göttsche <cgzones@xxxxxxxxxxxxxx> > > > > Add support for extended permission rules in conditional policies. > > > > Signed-off-by: Christian Göttsche <cgzones@xxxxxxxxxxxxxx> > > Testing reveals a couple of issues handling assertions in CIL that > works as expected in checkpolicy. > > (type tp21) > (boolean bb02 true) > (booleanif bb02 > (true > (allow tp21 tpx (clx (ioctl))) > (allowx tp21 tpx (ioctl clx (0x1101))) > ) > ) > (neverallowx tp21 tpx (ioctl clx (0x4101))) > This neverallowx should is not a violation, but is reported as one. > > (type tp51) > (boolean bb05 true) > (allow tp51 tpx (clx (ioctl))) > (booleanif bb05 > (true > (allowx tp51 tpx (ioctl clx (0x1101))) > ) > (false > (allowx tp51 tpx (ioctl clx (0x1101))) > ) > ) > (neverallowx tp51 tpx (ioctl clx (0x4101))) > Same for this neverallowx. It is not a violation, but is reported as one. > > CIL does most of its checking using libsepol, so I am not sure what > the problem is. Thanks again for testing. It seems CIL is setting the ioctl/nlmsg permission bit into the `data` member of `avtab_datum_t` for extended av rules while checkpolicy is not. The following fixup for patch 3/6 solves the issue for me: diff --git a/libsepol/src/assertion.c b/libsepol/src/assertion.c index 20a368e4..2a9ae6e0 100644 --- a/libsepol/src/assertion.c +++ b/libsepol/src/assertion.c @@ -546,7 +546,7 @@ static bool check_assertion_extended_permissions_avtab(const avrule_t *narule, if (!match_node_key(node, &tmp_key)) continue; - if (match_any_class_permissions(narule->perms, node->key.target_class, node->datum.data)) { + if ((node->key.specified & AVTAB_ALLOWED) && match_any_class_permissions(narule->perms, node->key.target_class, node->datum.data)) { found_true_base = true; continue; } @@ -607,7 +607,7 @@ static bool check_assertion_extended_permissions_avtab(const avrule_t *narule, if (!match_node_key(node, &tmp_key)) continue; - if (match_any_class_permissions(narule->perms, node->key.target_class, node->datum.data)) { + if ((node->key.specified & AVTAB_ALLOWED) && match_any_class_permissions(narule->perms, node->key.target_class, node->datum.data)) { found_false_base = true; continue; } > > Thanks, > Jim > > > > --- > > libsepol/cil/src/cil_binary.c | 153 +++++++++++++++++++++++++---- > > libsepol/cil/src/cil_build_ast.c | 6 +- > > libsepol/cil/src/cil_resolve_ast.c | 6 +- > > libsepol/cil/src/cil_verify.c | 3 +- > > secilc/test/policy.cil | 13 ++- > > 5 files changed, 153 insertions(+), 28 deletions(-) > > > > diff --git a/libsepol/cil/src/cil_binary.c b/libsepol/cil/src/cil_binary.c > > index 3dec1883..086dccb0 100644 > > --- a/libsepol/cil/src/cil_binary.c > > +++ b/libsepol/cil/src/cil_binary.c > > @@ -59,14 +59,18 @@ > > #define AVRULEX_TABLE_SIZE (1 << 10) > > #define PERMS_PER_CLASS 32 > > > > +struct cil_args_xperm_tables { > > + hashtab_t ioctl; > > + hashtab_t nlmsg; > > +}; > > + > > struct cil_args_binary { > > const struct cil_db *db; > > policydb_t *pdb; > > struct cil_list *neverallows; > > int pass; > > hashtab_t role_trans_table; > > - hashtab_t avrulex_ioctl_table; > > - hashtab_t avrulex_nlmsg_table; > > + struct cil_args_xperm_tables avrulex_xperm_tables; > > void **type_value_to_cil; > > }; > > > > @@ -75,8 +79,14 @@ struct cil_args_booleanif { > > policydb_t *pdb; > > cond_node_t *cond_node; > > enum cil_flavor cond_flavor; > > + struct cil_args_xperm_tables avrulex_xperm_tables; > > }; > > > > +static unsigned int avrulex_hash(__attribute__((unused)) hashtab_t h, const_hashtab_key_t key); > > +static int avrulex_compare(hashtab_t h > > + __attribute__ ((unused)), const_hashtab_key_t key1, > > + const_hashtab_key_t key2); > > + > > static int __cil_get_sepol_user_datum(policydb_t *pdb, struct cil_symtab_datum *datum, user_datum_t **sepol_user) > > { > > *sepol_user = hashtab_search(pdb->p_users.table, datum->fqn); > > @@ -1762,7 +1772,10 @@ static int __cil_permx_bitmap_to_sepol_xperms_list(uint32_t kind, ebitmap_t *xpe > > static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datum, uint32_t xperm_kind, void *args) > > { > > int rc = SEPOL_OK; > > - struct policydb *pdb; > > + struct cil_args_booleanif *booleanif_args = args; > > + struct policydb *pdb = booleanif_args->pdb; > > + cond_node_t *cond_node = booleanif_args->cond_node; > > + enum cil_flavor cond_flavor = booleanif_args->cond_flavor; > > avtab_key_t *avtab_key; > > avtab_datum_t avtab_datum; > > struct cil_list *xperms_list = NULL; > > @@ -1772,7 +1785,6 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu > > char *kind = NULL; > > > > avtab_key = (avtab_key_t *)k; > > - pdb = args; > > > > sepol_obj = pdb->class_val_to_struct[avtab_key->target_class - 1]; > > > > @@ -1793,7 +1805,12 @@ static int __cil_avrulex_xperm_to_policydb(hashtab_key_t k, hashtab_datum_t datu > > > > cil_list_for_each(item, xperms_list) { > > avtab_datum.xperms = item->data; > > - rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); > > + > > + if (cond_node) { > > + rc = __cil_cond_insert_rule(&pdb->te_cond_avtab, avtab_key, &avtab_datum, cond_node, cond_flavor); > > + } else { > > + rc = avtab_insert(&pdb->te_avtab, avtab_key, &avtab_datum); > > + } > > if (rc != SEPOL_OK) { > > goto exit; > > } > > @@ -1876,7 +1893,7 @@ exit: > > return rc; > > } > > > > -static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_binary *args) > > +static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, struct cil_symtab_datum *src, struct cil_symtab_datum *tgt, struct cil_permissionx *permx, struct cil_args_xperm_tables *xt) > > { > > int rc = SEPOL_ERR; > > type_datum_t *sepol_src = NULL; > > @@ -1899,11 +1916,11 @@ static int __cil_avrulex_to_hashtable_helper(policydb_t *pdb, uint16_t kind, str > > > > switch (permx->kind) { > > case CIL_PERMX_KIND_IOCTL: > > - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_ioctl_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > + rc = __cil_avrulex_xperm_to_hashtable(xt->ioctl, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > if (rc != SEPOL_OK) goto exit; > > break; > > case CIL_PERMX_KIND_NLMSG: > > - rc = __cil_avrulex_xperm_to_hashtable(args->avrulex_nlmsg_table, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > + rc = __cil_avrulex_xperm_to_hashtable(xt->nlmsg, kind, sepol_src->s.value, sepol_tgt->s.value, sepol_obj->s.value, permx->perms); > > if (rc != SEPOL_OK) goto exit; > > break; > > default: > > @@ -1920,7 +1937,7 @@ exit: > > return rc; > > } > > > > -static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_binary *args) > > +static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, struct cil_avrule *cil_avrulex, struct cil_args_xperm_tables *xt) > > { > > int rc = SEPOL_ERR; > > uint16_t kind; > > @@ -1946,7 +1963,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > > > ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { > > src = DATUM(db->val_to_type[s]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, src, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > goto exit; > > @@ -1964,7 +1981,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > for (t = 0; t < (unsigned int)db->num_types; t++) { > > if (s != t) { > > tgt = DATUM(db->val_to_type[t]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > goto exit; > > @@ -1984,7 +2001,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&src_bitmap, tnode, t) { > > if (s != t) { > > tgt = DATUM(db->val_to_type[t]); > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > goto exit; > > @@ -1998,7 +2015,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > int expand_tgt = __cil_should_expand_attribute(db, tgt); > > > > if (!expand_src && !expand_tgt) { > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > goto exit; > > } > > @@ -2019,7 +2036,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { > > tgt = DATUM(db->val_to_type[t]); > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > ebitmap_destroy(&tgt_bitmap); > > @@ -2038,7 +2055,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&src_bitmap, snode, s) { > > src = DATUM(db->val_to_type[s]); > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&src_bitmap); > > goto exit; > > @@ -2054,7 +2071,7 @@ static int cil_avrulex_to_hashtable(policydb_t *pdb, const struct cil_db *db, st > > ebitmap_for_each_positive_bit(&tgt_bitmap, tnode, t) { > > tgt = DATUM(db->val_to_type[t]); > > > > - rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, args); > > + rc = __cil_avrulex_to_hashtable_helper(pdb, kind, src, tgt, cil_avrulex->perms.x.permx, xt); > > if (rc != SEPOL_OK) { > > ebitmap_destroy(&tgt_bitmap); > > goto exit; > > @@ -2123,6 +2140,21 @@ static int __cil_cond_to_policydb_helper(struct cil_tree_node *node, __attribute > > goto exit; > > } > > break; > > + case CIL_AVRULEX: > > + if (db->policy_version < POLICYDB_VERSION_COND_XPERMS) { > > + cil_tree_log(node, CIL_ERR, "Extended permission rules are not supported in policy version %d\n", > > + db->policy_version); > > + rc = SEPOL_ERR; > > + goto exit; > > + } > > + cil_avrule = node->data; > > + rc = cil_avrulex_to_hashtable(pdb, db, cil_avrule, &args->avrulex_xperm_tables); > > + if (rc != SEPOL_OK) { > > + cil_tree_log(node, CIL_ERR, "Failed to insert avrulex into avtab"); > > + goto exit; > > + } > > + break; > > + > > case CIL_CALL: > > case CIL_TUNABLEIF: > > break; > > @@ -2429,6 +2461,8 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c > > int was_created; > > int swapped = CIL_FALSE; > > cond_av_list_t tmp_cl; > > + hashtab_t avrulex_ioctl_table = NULL; > > + hashtab_t avrulex_nlmsg_table = NULL; > > > > tmp_cond = cond_node_create(pdb, NULL); > > if (tmp_cond == NULL) { > > @@ -2497,26 +2531,97 @@ int cil_booleanif_to_policydb(policydb_t *pdb, const struct cil_db *db, struct c > > bool_args.cond_node = cond_node; > > > > if (true_node != NULL) { > > + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > + if (!avrulex_ioctl_table) { > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > + goto exit; > > + } > > + > > + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > + if (!avrulex_nlmsg_table) { > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > + goto exit; > > + } > > + > > bool_args.cond_flavor = CIL_CONDTRUE; > > + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > rc = cil_tree_walk(true_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); > > if (rc != SEPOL_OK) { > > cil_tree_log(true_node, CIL_ERR, "Failure while walking true conditional block"); > > goto exit; > > } > > + > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); > > + if (rc != SEPOL_OK) { > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > + goto exit; > > + } > > + > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); > > + if (rc != SEPOL_OK) { > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > + goto exit; > > + } > > + > > + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_nlmsg_table); > > + avrulex_nlmsg_table = NULL; > > + > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_ioctl_table); > > + avrulex_ioctl_table = NULL; > > } > > > > if (false_node != NULL) { > > + avrulex_ioctl_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > + if (!avrulex_ioctl_table) { > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > + goto exit; > > + } > > + > > + avrulex_nlmsg_table = hashtab_create(avrulex_hash, avrulex_compare, AVRULEX_TABLE_SIZE); > > + if (!avrulex_nlmsg_table) { > > + cil_log(CIL_INFO, "Failure to create hashtab for avrulex\n"); > > + goto exit; > > + } > > + > > bool_args.cond_flavor = CIL_CONDFALSE; > > + bool_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > + bool_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > rc = cil_tree_walk(false_node, __cil_cond_to_policydb_helper, NULL, NULL, &bool_args); > > if (rc != SEPOL_OK) { > > cil_tree_log(false_node, CIL_ERR, "Failure while walking false conditional block"); > > goto exit; > > } > > + > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &bool_args); > > + if (rc != SEPOL_OK) { > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > + goto exit; > > + } > > + > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &bool_args); > > + if (rc != SEPOL_OK) { > > + cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > + goto exit; > > + } > > + > > + hashtab_map(avrulex_nlmsg_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_nlmsg_table); > > + avrulex_nlmsg_table = NULL; > > + > > + > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_ioctl_table); > > + avrulex_ioctl_table = NULL; > > } > > > > return SEPOL_OK; > > > > exit: > > + hashtab_map(avrulex_ioctl_table, __cil_avrulex_xperm_destroy, NULL); > > + hashtab_destroy(avrulex_ioctl_table); > > if (tmp_cond) { > > if (tmp_cond->expr) > > cond_expr_destroy(tmp_cond->expr); > > @@ -4091,7 +4196,7 @@ static int __cil_node_to_policydb(struct cil_tree_node *node, void *extra_args) > > case CIL_AVRULEX: { > > struct cil_avrule *rule = node->data; > > if (rule->rule_kind != CIL_AVRULE_NEVERALLOW) { > > - rc = cil_avrulex_to_hashtable(pdb, db, node->data, args); > > + rc = cil_avrulex_to_hashtable(pdb, db, node->data, &args->avrulex_xperm_tables); > > } > > } > > break; > > @@ -5162,6 +5267,7 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > int rc = SEPOL_ERR; > > int i; > > struct cil_args_binary extra_args; > > + struct cil_args_booleanif booleanif_args; > > policydb_t *pdb = &policydb->p; > > struct cil_list *neverallows = NULL; > > hashtab_t role_trans_table = NULL; > > @@ -5226,10 +5332,15 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > extra_args.pdb = pdb; > > extra_args.neverallows = neverallows; > > extra_args.role_trans_table = role_trans_table; > > - extra_args.avrulex_ioctl_table = avrulex_ioctl_table; > > - extra_args.avrulex_nlmsg_table = avrulex_nlmsg_table; > > + extra_args.avrulex_xperm_tables.ioctl = avrulex_ioctl_table; > > + extra_args.avrulex_xperm_tables.nlmsg = avrulex_nlmsg_table; > > extra_args.type_value_to_cil = type_value_to_cil; > > > > + booleanif_args.db = db; > > + booleanif_args.pdb = pdb; > > + booleanif_args.cond_node = NULL; > > + booleanif_args.cond_flavor = CIL_NONE; > > + > > for (i = 1; i <= 3; i++) { > > extra_args.pass = i; > > > > @@ -5248,12 +5359,12 @@ int cil_binary_create_allocated_pdb(const struct cil_db *db, sepol_policydb_t *p > > } > > > > if (i == 3) { > > - rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, pdb); > > + rc = hashtab_map(avrulex_ioctl_table, __cil_avrulex_ioctl_to_policydb, &booleanif_args); > > if (rc != SEPOL_OK) { > > cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > goto exit; > > } > > - rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, pdb); > > + rc = hashtab_map(avrulex_nlmsg_table, __cil_avrulex_nlmsg_to_policydb, &booleanif_args); > > if (rc != SEPOL_OK) { > > cil_log(CIL_INFO, "Failure creating avrulex rules\n"); > > goto exit; > > diff --git a/libsepol/cil/src/cil_build_ast.c b/libsepol/cil/src/cil_build_ast.c > > index 19fbb04e..8cc3f9b2 100644 > > --- a/libsepol/cil/src/cil_build_ast.c > > +++ b/libsepol/cil/src/cil_build_ast.c > > @@ -6158,7 +6158,11 @@ static int check_for_illegal_statement(struct cil_tree_node *parse_current, stru > > parse_current->data != CIL_KEY_AUDITALLOW && > > parse_current->data != CIL_KEY_TYPETRANSITION && > > parse_current->data != CIL_KEY_TYPECHANGE && > > - parse_current->data != CIL_KEY_TYPEMEMBER) { > > + parse_current->data != CIL_KEY_TYPEMEMBER && > > + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || > > + (parse_current->data != CIL_KEY_ALLOWX && > > + parse_current->data != CIL_KEY_DONTAUDITX && > > + parse_current->data != CIL_KEY_AUDITALLOWX))) { > > if (((struct cil_booleanif*)args->boolif->data)->preserved_tunable) { > > cil_tree_log(parse_current, CIL_ERR, "%s is not allowed in tunableif being treated as a booleanif", (char *)parse_current->data); > > } else { > > diff --git a/libsepol/cil/src/cil_resolve_ast.c b/libsepol/cil/src/cil_resolve_ast.c > > index da8863c4..a8fa89df 100644 > > --- a/libsepol/cil/src/cil_resolve_ast.c > > +++ b/libsepol/cil/src/cil_resolve_ast.c > > @@ -3848,9 +3848,11 @@ static int __cil_resolve_ast_node_helper(struct cil_tree_node *node, uint32_t *f > > node->flavor != CIL_CONDBLOCK && > > node->flavor != CIL_AVRULE && > > node->flavor != CIL_TYPE_RULE && > > - node->flavor != CIL_NAMETYPETRANSITION) { > > + node->flavor != CIL_NAMETYPETRANSITION && > > + ((args->db->policy_version < POLICYDB_VERSION_COND_XPERMS) || > > + (node->flavor != CIL_AVRULEX))) { > > rc = SEPOL_ERR; > > - } else if (node->flavor == CIL_AVRULE) { > > + } else if (node->flavor == CIL_AVRULE || node->flavor == CIL_AVRULEX) { > > struct cil_avrule *rule = node->data; > > if (rule->rule_kind == CIL_AVRULE_NEVERALLOW) { > > rc = SEPOL_ERR; > > diff --git a/libsepol/cil/src/cil_verify.c b/libsepol/cil/src/cil_verify.c > > index 9621a247..550b4542 100644 > > --- a/libsepol/cil/src/cil_verify.c > > +++ b/libsepol/cil/src/cil_verify.c > > @@ -1101,7 +1101,8 @@ static int __cil_verify_booleanif_helper(struct cil_tree_node *node, __attribute > > struct cil_booleanif *bif = node->parent->parent->data; > > > > switch (rule_node->flavor) { > > - case CIL_AVRULE: { > > + case CIL_AVRULE: > > + case CIL_AVRULEX: { > > struct cil_avrule *avrule = NULL; > > avrule = rule_node->data; > > if (avrule->rule_kind == CIL_AVRULE_NEVERALLOW) { > > diff --git a/secilc/test/policy.cil b/secilc/test/policy.cil > > index e6b78618..d0d52d0d 100644 > > --- a/secilc/test/policy.cil > > +++ b/secilc/test/policy.cil > > @@ -47,8 +47,9 @@ > > > > (block policy > > (class file (execute_no_trans entrypoint execmod open audit_access a b c d e)) > > - ; order should be: file char b c a dir d e f > > - (classorder (file char)) > > + (class socket (nlmsg)) > > + ; order should be: file socket char b c a dir d e f > > + (classorder (file socket char)) > > (classorder (unordered dir)) > > (classorder (unordered c a b d e f)) > > (classorder (char b c a)) > > @@ -161,7 +162,10 @@ > > ;;(allow bad_t not_bad_type (file (execute))) > > ;;(allow bad_t exec_t (file (execute))) > > (neverallow bad_t not_bad_type (file (execute))) > > - > > + > > + (auditallowx getty_t console_device_t (ioctl file (range 0x1000 0x10FF))) > > + (auditallowx getty_t kernel_t (nlmsg socket (range 0x1000 0x10FF))) > > + > > (booleanif secure_mode > > (true > > (auditallow device_t exec_t (file (read write))) > > @@ -172,9 +176,12 @@ > > (true > > (typechange auditadm_t console_device_t file user_tty_device_t) > > (allow getty_t console_device_t (file (getattr open read write append))) > > + (auditallowx getty_t console_device_t (ioctl file (range 0x2000 0x21FF))) > > + (auditallowx getty_t kernel_t (nlmsg socket (0x1))) > > ) > > (false > > (dontaudit getty_t console_device_t (file (getattr open read write append))) > > + (dontauditx getty_t console_device_t (ioctl file (range 0x3000 0x31FF))) > > ) > > ) > > > > -- > > 2.45.2 > > > >