summaryrefslogtreecommitdiffstats
path: root/sechecker/modules/inc_dom_trans.c
diff options
context:
space:
mode:
Diffstat (limited to 'sechecker/modules/inc_dom_trans.c')
-rw-r--r--sechecker/modules/inc_dom_trans.c913
1 files changed, 913 insertions, 0 deletions
diff --git a/sechecker/modules/inc_dom_trans.c b/sechecker/modules/inc_dom_trans.c
new file mode 100644
index 0000000..fe6957d
--- /dev/null
+++ b/sechecker/modules/inc_dom_trans.c
@@ -0,0 +1,913 @@
+/**
+ * @file
+ * Defines the interface for the incomplete domain transition module.
+ *
+ * @author Kevin Carr kcarr@tresys.com
+ * @author Jeremy A. Mowery jmowery@tresys.com
+ * @author Jason Tang jtang@tresys.com
+ *
+ * Copyright (C) 2005-2007 Tresys Technology, LLC
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+#include "inc_dom_trans.h"
+
+#include <stdio.h>
+#include <string.h>
+#include <errno.h>
+
+/* This string is the name of the module and should match the stem
+ * of the file name; it should also match the prefix of all functions
+ * defined in this module and the private data storage structure */
+static const char *const mod_name = "inc_dom_trans";
+
+/* The register function registers all of a module's functions
+ * with the library. */
+int inc_dom_trans_register(sechk_lib_t * lib)
+{
+ sechk_module_t *mod = NULL;
+ sechk_fn_t *fn_struct = NULL;
+
+ if (!lib) {
+ ERR(NULL, "%s", "No library");
+ errno = EINVAL;
+ return -1;
+ }
+
+ /* Modules are declared by the config file and their name and options
+ * are stored in the module array. The name is looked up to determine
+ * where to store the function structures */
+ mod = sechk_lib_get_module(mod_name, lib);
+ if (!mod) {
+ ERR(NULL, "%s", "Module unknown");
+ errno = EINVAL;
+ return -1;
+ }
+ mod->parent_lib = lib;
+
+ /* assign the descriptions */
+ mod->brief_description = "domains with partial transition permissions";
+ mod->detailed_description =
+ "--------------------------------------------------------------------------------\n"
+ "This module finds potential domain transitions missing key permissions. A valid\n"
+ "domain transition requires the following.\n"
+ "\n"
+ " 1) the starting domain can transition to the end domain for class process\n"
+ " 2) the end domain has some type as an entrypoint\n"
+ " 3) the starting domain can execute that extrypoint type\n"
+ " 4) (optional) a type transition rules specifying these three types\n";
+ mod->opt_description =
+ "Module requirements:\n"
+ " attribute names\n" "Module dependencies:\n" " find_domains\n" "Module options:\n" " none\n";
+ mod->severity = SECHK_SEV_MED;
+ /* assign requirements */
+ if (apol_vector_append(mod->requirements, sechk_name_value_new(SECHK_REQ_POLICY_CAP, SECHK_REQ_CAP_ATTRIB_NAMES)) < 0) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+ /* Dependencies */
+ apol_vector_append(mod->dependencies, sechk_name_value_new("module", "find_domains"));
+
+ /* register functions */
+ fn_struct = sechk_fn_new();
+ if (!fn_struct) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+ fn_struct->name = strdup(SECHK_MOD_FN_INIT);
+ if (!fn_struct->name) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+ fn_struct->fn = inc_dom_trans_init;
+ if (apol_vector_append(mod->functions, (void *)fn_struct) < 0) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+
+ fn_struct = sechk_fn_new();
+ if (!fn_struct) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+ fn_struct->name = strdup(SECHK_MOD_FN_RUN);
+ if (!fn_struct->name) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+ fn_struct->fn = inc_dom_trans_run;
+ if (apol_vector_append(mod->functions, (void *)fn_struct) < 0) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+
+ mod->data_free = NULL;
+
+ fn_struct = sechk_fn_new();
+ if (!fn_struct) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+ fn_struct->name = strdup(SECHK_MOD_FN_PRINT);
+ if (!fn_struct->name) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+ fn_struct->fn = inc_dom_trans_print;
+ if (apol_vector_append(mod->functions, (void *)fn_struct) < 0) {
+ ERR(NULL, "%s", strerror(ENOMEM));
+ errno = ENOMEM;
+ return -1;
+ }
+
+ return 0;
+}
+
+/* The init function creates the module's private data storage object
+ * and initializes its values based on the options parsed in the config
+ * file. */
+int inc_dom_trans_init(sechk_module_t * mod, apol_policy_t * policy, void *arg __attribute__ ((unused)))
+{
+ if (!mod || !policy) {
+ ERR(policy, "%s", "Invalid paramaters");
+ errno = EINVAL;
+ return -1;
+ }
+ if (strcmp(mod_name, mod->name)) {
+ ERR(policy, "Wrong module (%s)", mod->name);
+ errno = EINVAL;
+ return -1;
+ }
+
+ mod->data = NULL;
+
+ return 0;
+}
+
+/* wrapper for apol_domain_trans_result_destroy() */
+void dtr_free_wrap(void *x)
+{
+ apol_domain_trans_result_destroy((apol_domain_trans_result_t **) & x);
+}
+
+/* The run function performs the check. This function runs only once
+ * even if called multiple times. */
+int inc_dom_trans_run(sechk_module_t * mod, apol_policy_t * policy, void *arg __attribute__ ((unused)))
+{
+ sechk_result_t *res = NULL;
+ sechk_item_t *item = NULL, *tmp_item = NULL;
+ sechk_proof_t *proof = NULL;
+ size_t i, j, k, retv;
+ sechk_module_t *mod_ptr = NULL;
+ sechk_mod_fn_t run_fn = NULL;
+ sechk_result_t *find_domains_res = NULL;
+ apol_domain_trans_analysis_t *domain_trans = NULL;
+ apol_vector_t *domain_vector = NULL, *role_vector = NULL, *user_vector = NULL, *rbac_vector = NULL;
+ apol_vector_t *domain_trans_vector = NULL, *role_allow_vector = NULL;
+ apol_user_query_t *user_query = NULL;
+ apol_role_query_t *start_role_query = NULL, *end_role_query = NULL;
+ apol_role_trans_query_t *role_trans_query = NULL;
+ apol_role_allow_query_t *role_allow_query = NULL;
+ char *buff = NULL;
+ int buff_sz, error = 0;
+ const qpol_type_t *domain = NULL;
+ qpol_policy_t *q = apol_policy_get_qpol(policy);
+ const char *domain_name = NULL;
+
+ if (!mod || !policy) {
+ ERR(policy, "%s", "Invalid parameters");
+ errno = EINVAL;
+ return -1;
+ }
+ if (strcmp(mod_name, mod->name)) {
+ ERR(policy, "Wrong module (%s)", mod->name);
+ errno = EINVAL;
+ return -1;
+ }
+
+ /* if already run return */
+ if (mod->result)
+ return 0;
+
+ res = sechk_result_new();
+ if (!res) {
+ ERR(policy, "%s", strerror(ENOMEM));
+ errno = EINVAL;
+ return -1;
+ }
+ res->test_name = strdup(mod_name);
+ if (!res->test_name) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ res->item_type = SECHK_ITEM_DTR;
+ if (!(res->items = apol_vector_create(sechk_item_free))) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (apol_policy_build_domain_trans_table(policy) < 0) {
+ error = errno;
+ ERR(policy, "%s", "Unable to build domain transition table");
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (!(domain_trans = apol_domain_trans_analysis_create())) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (!(user_query = apol_user_query_create())) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (!(role_trans_query = apol_role_trans_query_create())) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (!(role_allow_query = apol_role_allow_query_create())) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (!(start_role_query = apol_role_query_create())) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (!(end_role_query = apol_role_query_create())) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+
+ run_fn = sechk_lib_get_module_function("find_domains", SECHK_MOD_FN_RUN, mod->parent_lib);
+ if (!run_fn) {
+ error = errno;
+ goto inc_dom_trans_run_fail;
+ }
+
+ retv = run_fn((mod_ptr = sechk_lib_get_module("find_domains", mod->parent_lib)), policy, NULL);
+ if (retv) {
+ error = errno;
+ ERR(policy, "%s", "Unable to find module find_domains");
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (!(find_domains_res = sechk_lib_get_module_result("find_domains", mod->parent_lib))) {
+ error = errno;
+ ERR(policy, "%s", "Unable to get results from module find_domains");
+ goto inc_dom_trans_run_fail;
+ }
+
+ domain_vector = (apol_vector_t *) find_domains_res->items;
+
+ for (i = 0; i < apol_vector_get_size(domain_vector); i++) {
+ tmp_item = apol_vector_get_element(domain_vector, i);
+ domain = tmp_item->item;
+ qpol_type_get_name(q, domain, &domain_name);
+ apol_domain_trans_analysis_set_start_type(policy, domain_trans, domain_name);
+ apol_domain_trans_analysis_set_direction(policy, domain_trans, APOL_DOMAIN_TRANS_DIRECTION_FORWARD);
+ apol_domain_trans_analysis_set_valid(policy, domain_trans, APOL_DOMAIN_TRANS_SEARCH_BOTH);
+ apol_domain_trans_analysis_do(policy, domain_trans, &domain_trans_vector);
+
+ for (j = 0; j < apol_vector_get_size(domain_trans_vector); j++) {
+ apol_domain_trans_result_t *dtr = NULL;
+ const qpol_type_t *start;
+ const qpol_type_t *ep;
+ const qpol_type_t *end;
+ const char *start_name;
+ const char *end_name;
+ const char *ep_name;
+ int result;
+ bool ok;
+
+ ok = false;
+ dtr = apol_vector_get_element(domain_trans_vector, j);
+ start = apol_domain_trans_result_get_start_type(dtr);
+ ep = apol_domain_trans_result_get_entrypoint_type(dtr);
+ end = apol_domain_trans_result_get_end_type(dtr);
+ if (start)
+ qpol_type_get_name(q, start, &start_name);
+ else
+ start_name = "<start_type>";
+ if (end)
+ qpol_type_get_name(q, end, &end_name);
+ else
+ end_name = "<end_type>";
+ if (ep)
+ qpol_type_get_name(q, ep, &ep_name);
+ else
+ ep_name = "<entrypoint_type>";
+
+ result = apol_domain_trans_table_verify_trans(policy, start, ep, end);
+ if (!result) {
+ apol_vector_t *start_role_vector, *end_role_vector, *common_role_vector;
+ apol_role_query_set_type(policy, start_role_query, start_name);
+ apol_role_get_by_query(policy, start_role_query, &start_role_vector);
+ apol_role_query_set_type(policy, end_role_query, end_name);
+ apol_role_get_by_query(policy, end_role_query, &end_role_vector);
+ if (!apol_vector_get_size(start_role_vector) || !apol_vector_get_size(end_role_vector)) {
+ item = sechk_item_new(dtr_free_wrap);
+ if (!item) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ item->test_result = 1;
+ item->item = (void *)apol_domain_trans_result_create_from_domain_trans_result(dtr);
+ if (apol_vector_append(res->items, (void *)item) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (!(item->proof = apol_vector_create(sechk_proof_free))) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (!apol_vector_get_size(start_role_vector)) {
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ asprintf(&proof->text, "Need role for %s", start_name);
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+ if (!apol_vector_get_size(end_role_vector)) {
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ asprintf(&proof->text, "Need role for %s", end_name);
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+ item = NULL;
+ //if one of the domains has no roles continue; no more can be determined
+ apol_vector_destroy(&start_role_vector);
+ apol_vector_destroy(&end_role_vector);
+ continue;
+ }
+ common_role_vector =
+ apol_vector_create_from_intersection(start_role_vector, end_role_vector, NULL, NULL);
+ const char *role_name = NULL;
+ if (apol_vector_get_size(common_role_vector)) {
+ for (int k = 0; k < apol_vector_get_size(common_role_vector); k++) {
+ const qpol_role_t *common_role;
+
+ common_role = apol_vector_get_element(common_role_vector, k);
+ qpol_role_get_name(q, common_role, &role_name);
+ apol_user_query_set_role(policy, user_query, role_name);
+ apol_user_get_by_query(policy, user_query, &user_vector);
+ if (apol_vector_get_size(user_vector)) {
+ ok = true;
+ apol_vector_destroy(&user_vector);
+ break;
+ }
+ apol_vector_destroy(&user_vector);
+ }
+ if (!ok) {
+ item = sechk_item_new(dtr_free_wrap);
+ if (!item) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ item->test_result = 1;
+ item->item = (void *)apol_domain_trans_result_create_from_domain_trans_result(dtr);
+ if (apol_vector_append(res->items, (void *)item) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (!(item->proof = apol_vector_create(sechk_proof_free))) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ asprintf(&proof->text, "Need user for role %s", role_name);
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ item = NULL;
+ }
+ } else {
+ apol_vector_t *role_trans_vector;
+ bool need_ra = 0, need_user = 0;
+ char *rastring = NULL, *userstring = NULL;
+ apol_role_trans_query_set_target(policy, role_trans_query, ep_name, 1);
+ apol_role_trans_get_by_query(policy, role_trans_query, &role_trans_vector);
+ const char *source_role_name = NULL, *default_role_name = NULL;
+ for (k = 0; k < apol_vector_get_size(role_trans_vector); k++) {
+ qpol_role_trans_t *role_trans;
+ const qpol_role_t *source_role;
+ const qpol_role_t *default_role;
+ int index;
+
+ role_trans = apol_vector_get_element(role_trans_vector, k);
+ qpol_role_trans_get_source_role(q, role_trans, &source_role);
+ qpol_role_trans_get_default_role(q, role_trans, &default_role);
+ if ((apol_vector_get_index(start_role_vector, source_role, NULL, NULL, &index) == 0)
+ && (apol_vector_get_index(end_role_vector, default_role, NULL, NULL, &index) ==
+ 0)) {
+ apol_vector_t *source_role_user, *default_role_user, *common_role_user;
+
+ qpol_role_get_name(q, source_role, &source_role_name);
+ qpol_role_get_name(q, default_role, &default_role_name);
+ apol_role_allow_query_set_source(policy, role_allow_query,
+ source_role_name);
+ apol_role_allow_query_set_target(policy, role_allow_query,
+ default_role_name);
+ apol_role_allow_get_by_query(policy, role_allow_query, &role_allow_vector);
+
+ apol_user_query_set_role(policy, user_query, source_role_name);
+ apol_user_get_by_query(policy, user_query, &source_role_user);
+ apol_user_query_set_role(policy, user_query, default_role_name);
+ apol_user_get_by_query(policy, user_query, &default_role_user);
+
+ common_role_user =
+ apol_vector_create_from_intersection(source_role_user,
+ default_role_user, NULL, NULL);
+ apol_vector_destroy(&source_role_user);
+ apol_vector_destroy(&default_role_user);
+ if (apol_vector_get_size(role_allow_vector) &&
+ apol_vector_get_size(common_role_user)) {
+ ok = true;
+ apol_vector_destroy(&role_allow_vector);
+ apol_vector_destroy(&common_role_user);
+ break;
+ }
+ if (!apol_vector_get_size(role_allow_vector)) {
+ // need role allow;
+ asprintf(&rastring, "allow %s %s;", source_role_name,
+ default_role_name);
+ if (!rastring) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+ apol_vector_destroy(&role_allow_vector);
+ if (!apol_vector_get_size(common_role_user)) {
+ // need user;
+ asprintf(&userstring, "need user with roles %s and %s",
+ source_role_name, default_role_name);
+ if (!userstring) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+ apol_vector_destroy(&common_role_user);
+ }
+ }
+ apol_vector_destroy(&role_trans_vector);
+ if (!ok) {
+ if (!need_ra && !need_user) {
+ const qpol_role_t *source_role =
+ apol_vector_get_element(start_role_vector, 0);
+ const qpol_role_t *default_role =
+ apol_vector_get_element(end_role_vector, 0);
+ qpol_role_get_name(q, source_role, &source_role_name);
+ qpol_role_get_name(q, default_role, &default_role_name);
+ // need role_transition
+ item = sechk_item_new(dtr_free_wrap);
+ if (!item) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ item->test_result = 1;
+ item->item = (void *)
+ apol_domain_trans_result_create_from_domain_trans_result(dtr);
+ if (apol_vector_append(res->items, (void *)item) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (!(item->proof = apol_vector_create(sechk_proof_free))) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ asprintf(&proof->text, "role_transition %s %s %s;", source_role_name,
+ ep_name, default_role_name);
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ item = NULL;
+ } else {
+ //create item
+ item = sechk_item_new(dtr_free_wrap);
+ if (!item) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ item->test_result = 1;
+ item->item = (void *)
+ apol_domain_trans_result_create_from_domain_trans_result(dtr);
+ if (apol_vector_append(res->items, (void *)item) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (!(item->proof = apol_vector_create(sechk_proof_free))) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (need_ra) {
+ //create proof w/ text rastring
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ proof->text = rastring;
+ rastring = NULL;
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+ if (need_user) {
+ //create proof w/ text userstring
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ proof->text = userstring;
+ userstring = NULL;
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+ item = NULL;
+ }
+ }
+ }
+ apol_vector_destroy(&start_role_vector);
+ apol_vector_destroy(&end_role_vector);
+ apol_vector_destroy(&common_role_vector);
+ } else {
+ item = sechk_item_new(dtr_free_wrap);
+ if (!item) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ item->test_result = 1;
+ item->item = (void *)apol_domain_trans_result_create_from_domain_trans_result(dtr);
+ if (apol_vector_append(res->items, (void *)item) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (!(item->proof = apol_vector_create(sechk_proof_free))) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+
+ if (result & APOL_DOMAIN_TRANS_RULE_PROC_TRANS) {
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ buff = NULL;
+ buff_sz =
+ 10 + strlen("allow : process transition;") + strlen(start_name) + strlen(end_name);
+ buff = (char *)calloc(buff_sz, sizeof(char));
+ if (!buff) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ snprintf(buff, buff_sz, "allow %s %s : process transition;", start_name, end_name);
+ proof->text = strdup(buff);
+ free(buff);
+ buff = NULL;
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+
+ if (result & APOL_DOMAIN_TRANS_RULE_EXEC) {
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ buff = NULL;
+ buff_sz = 10 + strlen("allow : file execute;") + strlen(start_name) + strlen(ep_name);
+ buff = (char *)calloc(buff_sz, sizeof(char));
+ if (!buff) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ snprintf(buff, buff_sz, "allow %s %s : file execute;", start_name, ep_name);
+ proof->text = strdup(buff);
+ free(buff);
+ buff = NULL;
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+
+ if (result & APOL_DOMAIN_TRANS_RULE_ENTRYPOINT) {
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ buff = NULL;
+ buff_sz = 10 + strlen("allow : file entrypoint;") + strlen(end_name) + strlen(ep_name);
+ buff = (char *)calloc(buff_sz, sizeof(char));
+ if (!buff) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ snprintf(buff, buff_sz, "allow %s %s : file entrypoint;", end_name, ep_name);
+ proof->text = strdup(buff);
+ free(buff);
+ buff = NULL;
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+
+ if (result & APOL_DOMAIN_TRANS_RULE_TYPE_TRANS) {
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ buff = NULL;
+ buff_sz =
+ 10 + strlen("type_transition :process ;") + strlen(start_name) + strlen(end_name) +
+ strlen(ep_name);
+ buff = (char *)calloc(buff_sz, sizeof(char));
+ if (!buff) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ snprintf(buff, buff_sz, "type_transition %s %s : process %s;", start_name, ep_name,
+ end_name);
+ proof->text = strdup(buff);
+ free(buff);
+ buff = NULL;
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+
+ if (result & APOL_DOMAIN_TRANS_RULE_SETEXEC) {
+ proof = sechk_proof_new(NULL);
+ proof->type = SECHK_ITEM_OTHER;
+ buff = NULL;
+ buff_sz = 10 + strlen("allow self : process setexec;") + strlen(start_name);
+ buff = (char *)calloc(buff_sz, sizeof(char));
+ if (!buff) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ snprintf(buff, buff_sz, "allow %s self : process setexec;", start_name);
+ proof->text = strdup(buff);
+ free(buff);
+ buff = NULL;
+ if (!proof->text) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ if (apol_vector_append(item->proof, (void *)proof) < 0) {
+ error = errno;
+ ERR(policy, "%s", strerror(ENOMEM));
+ goto inc_dom_trans_run_fail;
+ }
+ }
+ }
+ }
+ apol_vector_destroy(&domain_trans_vector);
+ }
+
+ mod->result = res;
+ apol_domain_trans_analysis_destroy(&domain_trans);
+ apol_user_query_destroy(&user_query);
+ apol_role_trans_query_destroy(&role_trans_query);
+ apol_role_query_destroy(&start_role_query);
+ apol_role_query_destroy(&end_role_query);
+ apol_role_allow_query_destroy(&role_allow_query);
+
+ if (apol_vector_get_size(res->items))
+ return 1;
+ return 0;
+
+ inc_dom_trans_run_fail:
+ sechk_item_free(item);
+ apol_vector_destroy(&user_vector);
+ apol_vector_destroy(&domain_trans_vector);
+ sechk_result_destroy(&res);
+ errno = error;
+ return -1;
+}
+
+/* The print output function generates the text printed in the
+ * report and prints it to stdout. */
+int inc_dom_trans_print(sechk_module_t * mod, apol_policy_t * policy, void *arg __attribute__ ((unused)))
+{
+ unsigned char outformat = 0x00;
+ sechk_item_t *item = NULL;
+ qpol_policy_t *q = apol_policy_get_qpol(policy);
+ size_t i = 0, j = 0, num_items;
+
+ if (!mod || !policy) {
+ ERR(policy, "%s", "Invalid parameters");
+ errno = EINVAL;
+ return -1;
+ }
+ if (strcmp(mod_name, mod->name)) {
+ ERR(policy, "Wrong module (%s)", mod->name);
+ errno = EINVAL;
+ return -1;
+ }
+
+ outformat = mod->outputformat;
+ num_items = apol_vector_get_size(mod->result->items);
+
+ if (!mod->result) {
+ ERR(policy, "%s", "Module has not been run");
+ errno = EINVAL;
+ return -1;
+ }
+
+ if (!outformat || (outformat & SECHK_OUT_QUIET))
+ return 0; /* not an error - no output is requested */
+
+ if (outformat & SECHK_OUT_STATS) {
+ printf("Found %i incomplete transitions.\n", num_items);
+ }
+ /* The list report component is a display of all items
+ * found without any supporting proof. */
+ if (outformat & SECHK_OUT_LIST) {
+ /*
+ * printf("\nStart Type\t\tEntrypoint\t\tEnd Type\t\tMissing Rules\n");
+ * printf("----------\t\t----------\t\t--------\t\t-------------\n");
+ */
+ printf("\n");
+ for (i = 0; i < num_items; i++) {
+ const qpol_type_t *start;
+ const qpol_type_t *end;
+ const qpol_type_t *ep;
+ const char *start_name, *end_name, *ep_name;
+ apol_domain_trans_result_t *dtr;
+
+ item = apol_vector_get_element(mod->result->items, i);
+ dtr = item->item;
+ start = apol_domain_trans_result_get_start_type(dtr);
+ ep = apol_domain_trans_result_get_entrypoint_type(dtr);
+ end = apol_domain_trans_result_get_end_type(dtr);
+ if (start)
+ qpol_type_get_name(q, start, &start_name);
+ else
+ start_name = "<start_type>";
+ if (end)
+ qpol_type_get_name(q, end, &end_name);
+ else
+ end_name = "<end_type>";
+ if (ep)
+ qpol_type_get_name(q, ep, &ep_name);
+ else
+ ep_name = "<entrypoint_type>";
+
+ printf("%s -> %s\tentrypoint: %s\n", start_name, end_name, ep_name);
+ }
+ printf("\n");
+ }
+ /* The proof report component is a display of a list of items
+ * with an indented list of proof statements supporting the result
+ * of the check for that item (e.g. rules with a given type) */
+ if (outformat & SECHK_OUT_PROOF) {
+ printf("\n");
+ for (i = 0; i < num_items; i++) {
+ const qpol_type_t *start;
+ const qpol_type_t *end;
+ const qpol_type_t *ep;
+ const char *start_name, *end_name, *ep_name;
+ apol_domain_trans_result_t *dtr;
+
+ item = apol_vector_get_element(mod->result->items, i);
+ dtr = item->item;
+ start = apol_domain_trans_result_get_start_type(dtr);
+ ep = apol_domain_trans_result_get_entrypoint_type(dtr);
+ end = apol_domain_trans_result_get_end_type(dtr);
+ if (start)
+ qpol_type_get_name(q, start, &start_name);
+ else
+ start_name = "<start_type>";
+ if (end)
+ qpol_type_get_name(q, end, &end_name);
+ else
+ end_name = "<end_type>";
+ if (ep)
+ qpol_type_get_name(q, ep, &ep_name);
+ else
+ ep_name = "<entrypoint_type>";
+
+ printf("%s -> %s\tentrypoint: %s\n\tMissing:\n", start_name, end_name, ep_name);
+ for (j = 0; j < apol_vector_get_size(item->proof); j++) {
+ sechk_proof_t *proof;
+
+ proof = apol_vector_get_element(item->proof, j);
+ if (proof) {
+ printf("\t%s\n", proof->text);
+ }
+ }
+ }
+ }
+
+ return 0;
+}