I'm using Ubuntu 10.04.4 LTS.
And I upgraded all packages in the server but I still get below error

jaejyn.shin@desktop:~/temp$
<jaejyn.shin@lge-security-desktop:~/temp$>sesearch -A -s rild -t rild
-c socket sepolicy
ERROR: policydb version 26 does not match my version range 15-24
ERROR: Unable to open policy sepolicy.
ERROR: Input/output error


2013/11/13 Stephen Smalley <s...@tycho.nsa.gov>

> You can run sesearch on the policy.conf file or on the binary sepolicy
> file, both of which can be found under the out/target/product/<board>
> directory (although policy.conf is only available as an intermediate file).
>
> However, I had suggested running it on the binary sepolicy pulled from
> the device to ensure that what you are running on the device matches
> what is in your build tree since you indicated that you are getting
> denials that are allowed by your policy.
>
> Try updating your libsepol and setools packages.  What Linux
> distro/release are you using?
>
> On 11/08/2013 09:01 PM, Jaejyn Shin wrote:
> > I'm sorry that I could not recognize cc.
> >
> > Then could you let me know how to check the policy version and how to
> check
> > the setool version ?
> >
> > 2013/11/8 Stephen Smalley <s...@tycho.nsa.gov>
> >
> >> Please send questions to the seandroid-list or at least cc seandroid,
> >> and not just to me.   Anyway, you just need a version of setools that is
> >> up-to-date with support for that policy version.  Use a recent version
> >> of Fedora and you'll be fine.  Recent versions of Debian or Ubuntu
> >> should also have the support, but I don't know for sure what versions.
> >>
> >> On 11/08/2013 01:14 AM, Jaejyn Shin wrote:
> >>> I met error like below
> >>>
> >>> ~/temp$ <jaejyn.shin@lge-security-desktop:~/temp$> sesearch -A -s rild
> >> -t
> >>  > rild -c socket sepolicy
> >>> ERROR: policydb version 26 does not match my version range 15-24
> >>> ERROR: Unable to open policy sepolicy.
> >>> ERROR: Input/output error
> >>>
> >>>
> >>> How can I my sesearch tool version and my policy version ?
> >>>
> >>> And I have policy.conf file.
> >>> Can't I run the command using sesearch tool and policy.conf file?
> >>>
> >>> Thank you
> >>> Best regards
> >>>
> >>>
> >>> 2013/10/24 Stephen Smalley <s...@tycho.nsa.gov>
> >>>
> >>>> No, pull the policy file from the device and check it directly using
> >>>> sesearch.
> >>>>
> >>>> adb pull /sepolicy
> >>>> sesearch -A -s rild -t rild -c socket sepolicy
> >>>>
> >>>> sesearch is part of the setools package in Fedora or Ubuntu/Debian.
> >>>>
> >>>> I suspect that the policy on the device wasn't built from the sources
> >>>> you are looking at.
> >>>>
> >>>> Also check that you don't have a /data/security/sepolicy file on the
> >>>> device, as that will override the /sepolicy file if present.
> >>>>
> >>>> On 10/23/2013 10:42 AM, Jaejyn Shin wrote:
> >>>>> I got my code from Google (
> >>>>> https://android.googlesource.com/platform/external/sepolicy/)
> >>>>>
> >>>>> If there are some modifications related to unconfined, Google maybe
> >>>>> modified it.
> >>>>>
> >>>>> Then I will check the recent unconfined.te from SELinux project site
> to
> >>>>> compare to my unconfined.te.
> >>>>>
> >>>>> Thank you
> >>>>> Best regards
> >>>>>
> >>>>>
> >>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >>>>>
> >>>>>> Well, all of those things are allowed by unconfined_domain().
> >>>>>> Possibilities:
> >>>>>> - The binary /sepolicy file on that device was not built from those
> >>>>>> sources,
> >>>>>> - Someone modified the unconfined.te file in those sources to remove
> >> the
> >>>>>> allow rules?
> >>>>>> - Someone modified the unconfined_domain() macro definition in
> >> te_macros
> >>>>>> in those sources to alter what it does.
> >>>>>>
> >>>>>> But an unconfined rild wouldn't get any of those denials.  Honest.
> >>>>>>
> >>>>>> On 10/23/2013 10:16 AM, Jaejyn Shin wrote:
> >>>>>>> unconfined_domain(rild) exist in the code.
> >>>>>>>
> >>>>>>> I'm sorry that I can not show you my policy files.
> >>>>>>>
> >>>>>>> I will check the image version of the device which generate the
> logs.
> >>>>>>>
> >>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >>>>>>>
> >>>>>>>> Hmmm...then you must not have unconfined_domain(rild) in that
> >> policy.
> >>>>>>>> Otherwise you wouldn't get those denials.
> >>>>>>>>
> >>>>>>>> On 10/23/2013 10:03 AM, Jaejyn Shin wrote:
> >>>>>>>>> Okey. The logs can be gathered from the different devices.
> >>>>>>>>>
> >>>>>>>>> <5>[   27.585551 / 01-02 13:00:00.810] type=1400
> >>>>>>>> audit(1230901200.810:14):
> >>>>>>>>> avc:  denied  { create } for  pid=270 comm="rild"
> >>>> scontext=u:r:rild:s0
> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket
> >>>>>>>>> <5>[   34.643925 / 01-07 20:28:16.959] type=1400
> >>>> audit(592096.959:26):
> >>>>>>>>> avc:  denied  { read } for  pid=904 comm="rild"
> >> scontext=u:r:rild:s0
> >>>>>>>>> tcontext=u:r:rild:s0 tclass=netlink_socket
> >>>>>>>>> <5>[   47.174096 / 01-07 20:28:29.489] type=1400
> >>>> audit(592109.489:27):
> >>>>>>>>> avc:  denied  { read } for  pid=904 comm="rild"
> >> scontext=u:r:rild:s0
> >>>>>>>>> tcontext=u:r:rild:s0 tclass=netlink_socket
> >>>>>>>>> <5>[   48.569500 / 01-07 20:28:30.889] type=1400
> >>>> audit(592110.889:34):
> >>>>>>>>> avc:  denied  { write } for  pid=1483 comm="RILReceiver"
> >> name="rild"
> >>>>>>>>> dev="tmpfs" ino=8783 scontext=u:r:radio:s0
> >>>>>>>>> tcontext=u:object_r:rild_socket:s0 tclass=sock_file
> >>>>>>>>> <5>[   48.569581 / 01-07 20:28:30.889] type=1400
> >>>> audit(592110.889:35):
> >>>>>>>>> avc:  denied  { connectto } for  pid=1483 comm="RILReceiver"
> >>>>>>>>> path="/dev/socket/rild" scontext=u:r:radio:s0
> tcontext=u:r:rild:s0
> >>>>>>>>> tclass=unix_stream_socket
> >>>>>>>>> <6>[   51.794032 / 01-07 20:28:34.109] avc:  denied  { set } for
> >>>>>>>>> property=ril.card_operator scontext=u:r:radio:s0
> >>>>>>>>> tcontext=u:object_r:rild_prop:s0 tclass=property_service
> >>>>>>>>> <5>[   89.696426 / 01-08 05:29:12.019] type=1400
> >>>> audit(592152.019:74):
> >>>>>>>>> avc:  denied  { read } for  pid=413 comm="rild"
> >> scontext=u:r:rild:s0
> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket
> >>>>>>>>> <5>[  138.993392 / 01-08 05:30:01.309] type=1400
> >>>> audit(592201.309:76):
> >>>>>>>>> avc:  denied  { read } for  pid=413 comm="rild"
> >> scontext=u:r:rild:s0
> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket
> >>>>>>>>> <5>[  219.571626 / 01-08 05:31:21.889] type=1400
> >>>> audit(592281.889:77):
> >>>>>>>>> avc:  denied  { write } for  pid=338 comm="rild"
> >>>>>> name="property_service"
> >>>>>>>>> dev="tmpfs" ino=5131 scontext=u:r:rild:s0
> >>>>>>>>> tcontext=u:object_r:property_socket:s0 tclass=sock_file
> >>>>>>>>>
> >>>>>>>>>
> >>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >>>>>>>>>
> >>>>>>>>>> Can you show an example avc message that you are getting for
> rild?
> >>>>>>>>>>
> >>>>>>>>>> On 10/23/2013 09:11 AM, Jaejyn Shin wrote:
> >>>>>>>>>>> Yes. you are right. I was wrong.
> >>>>>>>>>>> untrusted_app.te do not have "confined_domain(untrusted_app)".
> >>>>>>>>>>>
> >>>>>>>>>>> BTW my rild.te has both of "permissive rild" and
> >>>>>>>>>> "unconfined_domain(rild)".
> >>>>>>>>>>> But I can see the avc logs of rild in the kernel logs.
> >>>>>>>>>>>
> >>>>>>>>>>> It is a little confusing.
> >>>>>>>>>>>
> >>>>>>>>>>> Thank you
> >>>>>>>>>>> Best regards
> >>>>>>>>>>>
> >>>>>>>>>>>
> >>>>>>>>>>>
> >>>>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >>>>>>>>>>>
> >>>>>>>>>>>> If it is already unconfined, you shouldn't get any denials.
> >>>>>>>>  unconfined
> >>>>>>>>>>>> is allowed everything (well, except what Google has started to
> >>>>>> remove
> >>>>>>>>>>>> from it, like loading policy).
> >>>>>>>>>>>>
> >>>>>>>>>>>> On 10/23/2013 08:54 AM, Jaejyn Shin wrote:
> >>>>>>>>>>>>> Answer 1)
> >>>>>>>>>>>>> In my android source, untrusted_app is permissive and
> >> unconfined.
> >>>>>>>>>>>>> But the avc logs are printing on the kernel log.
> >>>>>>>>>>>>> I do not want see the avc log of the permissive domain like
> >>>>>>>>>>>> untrustes_app.
> >>>>>>>>>>>>>
> >>>>>>>>>>>>> Answer 2)
> >>>>>>>>>>>>> I can not write all allow of untrusted_app because I can not
> >>>>>> predict
> >>>>>>>>>> what
> >>>>>>>>>>>>> avc log will be appeared.
> >>>>>>>>>>>>> This is why I want to use "*" in the dontaudit statement.
> >>>>>>>>>>>>> + Could you let me know a name of the tool to generate
> >> dontaudit
> >>>>>>>> rule?
> >>>>>>>>>>>>>
> >>>>>>>>>>>>> Answer 3)
> >>>>>>>>>>>>> Okey. It looks good way.
> >>>>>>>>>>>>> I have other permissive domains (bluetooth, dbusd, radio,
> nfc,
> >>>>>>>> kernel,
> >>>>>>>>>>>>> platform_app, release_app....).
> >>>>>>>>>>>>> I should make the te_macro of the way you teach me to use in
> >> the
> >>>>>> all
> >>>>>>>>>>>>> permissive domains.
> >>>>>>>>>>>>> Thank you
> >>>>>>>>>>>>> Best regards
> >>>>>>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>>>  On 10/23/2013 02:45 AM, Jaejyn Shin wrote:
> >>>>>>>>>>>>>>> I want to use dontaudit to all domains and all classes
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> For example)
> >>>>>>>>>>>>>>> dontaudit untrusted_app *:* *
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> but '*' can not be used at the target_type position and
> also
> >>>>>> class
> >>>>>>>>>>>>>> position.
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> How can I use dontaudit like this situation ?
> >>>>>>>>>>>>>>>
> >>>>>>>>>>>>>>> I am referring to this site: "
> >>>>>>>>>> http://selinuxproject.org/page/AVCRules";
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> First, let me ask why you don't want to audit any denials by
> >>>>>>>>>>>>>> untrusted_app.
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> Second, you only strictly need to dontaudit whatever isn't
> >>>>>> allowed,
> >>>>>>>> so
> >>>>>>>>>>>>>> you could take the set complement of the allow rules for
> >>>>>>>> untrusted_app
> >>>>>>>>>>>>>> and generate dontaudit rules via a tool.
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>> Third, if you want to effectively dontaudit everything and
> do
> >>>> not
> >>>>>>>> want
> >>>>>>>>>>>>>> to deal with creating such a tool, you could take the
> >>>>>> unconfined.te
> >>>>>>>>>>>>>> rules and copy them over to untrusted_app.te, replacing
> >>>>>>>>>>>>>> "unconfineddomain" with "untrusted_app" and replacing
> "allow"
> >>>> with
> >>>>>>>>>>>>>> "dontaudit".  unconfined.te should contain every possible
> >> (type,
> >>>>>>>> type,
> >>>>>>>>>>>>>> class) triple at present, although Google is beginning to
> >> prune
> >>>> it
> >>>>>>>>>> down.
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>>
> >>>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>>>
> >>>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>>
> >>>>>>>>>
> >>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>
> >>>>>>
> >>>>>
> >>>>
> >>>>
> >>>
> >>
> >>
> >
>
>

Reply via email to