Yes, 10.04 is too old. Probably need 12.10 or later. On Mon, Nov 18, 2013 at 3:12 PM, Jaejyn Shin <flagon22b...@gmail.com> wrote: > I'm using Ubuntu 10.04.4 LTS. > And I upgraded all packages in the server but I still get below error > > jaejyn.shin@desktop:~/temp$ sesearch -A -s rild -t rild -c socket sepolicy > ERROR: policydb version 26 does not match my version range 15-24 > ERROR: Unable to open policy sepolicy. > ERROR: Input/output error > > > 2013/11/13 Stephen Smalley <s...@tycho.nsa.gov> >> >> You can run sesearch on the policy.conf file or on the binary sepolicy >> file, both of which can be found under the out/target/product/<board> >> directory (although policy.conf is only available as an intermediate >> file). >> >> However, I had suggested running it on the binary sepolicy pulled from >> the device to ensure that what you are running on the device matches >> what is in your build tree since you indicated that you are getting >> denials that are allowed by your policy. >> >> Try updating your libsepol and setools packages. What Linux >> distro/release are you using? >> >> On 11/08/2013 09:01 PM, Jaejyn Shin wrote: >> > I'm sorry that I could not recognize cc. >> > >> > Then could you let me know how to check the policy version and how to >> > check >> > the setool version ? >> > >> > 2013/11/8 Stephen Smalley <s...@tycho.nsa.gov> >> > >> >> Please send questions to the seandroid-list or at least cc seandroid, >> >> and not just to me. Anyway, you just need a version of setools that >> >> is >> >> up-to-date with support for that policy version. Use a recent version >> >> of Fedora and you'll be fine. Recent versions of Debian or Ubuntu >> >> should also have the support, but I don't know for sure what versions. >> >> >> >> On 11/08/2013 01:14 AM, Jaejyn Shin wrote: >> >>> I met error like below >> >>> >> >>> ~/temp$ <jaejyn.shin@lge-security-desktop:~/temp$> sesearch -A -s rild >> >> -t >> >> > rild -c socket sepolicy >> >>> ERROR: policydb version 26 does not match my version range 15-24 >> >>> ERROR: Unable to open policy sepolicy. >> >>> ERROR: Input/output error >> >>> >> >>> >> >>> How can I my sesearch tool version and my policy version ? >> >>> >> >>> And I have policy.conf file. >> >>> Can't I run the command using sesearch tool and policy.conf file? >> >>> >> >>> Thank you >> >>> Best regards >> >>> >> >>> >> >>> 2013/10/24 Stephen Smalley <s...@tycho.nsa.gov> >> >>> >> >>>> No, pull the policy file from the device and check it directly using >> >>>> sesearch. >> >>>> >> >>>> adb pull /sepolicy >> >>>> sesearch -A -s rild -t rild -c socket sepolicy >> >>>> >> >>>> sesearch is part of the setools package in Fedora or Ubuntu/Debian. >> >>>> >> >>>> I suspect that the policy on the device wasn't built from the sources >> >>>> you are looking at. >> >>>> >> >>>> Also check that you don't have a /data/security/sepolicy file on the >> >>>> device, as that will override the /sepolicy file if present. >> >>>> >> >>>> On 10/23/2013 10:42 AM, Jaejyn Shin wrote: >> >>>>> I got my code from Google ( >> >>>>> https://android.googlesource.com/platform/external/sepolicy/) >> >>>>> >> >>>>> If there are some modifications related to unconfined, Google maybe >> >>>>> modified it. >> >>>>> >> >>>>> Then I will check the recent unconfined.te from SELinux project site >> >>>>> to >> >>>>> compare to my unconfined.te. >> >>>>> >> >>>>> Thank you >> >>>>> Best regards >> >>>>> >> >>>>> >> >>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov> >> >>>>> >> >>>>>> Well, all of those things are allowed by unconfined_domain(). >> >>>>>> Possibilities: >> >>>>>> - The binary /sepolicy file on that device was not built from those >> >>>>>> sources, >> >>>>>> - Someone modified the unconfined.te file in those sources to >> >>>>>> remove >> >> the >> >>>>>> allow rules? >> >>>>>> - Someone modified the unconfined_domain() macro definition in >> >> te_macros >> >>>>>> in those sources to alter what it does. >> >>>>>> >> >>>>>> But an unconfined rild wouldn't get any of those denials. Honest. >> >>>>>> >> >>>>>> On 10/23/2013 10:16 AM, Jaejyn Shin wrote: >> >>>>>>> unconfined_domain(rild) exist in the code. >> >>>>>>> >> >>>>>>> I'm sorry that I can not show you my policy files. >> >>>>>>> >> >>>>>>> I will check the image version of the device which generate the >> >>>>>>> logs. >> >>>>>>> >> >>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov> >> >>>>>>> >> >>>>>>>> Hmmm...then you must not have unconfined_domain(rild) in that >> >> policy. >> >>>>>>>> Otherwise you wouldn't get those denials. >> >>>>>>>> >> >>>>>>>> On 10/23/2013 10:03 AM, Jaejyn Shin wrote: >> >>>>>>>>> Okey. The logs can be gathered from the different devices. >> >>>>>>>>> >> >>>>>>>>> <5>[ 27.585551 / 01-02 13:00:00.810] type=1400 >> >>>>>>>> audit(1230901200.810:14): >> >>>>>>>>> avc: denied { create } for pid=270 comm="rild" >> >>>> scontext=u:r:rild:s0 >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket >> >>>>>>>>> <5>[ 34.643925 / 01-07 20:28:16.959] type=1400 >> >>>> audit(592096.959:26): >> >>>>>>>>> avc: denied { read } for pid=904 comm="rild" >> >> scontext=u:r:rild:s0 >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=netlink_socket >> >>>>>>>>> <5>[ 47.174096 / 01-07 20:28:29.489] type=1400 >> >>>> audit(592109.489:27): >> >>>>>>>>> avc: denied { read } for pid=904 comm="rild" >> >> scontext=u:r:rild:s0 >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=netlink_socket >> >>>>>>>>> <5>[ 48.569500 / 01-07 20:28:30.889] type=1400 >> >>>> audit(592110.889:34): >> >>>>>>>>> avc: denied { write } for pid=1483 comm="RILReceiver" >> >> name="rild" >> >>>>>>>>> dev="tmpfs" ino=8783 scontext=u:r:radio:s0 >> >>>>>>>>> tcontext=u:object_r:rild_socket:s0 tclass=sock_file >> >>>>>>>>> <5>[ 48.569581 / 01-07 20:28:30.889] type=1400 >> >>>> audit(592110.889:35): >> >>>>>>>>> avc: denied { connectto } for pid=1483 comm="RILReceiver" >> >>>>>>>>> path="/dev/socket/rild" scontext=u:r:radio:s0 >> >>>>>>>>> tcontext=u:r:rild:s0 >> >>>>>>>>> tclass=unix_stream_socket >> >>>>>>>>> <6>[ 51.794032 / 01-07 20:28:34.109] avc: denied { set } for >> >>>>>>>>> property=ril.card_operator scontext=u:r:radio:s0 >> >>>>>>>>> tcontext=u:object_r:rild_prop:s0 tclass=property_service >> >>>>>>>>> <5>[ 89.696426 / 01-08 05:29:12.019] type=1400 >> >>>> audit(592152.019:74): >> >>>>>>>>> avc: denied { read } for pid=413 comm="rild" >> >> scontext=u:r:rild:s0 >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket >> >>>>>>>>> <5>[ 138.993392 / 01-08 05:30:01.309] type=1400 >> >>>> audit(592201.309:76): >> >>>>>>>>> avc: denied { read } for pid=413 comm="rild" >> >> scontext=u:r:rild:s0 >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket >> >>>>>>>>> <5>[ 219.571626 / 01-08 05:31:21.889] type=1400 >> >>>> audit(592281.889:77): >> >>>>>>>>> avc: denied { write } for pid=338 comm="rild" >> >>>>>> name="property_service" >> >>>>>>>>> dev="tmpfs" ino=5131 scontext=u:r:rild:s0 >> >>>>>>>>> tcontext=u:object_r:property_socket:s0 tclass=sock_file >> >>>>>>>>> >> >>>>>>>>> >> >>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov> >> >>>>>>>>> >> >>>>>>>>>> Can you show an example avc message that you are getting for >> >>>>>>>>>> rild? >> >>>>>>>>>> >> >>>>>>>>>> On 10/23/2013 09:11 AM, Jaejyn Shin wrote: >> >>>>>>>>>>> Yes. you are right. I was wrong. >> >>>>>>>>>>> untrusted_app.te do not have "confined_domain(untrusted_app)". >> >>>>>>>>>>> >> >>>>>>>>>>> BTW my rild.te has both of "permissive rild" and >> >>>>>>>>>> "unconfined_domain(rild)". >> >>>>>>>>>>> But I can see the avc logs of rild in the kernel logs. >> >>>>>>>>>>> >> >>>>>>>>>>> It is a little confusing. >> >>>>>>>>>>> >> >>>>>>>>>>> Thank you >> >>>>>>>>>>> Best regards >> >>>>>>>>>>> >> >>>>>>>>>>> >> >>>>>>>>>>> >> >>>>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov> >> >>>>>>>>>>> >> >>>>>>>>>>>> If it is already unconfined, you shouldn't get any denials. >> >>>>>>>> unconfined >> >>>>>>>>>>>> is allowed everything (well, except what Google has started >> >>>>>>>>>>>> to >> >>>>>> remove >> >>>>>>>>>>>> from it, like loading policy). >> >>>>>>>>>>>> >> >>>>>>>>>>>> On 10/23/2013 08:54 AM, Jaejyn Shin wrote: >> >>>>>>>>>>>>> Answer 1) >> >>>>>>>>>>>>> In my android source, untrusted_app is permissive and >> >> unconfined. >> >>>>>>>>>>>>> But the avc logs are printing on the kernel log. >> >>>>>>>>>>>>> I do not want see the avc log of the permissive domain like >> >>>>>>>>>>>> untrustes_app. >> >>>>>>>>>>>>> >> >>>>>>>>>>>>> Answer 2) >> >>>>>>>>>>>>> I can not write all allow of untrusted_app because I can not >> >>>>>> predict >> >>>>>>>>>> what >> >>>>>>>>>>>>> avc log will be appeared. >> >>>>>>>>>>>>> This is why I want to use "*" in the dontaudit statement. >> >>>>>>>>>>>>> + Could you let me know a name of the tool to generate >> >> dontaudit >> >>>>>>>> rule? >> >>>>>>>>>>>>> >> >>>>>>>>>>>>> Answer 3) >> >>>>>>>>>>>>> Okey. It looks good way. >> >>>>>>>>>>>>> I have other permissive domains (bluetooth, dbusd, radio, >> >>>>>>>>>>>>> nfc, >> >>>>>>>> kernel, >> >>>>>>>>>>>>> platform_app, release_app....). >> >>>>>>>>>>>>> I should make the te_macro of the way you teach me to use in >> >> the >> >>>>>> all >> >>>>>>>>>>>>> permissive domains. >> >>>>>>>>>>>>> Thank you >> >>>>>>>>>>>>> Best regards >> >>>>>>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov> >> >>>>>>>>>>>>> >> >>>>>>>>>>>>>> On 10/23/2013 02:45 AM, Jaejyn Shin wrote: >> >>>>>>>>>>>>>>> I want to use dontaudit to all domains and all classes >> >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> For example) >> >>>>>>>>>>>>>>> dontaudit untrusted_app *:* * >> >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> but '*' can not be used at the target_type position and >> >>>>>>>>>>>>>>> also >> >>>>>> class >> >>>>>>>>>>>>>> position. >> >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> How can I use dontaudit like this situation ? >> >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> I am referring to this site: " >> >>>>>>>>>> http://selinuxproject.org/page/AVCRules" >> >>>>>>>>>>>>>> >> >>>>>>>>>>>>>> First, let me ask why you don't want to audit any denials >> >>>>>>>>>>>>>> by >> >>>>>>>>>>>>>> untrusted_app. >> >>>>>>>>>>>>>> >> >>>>>>>>>>>>>> Second, you only strictly need to dontaudit whatever isn't >> >>>>>> allowed, >> >>>>>>>> so >> >>>>>>>>>>>>>> you could take the set complement of the allow rules for >> >>>>>>>> untrusted_app >> >>>>>>>>>>>>>> and generate dontaudit rules via a tool. >> >>>>>>>>>>>>>> >> >>>>>>>>>>>>>> Third, if you want to effectively dontaudit everything and >> >>>>>>>>>>>>>> do >> >>>> not >> >>>>>>>> want >> >>>>>>>>>>>>>> to deal with creating such a tool, you could take the >> >>>>>> unconfined.te >> >>>>>>>>>>>>>> rules and copy them over to untrusted_app.te, replacing >> >>>>>>>>>>>>>> "unconfineddomain" with "untrusted_app" and replacing >> >>>>>>>>>>>>>> "allow" >> >>>> with >> >>>>>>>>>>>>>> "dontaudit". unconfined.te should contain every possible >> >> (type, >> >>>>>>>> type, >> >>>>>>>>>>>>>> class) triple at present, although Google is beginning to >> >> prune >> >>>> it >> >>>>>>>>>> down. >> >>>>>>>>>>>>>> >> >>>>>>>>>>>>>> >> >>>>>>>>>>>>>> >> >>>>>>>>>>>>>> >> >>>>>>>>>>>>> >> >>>>>>>>>>>> >> >>>>>>>>>>>> >> >>>>>>>>>>> >> >>>>>>>>>> >> >>>>>>>>>> >> >>>>>>>>> >> >>>>>>>> >> >>>>>>>> >> >>>>>>> >> >>>>>> >> >>>>>> >> >>>>> >> >>>> >> >>>> >> >>> >> >> >> >> >> > >> >
-- This message was distributed to subscribers of the seandroid-list mailing list. If you no longer wish to subscribe, send mail to majord...@tycho.nsa.gov with the words "unsubscribe seandroid-list" without quotes as the message.