To Mr. Stephen Smalley.

Thank you for your checking.


To Mr William Robarts

The original question was that I don't want to see all denial logs of
specific domain.
And I use the third method which Mr. Stephen Smalley suggest to me.

=========================================================
Third, if you want to effectively dontaudit everything and do not want
to deal with creating such a tool, you could take the unconfined.te
rules and copy them over to untrusted_app.te, replacing
"unconfineddomain" with "untrusted_app" and replacing "allow" with
"dontaudit".  unconfined.te should contain every possible (type, type,
class) triple at present, although Google is beginning to prune it down
=========================================================

As Mr. Stephen Smalley said, Google pruned down the unconfined.te, so
occasionally I can meet a denial log of the domain.
But It is endurable number of logs.

And I don't know about Multi level security well yet. I should study about
it.

Thank you for your interest.
Best regards



2013/11/19 Stephen Smalley <stephen.smal...@gmail.com>

> Yes, 10.04 is too old.  Probably need 12.10 or later.
>
> On Mon, Nov 18, 2013 at 3:12 PM, Jaejyn Shin <flagon22b...@gmail.com>
> wrote:
>  > I'm using Ubuntu 10.04.4 LTS.
> > And I upgraded all packages in the server but I still get below error
> >
> > jaejyn.shin@desktop:~/temp$ sesearch -A -s rild -t rild -c socket
> sepolicy
> > ERROR: policydb version 26 does not match my version range 15-24
> > ERROR: Unable to open policy sepolicy.
> > ERROR: Input/output error
> >
> >
> > 2013/11/13 Stephen Smalley <s...@tycho.nsa.gov>
> >>
> >> You can run sesearch on the policy.conf file or on the binary sepolicy
> >> file, both of which can be found under the out/target/product/<board>
> >> directory (although policy.conf is only available as an intermediate
> >> file).
> >>
> >> However, I had suggested running it on the binary sepolicy pulled from
> >> the device to ensure that what you are running on the device matches
> >> what is in your build tree since you indicated that you are getting
> >> denials that are allowed by your policy.
> >>
> >> Try updating your libsepol and setools packages.  What Linux
> >> distro/release are you using?
> >>
> >> On 11/08/2013 09:01 PM, Jaejyn Shin wrote:
> >> > I'm sorry that I could not recognize cc.
> >> >
> >> > Then could you let me know how to check the policy version and how to
> >> > check
> >> > the setool version ?
> >> >
> >> > 2013/11/8 Stephen Smalley <s...@tycho.nsa.gov>
> >> >
> >> >> Please send questions to the seandroid-list or at least cc seandroid,
> >> >> and not just to me.   Anyway, you just need a version of setools that
> >> >> is
> >> >> up-to-date with support for that policy version.  Use a recent
> version
> >> >> of Fedora and you'll be fine.  Recent versions of Debian or Ubuntu
> >> >> should also have the support, but I don't know for sure what
> versions.
> >> >>
> >> >> On 11/08/2013 01:14 AM, Jaejyn Shin wrote:
> >> >>> I met error like below
> >> >>>
> >> >>> ~/temp$ <jaejyn.shin@lge-security-desktop:~/temp$> sesearch -A -s
> rild
> >> >> -t
> >> >>  > rild -c socket sepolicy
> >> >>> ERROR: policydb version 26 does not match my version range 15-24
> >> >>> ERROR: Unable to open policy sepolicy.
> >> >>> ERROR: Input/output error
> >> >>>
> >> >>>
> >> >>> How can I my sesearch tool version and my policy version ?
> >> >>>
> >> >>> And I have policy.conf file.
> >> >>> Can't I run the command using sesearch tool and policy.conf file?
> >> >>>
> >> >>> Thank you
> >> >>> Best regards
> >> >>>
> >> >>>
> >> >>> 2013/10/24 Stephen Smalley <s...@tycho.nsa.gov>
> >> >>>
> >> >>>> No, pull the policy file from the device and check it directly
> using
> >> >>>> sesearch.
> >> >>>>
> >> >>>> adb pull /sepolicy
> >> >>>> sesearch -A -s rild -t rild -c socket sepolicy
> >> >>>>
> >> >>>> sesearch is part of the setools package in Fedora or Ubuntu/Debian.
> >> >>>>
> >> >>>> I suspect that the policy on the device wasn't built from the
> sources
> >> >>>> you are looking at.
> >> >>>>
> >> >>>> Also check that you don't have a /data/security/sepolicy file on
> the
> >> >>>> device, as that will override the /sepolicy file if present.
> >> >>>>
> >> >>>> On 10/23/2013 10:42 AM, Jaejyn Shin wrote:
> >> >>>>> I got my code from Google (
> >> >>>>> https://android.googlesource.com/platform/external/sepolicy/)
> >> >>>>>
> >> >>>>> If there are some modifications related to unconfined, Google
> maybe
> >> >>>>> modified it.
> >> >>>>>
> >> >>>>> Then I will check the recent unconfined.te from SELinux project
> site
> >> >>>>> to
> >> >>>>> compare to my unconfined.te.
> >> >>>>>
> >> >>>>> Thank you
> >> >>>>> Best regards
> >> >>>>>
> >> >>>>>
> >> >>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >> >>>>>
> >> >>>>>> Well, all of those things are allowed by unconfined_domain().
> >> >>>>>> Possibilities:
> >> >>>>>> - The binary /sepolicy file on that device was not built from
> those
> >> >>>>>> sources,
> >> >>>>>> - Someone modified the unconfined.te file in those sources to
> >> >>>>>> remove
> >> >> the
> >> >>>>>> allow rules?
> >> >>>>>> - Someone modified the unconfined_domain() macro definition in
> >> >> te_macros
> >> >>>>>> in those sources to alter what it does.
> >> >>>>>>
> >> >>>>>> But an unconfined rild wouldn't get any of those denials.
>  Honest.
> >> >>>>>>
> >> >>>>>> On 10/23/2013 10:16 AM, Jaejyn Shin wrote:
> >> >>>>>>> unconfined_domain(rild) exist in the code.
> >> >>>>>>>
> >> >>>>>>> I'm sorry that I can not show you my policy files.
> >> >>>>>>>
> >> >>>>>>> I will check the image version of the device which generate the
> >> >>>>>>> logs.
> >> >>>>>>>
> >> >>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >> >>>>>>>
> >> >>>>>>>> Hmmm...then you must not have unconfined_domain(rild) in that
> >> >> policy.
> >> >>>>>>>> Otherwise you wouldn't get those denials.
> >> >>>>>>>>
> >> >>>>>>>> On 10/23/2013 10:03 AM, Jaejyn Shin wrote:
> >> >>>>>>>>> Okey. The logs can be gathered from the different devices.
> >> >>>>>>>>>
> >> >>>>>>>>> <5>[   27.585551 / 01-02 13:00:00.810] type=1400
> >> >>>>>>>> audit(1230901200.810:14):
> >> >>>>>>>>> avc:  denied  { create } for  pid=270 comm="rild"
> >> >>>> scontext=u:r:rild:s0
> >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket
> >> >>>>>>>>> <5>[   34.643925 / 01-07 20:28:16.959] type=1400
> >> >>>> audit(592096.959:26):
> >> >>>>>>>>> avc:  denied  { read } for  pid=904 comm="rild"
> >> >> scontext=u:r:rild:s0
> >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=netlink_socket
> >> >>>>>>>>> <5>[   47.174096 / 01-07 20:28:29.489] type=1400
> >> >>>> audit(592109.489:27):
> >> >>>>>>>>> avc:  denied  { read } for  pid=904 comm="rild"
> >> >> scontext=u:r:rild:s0
> >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=netlink_socket
> >> >>>>>>>>> <5>[   48.569500 / 01-07 20:28:30.889] type=1400
> >> >>>> audit(592110.889:34):
> >> >>>>>>>>> avc:  denied  { write } for  pid=1483 comm="RILReceiver"
> >> >> name="rild"
> >> >>>>>>>>> dev="tmpfs" ino=8783 scontext=u:r:radio:s0
> >> >>>>>>>>> tcontext=u:object_r:rild_socket:s0 tclass=sock_file
> >> >>>>>>>>> <5>[   48.569581 / 01-07 20:28:30.889] type=1400
> >> >>>> audit(592110.889:35):
> >> >>>>>>>>> avc:  denied  { connectto } for  pid=1483 comm="RILReceiver"
> >> >>>>>>>>> path="/dev/socket/rild" scontext=u:r:radio:s0
> >> >>>>>>>>> tcontext=u:r:rild:s0
> >> >>>>>>>>> tclass=unix_stream_socket
> >> >>>>>>>>> <6>[   51.794032 / 01-07 20:28:34.109] avc:  denied  { set }
> for
> >> >>>>>>>>> property=ril.card_operator scontext=u:r:radio:s0
> >> >>>>>>>>> tcontext=u:object_r:rild_prop:s0 tclass=property_service
> >> >>>>>>>>> <5>[   89.696426 / 01-08 05:29:12.019] type=1400
> >> >>>> audit(592152.019:74):
> >> >>>>>>>>> avc:  denied  { read } for  pid=413 comm="rild"
> >> >> scontext=u:r:rild:s0
> >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket
> >> >>>>>>>>> <5>[  138.993392 / 01-08 05:30:01.309] type=1400
> >> >>>> audit(592201.309:76):
> >> >>>>>>>>> avc:  denied  { read } for  pid=413 comm="rild"
> >> >> scontext=u:r:rild:s0
> >> >>>>>>>>> tcontext=u:r:rild:s0 tclass=socket
> >> >>>>>>>>> <5>[  219.571626 / 01-08 05:31:21.889] type=1400
> >> >>>> audit(592281.889:77):
> >> >>>>>>>>> avc:  denied  { write } for  pid=338 comm="rild"
> >> >>>>>> name="property_service"
> >> >>>>>>>>> dev="tmpfs" ino=5131 scontext=u:r:rild:s0
> >> >>>>>>>>> tcontext=u:object_r:property_socket:s0 tclass=sock_file
> >> >>>>>>>>>
> >> >>>>>>>>>
> >> >>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >> >>>>>>>>>
> >> >>>>>>>>>> Can you show an example avc message that you are getting for
> >> >>>>>>>>>> rild?
> >> >>>>>>>>>>
> >> >>>>>>>>>> On 10/23/2013 09:11 AM, Jaejyn Shin wrote:
> >> >>>>>>>>>>> Yes. you are right. I was wrong.
> >> >>>>>>>>>>> untrusted_app.te do not have
> "confined_domain(untrusted_app)".
> >> >>>>>>>>>>>
> >> >>>>>>>>>>> BTW my rild.te has both of "permissive rild" and
> >> >>>>>>>>>> "unconfined_domain(rild)".
> >> >>>>>>>>>>> But I can see the avc logs of rild in the kernel logs.
> >> >>>>>>>>>>>
> >> >>>>>>>>>>> It is a little confusing.
> >> >>>>>>>>>>>
> >> >>>>>>>>>>> Thank you
> >> >>>>>>>>>>> Best regards
> >> >>>>>>>>>>>
> >> >>>>>>>>>>>
> >> >>>>>>>>>>>
> >> >>>>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >> >>>>>>>>>>>
> >> >>>>>>>>>>>> If it is already unconfined, you shouldn't get any denials.
> >> >>>>>>>>  unconfined
> >> >>>>>>>>>>>> is allowed everything (well, except what Google has started
> >> >>>>>>>>>>>> to
> >> >>>>>> remove
> >> >>>>>>>>>>>> from it, like loading policy).
> >> >>>>>>>>>>>>
> >> >>>>>>>>>>>> On 10/23/2013 08:54 AM, Jaejyn Shin wrote:
> >> >>>>>>>>>>>>> Answer 1)
> >> >>>>>>>>>>>>> In my android source, untrusted_app is permissive and
> >> >> unconfined.
> >> >>>>>>>>>>>>> But the avc logs are printing on the kernel log.
> >> >>>>>>>>>>>>> I do not want see the avc log of the permissive domain
> like
> >> >>>>>>>>>>>> untrustes_app.
> >> >>>>>>>>>>>>>
> >> >>>>>>>>>>>>> Answer 2)
> >> >>>>>>>>>>>>> I can not write all allow of untrusted_app because I can
> not
> >> >>>>>> predict
> >> >>>>>>>>>> what
> >> >>>>>>>>>>>>> avc log will be appeared.
> >> >>>>>>>>>>>>> This is why I want to use "*" in the dontaudit statement.
> >> >>>>>>>>>>>>> + Could you let me know a name of the tool to generate
> >> >> dontaudit
> >> >>>>>>>> rule?
> >> >>>>>>>>>>>>>
> >> >>>>>>>>>>>>> Answer 3)
> >> >>>>>>>>>>>>> Okey. It looks good way.
> >> >>>>>>>>>>>>> I have other permissive domains (bluetooth, dbusd, radio,
> >> >>>>>>>>>>>>> nfc,
> >> >>>>>>>> kernel,
> >> >>>>>>>>>>>>> platform_app, release_app....).
> >> >>>>>>>>>>>>> I should make the te_macro of the way you teach me to use
> in
> >> >> the
> >> >>>>>> all
> >> >>>>>>>>>>>>> permissive domains.
> >> >>>>>>>>>>>>> Thank you
> >> >>>>>>>>>>>>> Best regards
> >> >>>>>>>>>>>>> 2013/10/23 Stephen Smalley <s...@tycho.nsa.gov>
> >> >>>>>>>>>>>>>
> >> >>>>>>>>>>>>>>  On 10/23/2013 02:45 AM, Jaejyn Shin wrote:
> >> >>>>>>>>>>>>>>> I want to use dontaudit to all domains and all classes
> >> >>>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>>> For example)
> >> >>>>>>>>>>>>>>> dontaudit untrusted_app *:* *
> >> >>>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>>> but '*' can not be used at the target_type position and
> >> >>>>>>>>>>>>>>> also
> >> >>>>>> class
> >> >>>>>>>>>>>>>> position.
> >> >>>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>>> How can I use dontaudit like this situation ?
> >> >>>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>>> I am referring to this site: "
> >> >>>>>>>>>> http://selinuxproject.org/page/AVCRules";
> >> >>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>> First, let me ask why you don't want to audit any denials
> >> >>>>>>>>>>>>>> by
> >> >>>>>>>>>>>>>> untrusted_app.
> >> >>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>> Second, you only strictly need to dontaudit whatever
> isn't
> >> >>>>>> allowed,
> >> >>>>>>>> so
> >> >>>>>>>>>>>>>> you could take the set complement of the allow rules for
> >> >>>>>>>> untrusted_app
> >> >>>>>>>>>>>>>> and generate dontaudit rules via a tool.
> >> >>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>> Third, if you want to effectively dontaudit everything
> and
> >> >>>>>>>>>>>>>> do
> >> >>>> not
> >> >>>>>>>> want
> >> >>>>>>>>>>>>>> to deal with creating such a tool, you could take the
> >> >>>>>> unconfined.te
> >> >>>>>>>>>>>>>> rules and copy them over to untrusted_app.te, replacing
> >> >>>>>>>>>>>>>> "unconfineddomain" with "untrusted_app" and replacing
> >> >>>>>>>>>>>>>> "allow"
> >> >>>> with
> >> >>>>>>>>>>>>>> "dontaudit".  unconfined.te should contain every possible
> >> >> (type,
> >> >>>>>>>> type,
> >> >>>>>>>>>>>>>> class) triple at present, although Google is beginning to
> >> >> prune
> >> >>>> it
> >> >>>>>>>>>> down.
> >> >>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>>
> >> >>>>>>>>>>>>>
> >> >>>>>>>>>>>>
> >> >>>>>>>>>>>>
> >> >>>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>>
> >> >>>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>>
> >> >>>>>>>
> >> >>>>>>
> >> >>>>>>
> >> >>>>>
> >> >>>>
> >> >>>>
> >> >>>
> >> >>
> >> >>
> >> >
> >>
> >
>

Reply via email to