Yes we do have the same settings from SELinux POV.
We have the same code as the AOSP an no more additional changes on top of it.

I think I have to check how setting is done in init.rc . May be that’s 
triggering that (Not sure , will try)
I am using swapon_all for swap space in init.rc.

Thanks.

-----Original Message-----
From: Roberts, William C [mailto:william.c.robe...@intel.com] 
Sent: Tuesday, January 19, 2016 12:50 AM
To: William Roberts; Inamdar Sharif
Cc: seandroid-list@tycho.nsa.gov
Subject: RE: avc denial while enabling zram

The only thing we have is the label and for some reason (not sure why offhand) 
a getattr for the swap_block file for vold.

file_contexts:1:# ZRam device configured as swap space
file_contexts:2:/dev/block/zram0    u:object_r:swap_block_device:s0

vold.te:allow vold swap_block_device:blk_file getattr;

We never had to allow any access from fsck. I see no dontaudits, so perhaps 
were just ignoring the audit messages.

Bill

From: Seandroid-list [mailto:seandroid-list-boun...@tycho.nsa.gov] On Behalf Of 
William Roberts
Sent: Monday, January 18, 2016 8:53 AM
To: Inamdar Sharif <isha...@nvidia.com>
Cc: seandroid-list@tycho.nsa.gov
Subject: RE: avc denial while enabling zram

Interesting, we have swap on zram on Intel devices and I don't recall hearing 
of anything related to this. So we may just be doing a dontaudit or ignoring 
it, not sure offhand.
On Jan 18, 2016 8:41 AM, "Inamdar Sharif" <isha...@nvidia.com> wrote:
>
> >>Is that denial actually manifesting itself as some broken functionality?
>
> As such it is not breaking anything. But this is seen while formatting sdcard 
> as internal storage.
>
>  
>
> Also, why is fsck getting invoked on swap, especially one backed by zram?
>
> Not sure about this but got something from the commit message which says that 
> we don’t have swap device on AOSP.
>
>  
>
> <snip>
>
> e2fsck is invoked on any partitions marked with the check mount
>
> option in the fstab file, typically userdata and cache but never
>
> system.  We allow it to read/write the userdata_block_device and
>
> cache_block_device types but also allow it to read/write the default
>
> block_device type until we can get the more specific types assigned
>
> in all of the device-specific policies.
>
>  
>
> mkswap is invoked on any swap partition defined in the fstab file.
>
> We introduce a new swap_block_device type for this purpose, to be
>
> assigned to any such block devices in the device-specific policies,
>
> and only allow it to read/write such block devices.  As there seem to be
>
> no devices in AOSP with swap partitions in their fstab files, this does
>
> not appear to risk any breakage for existing devices.
>
> </snip>
>
>  
>
> Thanks.
>
>  
>
> From: William Roberts [mailto:bill.c.robe...@gmail.com] 
> Sent: Monday, January 18, 2016 9:54 PM
> To: Inamdar Sharif
> Cc: seandroid-list@tycho.nsa.gov
> Subject: Re: avc denial while enabling zram
>
>  
>
> Is that denial actually manifesting itself as some broken functionality?
>
> Also, why is fsck getting invoked on swap, especially one backed by zram?
>
> On Jan 18, 2016 8:20 AM, "Inamdar Sharif" <isha...@nvidia.com> wrote:
>
> Hi Guys,
>
>  
>
> I am facing the below avc denial while enabling zram.
>
> avc: denied  { getattr } for  pid=7545 comm="e2fsck" path="/dev/block/zram0" 
> dev="tmpfs" ino=11973 scontext=u:r:fsck:s0 
> tcontext=u:object_r:swap_block_device:s0 tclass=blk_file permissive=0 
>
>  
>
> I have labelled dev/block/zram0 as swap_block_device
>
> Also I have an entry in the fstab :
>
> /dev/block/zram0           none     swap    defaults              
> zramsize=536870912
>
>  
>
> But due to neverallow rule in fsck.te  the above permission cannot be granted.
>
> # fsck should never be run on these block devices
>
> neverallow fsck {
>
>   boot_block_device
>
>   frp_block_device
>
>   metadata_block_device
>
>   recovery_block_device
>
>   root_block_device
>
>   swap_block_device
>
>   system_block_device
>
>   vold_device
>
> }:blk_file no_rw_file_perms;
>
>  
>
> So I think we have to remove swap_block_device from the neverallow. Any 
> suggestions??
>
>  
>
> Thanks.
>
> ________________________________
>
> This email message is for the sole use of the intended recipient(s) and may 
> contain confidential information.  Any unauthorized review, use, disclosure 
> or distribution is prohibited.  If you are not the intended recipient, please 
> contact the sender by reply email and destroy all copies of the original 
> message.
>
> ________________________________
>
>
> _______________________________________________
> Seandroid-list mailing list
> Seandroid-list@tycho.nsa.gov
> To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
> To get help, send an email containing "help" to 
> seandroid-list-requ...@tycho.nsa.gov.

_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to