Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

te_macros

  • Nick Kralevich's avatar
    6937aa93
    refine /data/misc/logd rules · 6937aa93
    Nick Kralevich authored
    Followup to 121f5bfd.
    
    Move misc_logd_file neverallow rule from domain.te to logd.te,
    since the goal of the neverallow rule is to protect logd / logpersist
    files from other processes.
    
    Switch the misc_logd_file neverallow rule from using "rw_file_perms"
    to "no_rw_file_perms". The latter covers more cases of file
    modifications.
    
    Add more neverallow rules covering misc_logd_file directories.
    
    Instead of using not_userdebug_nor_eng(), modify the rules to be
    consistent with other highly constrained file types such as
    keystore_data_file or vold_data_file. See, for example,
    https://android-review.googlesource.com/144768
    
    To see the net effect of this change, you can use the following
    command line:
    
      sesearch --allow -t misc_logd_file -c file,dir,lnk_file \
      out/target/product/bullhead/root/sepolicy
    
    Before this change:
    
      # userdebug builds
      allow init misc_logd_file:dir { search setattr read create getattr write relabelfrom ioctl rmdir remove_name relabelto open add_name };
      allow init misc_logd_file:file { setattr read create write relabelfrom getattr relabelto unlink open };
      allow init misc_logd_file:lnk_file { setattr relabelfrom create getattr relabelto unlink };
      allow logd misc_logd_file:dir { search read lock getattr write ioctl remove_name open add_name };
      allow logd misc_logd_file:file { rename setattr read lock create getattr write ioctl unlink open append };
      allow shell misc_logd_file:dir { search read lock getattr ioctl open };
      allow shell misc_logd_file:file { read lock ioctl open getattr };
    
      # user builds
      allow init misc_logd_file:dir { search setattr read create getattr write relabelfrom ioctl rmdir remove_name relabelto open add_name };
      allow init misc_logd_file:file relabelto;
      allow init misc_logd_file:lnk_file { setattr relabelfrom create getattr relabelto unlink };
    
    After this change:
    
      # userdebug builds
      allow init misc_logd_file:dir { search setattr read create getattr ioctl relabelto open };
      allow init misc_logd_file:file { relabelto getattr };
      allow init misc_logd_file:lnk_file relabelto;
      allow logd misc_logd_file:dir { search read lock getattr write ioctl remove_name open add_name };
      allow logd misc_logd_file:file { rename setattr read lock create getattr write ioctl unlink open append };
      allow shell misc_logd_file:dir { search read lock getattr ioctl open };
      allow shell misc_logd_file:file { read lock ioctl open getattr };
    
      # user builds
      allow init misc_logd_file:dir { search setattr read create getattr ioctl relabelto open };
      allow init misc_logd_file:file { relabelto getattr };
      allow init misc_logd_file:lnk_file relabelto;
    
    Change-Id: I0b00215049ad83182f458b4b9e258289c5144479
    6937aa93
    History
    refine /data/misc/logd rules
    Nick Kralevich authored
    Followup to 121f5bfd.
    
    Move misc_logd_file neverallow rule from domain.te to logd.te,
    since the goal of the neverallow rule is to protect logd / logpersist
    files from other processes.
    
    Switch the misc_logd_file neverallow rule from using "rw_file_perms"
    to "no_rw_file_perms". The latter covers more cases of file
    modifications.
    
    Add more neverallow rules covering misc_logd_file directories.
    
    Instead of using not_userdebug_nor_eng(), modify the rules to be
    consistent with other highly constrained file types such as
    keystore_data_file or vold_data_file. See, for example,
    https://android-review.googlesource.com/144768
    
    To see the net effect of this change, you can use the following
    command line:
    
      sesearch --allow -t misc_logd_file -c file,dir,lnk_file \
      out/target/product/bullhead/root/sepolicy
    
    Before this change:
    
      # userdebug builds
      allow init misc_logd_file:dir { search setattr read create getattr write relabelfrom ioctl rmdir remove_name relabelto open add_name };
      allow init misc_logd_file:file { setattr read create write relabelfrom getattr relabelto unlink open };
      allow init misc_logd_file:lnk_file { setattr relabelfrom create getattr relabelto unlink };
      allow logd misc_logd_file:dir { search read lock getattr write ioctl remove_name open add_name };
      allow logd misc_logd_file:file { rename setattr read lock create getattr write ioctl unlink open append };
      allow shell misc_logd_file:dir { search read lock getattr ioctl open };
      allow shell misc_logd_file:file { read lock ioctl open getattr };
    
      # user builds
      allow init misc_logd_file:dir { search setattr read create getattr write relabelfrom ioctl rmdir remove_name relabelto open add_name };
      allow init misc_logd_file:file relabelto;
      allow init misc_logd_file:lnk_file { setattr relabelfrom create getattr relabelto unlink };
    
    After this change:
    
      # userdebug builds
      allow init misc_logd_file:dir { search setattr read create getattr ioctl relabelto open };
      allow init misc_logd_file:file { relabelto getattr };
      allow init misc_logd_file:lnk_file relabelto;
      allow logd misc_logd_file:dir { search read lock getattr write ioctl remove_name open add_name };
      allow logd misc_logd_file:file { rename setattr read lock create getattr write ioctl unlink open append };
      allow shell misc_logd_file:dir { search read lock getattr ioctl open };
      allow shell misc_logd_file:file { read lock ioctl open getattr };
    
      # user builds
      allow init misc_logd_file:dir { search setattr read create getattr ioctl relabelto open };
      allow init misc_logd_file:file { relabelto getattr };
      allow init misc_logd_file:lnk_file relabelto;
    
    Change-Id: I0b00215049ad83182f458b4b9e258289c5144479