Skip to content
Snippets Groups Projects
  • Jeff Vander Stoep's avatar
    90ae4f6b
    dumpstate: remove domain_deprecated attribute · 90ae4f6b
    Jeff Vander Stoep authored
    Clean up "granted" logspam. Grant the observered audited permissions
    including:
    
    tcontext=cache_file
    avc: granted { getattr } for comm="df" path="/cache" dev="mmcblk0p9"
    ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:cache_file:s0
    tclass=dir
    avc: granted { search } for comm="Binder:8559_2" name="cache"
    dev="sda13" ino=1654785 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:cache_file:s0 tclass=dir
    avc: granted { read } for comm="Binder:8559_2" name="cache" dev="dm-0"
    ino=23 scontext=u:r:dumpstate:s0 tcontext=u:object_r:cache_file:s0
    tclass=lnk_file
    
    tcontext=proc
    avc: granted { getattr } for comm="Binder:14529_2"
    path="/proc/sys/fs/pipe-max-size" dev="proc" ino=247742
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0
    tclass=file
    avc: granted { read } for comm="Binder:22671_2" name="cmdline"
    dev="proc" ino=4026532100 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:proc:s0 tclass=file
    avc: granted { read open } for comm="dumpstate"
    path="/proc/sys/fs/pipe-max-size" dev="proc" ino=105621
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0
    tclass=file
    
    tcontext=sysfs
    avc: granted { read open } for comm="Binder:14459_2"
    path="/sys/devices/virtual/block/md0/stat" dev="sysfs" ino=51101
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs:s0 tclass=file
    avc: granted { read open } for comm="Binder:21377_2"
    path="/sys/devices/soc/1da4000.ufshc/host0/target0:0:0/0:0:0:1/block/sdb/sdb1"
    dev="sysfs" ino=40888 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:sysfs:s0 tclass=dir
    avc: granted { getattr } for comm="dumpstate" dev="sysfs" ino=40456
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs:s0 tclass=file
    
    tcontext=proc_meminfo
    avc: granted { read } for comm="top" name="meminfo" dev="proc"
    ino=4026532106 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:proc_meminfo:s0 tclass=file
    avc: granted { read open } for comm="top" path="/proc/meminfo"
    dev="proc" ino=4026532106 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:proc_meminfo:s0 tclass=file
    
    tcontext=rootfs
    avc: granted { getattr } for comm="df" path="/" dev="dm-0" ino=2
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:rootfs:s0 tclass=dir
    avc: granted { getattr } for comm="ip" path="/vendor" dev="rootfs"
    ino=99 scontext=u:r:dumpstate:s0 tcontext=u:object_r:rootfs:s0
    tclass=lnk_file
    
    tcontext=selinuxfs
    avc: granted { getattr } for comm="df" path="/sys/fs/selinux"
    dev="selinuxfs" ino=1 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:selinuxfs:s0 tclass=dir
    
    tcontext=system_file
    avc: granted { read open } for comm="dumpstate" path="/system/lib64/hw"
    dev="dm-0" ino=1947 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:system_file:s0 tclass=dir
    
    tcontext=system_data_file
    avc: granted { read } for comm="ip" path="/data/misc/net/rt_tables"
    dev="sda10" ino=1458261 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:system_data_file:s0 tclass=file
    avc: granted { getattr } for comm="ip" path="/data/misc/net/rt_tables"
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:system_data_file:s0
    tclass=file
    
    Bug: 28760354
    Test: Build policy
    Change-Id: Iae69f710d6b6dc6158cf6bb6ff61168c8df11263
    90ae4f6b
    History
    dumpstate: remove domain_deprecated attribute
    Jeff Vander Stoep authored
    Clean up "granted" logspam. Grant the observered audited permissions
    including:
    
    tcontext=cache_file
    avc: granted { getattr } for comm="df" path="/cache" dev="mmcblk0p9"
    ino=2 scontext=u:r:dumpstate:s0 tcontext=u:object_r:cache_file:s0
    tclass=dir
    avc: granted { search } for comm="Binder:8559_2" name="cache"
    dev="sda13" ino=1654785 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:cache_file:s0 tclass=dir
    avc: granted { read } for comm="Binder:8559_2" name="cache" dev="dm-0"
    ino=23 scontext=u:r:dumpstate:s0 tcontext=u:object_r:cache_file:s0
    tclass=lnk_file
    
    tcontext=proc
    avc: granted { getattr } for comm="Binder:14529_2"
    path="/proc/sys/fs/pipe-max-size" dev="proc" ino=247742
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0
    tclass=file
    avc: granted { read } for comm="Binder:22671_2" name="cmdline"
    dev="proc" ino=4026532100 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:proc:s0 tclass=file
    avc: granted { read open } for comm="dumpstate"
    path="/proc/sys/fs/pipe-max-size" dev="proc" ino=105621
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:proc:s0
    tclass=file
    
    tcontext=sysfs
    avc: granted { read open } for comm="Binder:14459_2"
    path="/sys/devices/virtual/block/md0/stat" dev="sysfs" ino=51101
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs:s0 tclass=file
    avc: granted { read open } for comm="Binder:21377_2"
    path="/sys/devices/soc/1da4000.ufshc/host0/target0:0:0/0:0:0:1/block/sdb/sdb1"
    dev="sysfs" ino=40888 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:sysfs:s0 tclass=dir
    avc: granted { getattr } for comm="dumpstate" dev="sysfs" ino=40456
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:sysfs:s0 tclass=file
    
    tcontext=proc_meminfo
    avc: granted { read } for comm="top" name="meminfo" dev="proc"
    ino=4026532106 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:proc_meminfo:s0 tclass=file
    avc: granted { read open } for comm="top" path="/proc/meminfo"
    dev="proc" ino=4026532106 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:proc_meminfo:s0 tclass=file
    
    tcontext=rootfs
    avc: granted { getattr } for comm="df" path="/" dev="dm-0" ino=2
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:rootfs:s0 tclass=dir
    avc: granted { getattr } for comm="ip" path="/vendor" dev="rootfs"
    ino=99 scontext=u:r:dumpstate:s0 tcontext=u:object_r:rootfs:s0
    tclass=lnk_file
    
    tcontext=selinuxfs
    avc: granted { getattr } for comm="df" path="/sys/fs/selinux"
    dev="selinuxfs" ino=1 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:selinuxfs:s0 tclass=dir
    
    tcontext=system_file
    avc: granted { read open } for comm="dumpstate" path="/system/lib64/hw"
    dev="dm-0" ino=1947 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:system_file:s0 tclass=dir
    
    tcontext=system_data_file
    avc: granted { read } for comm="ip" path="/data/misc/net/rt_tables"
    dev="sda10" ino=1458261 scontext=u:r:dumpstate:s0
    tcontext=u:object_r:system_data_file:s0 tclass=file
    avc: granted { getattr } for comm="ip" path="/data/misc/net/rt_tables"
    scontext=u:r:dumpstate:s0 tcontext=u:object_r:system_data_file:s0
    tclass=file
    
    Bug: 28760354
    Test: Build policy
    Change-Id: Iae69f710d6b6dc6158cf6bb6ff61168c8df11263