Skip to content
Snippets Groups Projects
Commit 4ac4bc05 authored by Stephen Smalley's avatar Stephen Smalley
Browse files

Document the relevant tests associated with specific rules.


Change-Id: I09b4e33b1c9ea201a96d2f07cb74bdb804b5aad2
Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
parent 4b60cc30
No related branches found
No related tags found
No related merge requests found
...@@ -5,8 +5,11 @@ ...@@ -5,8 +5,11 @@
bool android_cts false; bool android_cts false;
if (android_cts) { if (android_cts) {
# Reads /proc/pid entries to check that no unexpected root # For TestDeviceSetup (RootProcessScanner).
# processes are running. # Reads /proc/pid/status and statm entries to check that
# no unexpected root processes are running.
# Also for android.security.cts.VoldExploitTest.
# Requires ability to read /proc/pid/cmdline of vold.
allow appdomain domain:dir r_dir_perms; allow appdomain domain:dir r_dir_perms;
allow appdomain domain:{ file lnk_file } r_file_perms; allow appdomain domain:{ file lnk_file } r_file_perms;
...@@ -15,7 +18,8 @@ allow appdomain domain:{ file lnk_file } r_file_perms; ...@@ -15,7 +18,8 @@ allow appdomain domain:{ file lnk_file } r_file_perms;
dontaudit appdomain appdomain:dir r_dir_perms; dontaudit appdomain appdomain:dir r_dir_perms;
dontaudit appdomain appdomain:file r_file_perms; dontaudit appdomain appdomain:file r_file_perms;
# Walk the file tree, stat any file. # For android.permission.cts.FileSystemPermissionTest.
# Walk the file tree, stat any file in order to check file permissions.
allow appdomain fs_type:dir r_dir_perms; allow appdomain fs_type:dir r_dir_perms;
allow appdomain dev_type:dir r_dir_perms; allow appdomain dev_type:dir r_dir_perms;
allow appdomain file_type:dir_file_class_set getattr; allow appdomain file_type:dir_file_class_set getattr;
...@@ -25,6 +29,7 @@ allow appdomain fs_type:dir_file_class_set getattr; ...@@ -25,6 +29,7 @@ allow appdomain fs_type:dir_file_class_set getattr;
# Tries to open /dev/alarm for writing but expects failure. # Tries to open /dev/alarm for writing but expects failure.
dontaudit appdomain alarm_device:chr_file write; dontaudit appdomain alarm_device:chr_file write;
# For android.security.cts.VoldExploitTest.
# Tries to create and use a netlink kobject uevent socket # Tries to create and use a netlink kobject uevent socket
# to test for a vulnerable vold. # to test for a vulnerable vold.
dontaudit appdomain self:netlink_kobject_uevent_socket create; dontaudit appdomain self:netlink_kobject_uevent_socket create;
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment