diff mbox series

[meta-oe] refpolicy-targeted: Updated policy to allow adb push and adb pull through adb shell - adb push is allowed to /tmp only - adb pull is allowed on all files

Message ID 20260402084123.405103-1-gmisra@qti.qualcomm.com
State New
Headers show
Series [meta-oe] refpolicy-targeted: Updated policy to allow adb push and adb pull through adb shell - adb push is allowed to /tmp only - adb pull is allowed on all files | expand

Commit Message

Gargi Misra April 2, 2026, 8:41 a.m. UTC
Signed-off-by: Gargi Misra <gmisra@qti.qualcomm.com>
---
 .../0001-Added-sepolicy-for-adb-service.patch | 36 +++++++++++++------
 1 file changed, 25 insertions(+), 11 deletions(-)

Comments

Gyorgy Sarvari April 2, 2026, 12:06 p.m. UTC | #1
Could you please trim the subject, and move part of it to the description?

Also, I know that this came up before, but I still don't really
understand why meta-oe is a better place for this patch, instead of
meta-selinux. The reason for this could be me, I don't know much about
selinux, so please bear with me.

I had a quick look at meta-selinux, and it seems that it depends
indirectly on meta-oe (it depends on meta-python, which in turn depends
on meta-oe) - so if someone uses meta-selinux, this patch will kick in
unconditionally. At the first sight this means to me that having this
patch in meta-oe instead of meta-selinux just kind of obscures its
presence, without any apparent benefits.

Am I missing something?


On 4/2/26 10:41, Gargi Misra via lists.openembedded.org wrote:
> Signed-off-by: Gargi Misra <gmisra@qti.qualcomm.com>
> ---
>  .../0001-Added-sepolicy-for-adb-service.patch | 36 +++++++++++++------
>  1 file changed, 25 insertions(+), 11 deletions(-)
> 
> diff --git a/meta-oe/dynamic-layers/selinux/recipes-security/refpolicy/refpolicy-targeted/0001-Added-sepolicy-for-adb-service.patch b/meta-oe/dynamic-layers/selinux/recipes-security/refpolicy/refpolicy-targeted/0001-Added-sepolicy-for-adb-service.patch
> index 62f81e4ffb..29d45641d6 100644
> --- a/meta-oe/dynamic-layers/selinux/recipes-security/refpolicy/refpolicy-targeted/0001-Added-sepolicy-for-adb-service.patch
> +++ b/meta-oe/dynamic-layers/selinux/recipes-security/refpolicy/refpolicy-targeted/0001-Added-sepolicy-for-adb-service.patch
> @@ -1,6 +1,6 @@
> -From c110d893be565ade574ee2933c6e89197f833006 Mon Sep 17 00:00:00 2001
> +From d1c726eb1da3718d05a694222fa0a6a0e944f381 Mon Sep 17 00:00:00 2001
>  From: Gargi Misra <gmisra@qti.qualcomm.com>
> -Date: Thu, 5 Mar 2026 12:39:42 +0530
> +Date: Tue, 31 Mar 2026 23:39:22 +0530
>  Subject: [PATCH] refpolicy-targeted: Added sepolicy for adb service
>  
>      - Labeled adb binary
> @@ -12,15 +12,15 @@ Signed-off-by: Gargi Misra <gmisra@qti.qualcomm.com>
>  ---
>   policy/modules/services/adbd.fc |  5 +++++
>   policy/modules/services/adbd.if |  5 +++++
> - policy/modules/services/adbd.te | 25 +++++++++++++++++++++++++
> - 3 files changed, 35 insertions(+)
> + policy/modules/services/adbd.te | 39 +++++++++++++++++++++++++++++++++
> + 3 files changed, 49 insertions(+)
>   create mode 100644 policy/modules/services/adbd.fc
>   create mode 100644 policy/modules/services/adbd.if
>   create mode 100644 policy/modules/services/adbd.te
>  
>  diff --git a/policy/modules/services/adbd.fc b/policy/modules/services/adbd.fc
>  new file mode 100644
> -index 000000000..6f5bb9269
> +index 000000000..57d4c1d45
>  --- /dev/null
>  +++ b/policy/modules/services/adbd.fc
>  @@ -0,0 +1,5 @@
> @@ -31,7 +31,7 @@ index 000000000..6f5bb9269
>  +
>  diff --git a/policy/modules/services/adbd.if b/policy/modules/services/adbd.if
>  new file mode 100644
> -index 000000000..612fc0106
> +index 000000000..d71ab1374
>  --- /dev/null
>  +++ b/policy/modules/services/adbd.if
>  @@ -0,0 +1,5 @@
> @@ -42,10 +42,10 @@ index 000000000..612fc0106
>  +
>  diff --git a/policy/modules/services/adbd.te b/policy/modules/services/adbd.te
>  new file mode 100644
> -index 000000000..f7e8ac7d0
> +index 000000000..a58c61c9e
>  --- /dev/null
>  +++ b/policy/modules/services/adbd.te
> -@@ -0,0 +1,25 @@
> +@@ -0,0 +1,39 @@
>  +policy_module(adbd)
>  +
>  +########################################
> @@ -64,13 +64,27 @@ index 000000000..f7e8ac7d0
>  +# Minimal Rules Required for adbd service
>  +allow adbd_t self:capability sys_resource;
>  +
> -+domain_interactive_fd(adbd_t)
>  +dev_rw_usbfs(adbd_t)
> -+files_read_etc_files(adbd_t)
> -+files_rw_etc_runtime_files(adbd_t)
> ++
> ++# Required for semodule on adb shell
> ++domain_interactive_fd(adbd_t)
> ++
> ++# Required for adb pull
> ++files_read_all_symlinks(adbd_t)
> ++files_read_all_files(adbd_t)
> ++
> ++# Required for adb push on /tmp
> ++files_list_tmp(adbd_t)
> ++files_manage_generic_tmp_files(adbd_t)
> ++
>  +term_use_ptmx(adbd_t)
>  +term_use_generic_ptys(adbd_t)
>  +
> ++
> ++
> ++
> ++
> ++
>  -- 
>  2.43.0
>  
> 
> 
> 
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#125963): https://lists.openembedded.org/g/openembedded-devel/message/125963
> Mute This Topic: https://lists.openembedded.org/mt/118630252/6084445
> Group Owner: openembedded-devel+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub [skandigraun@gmail.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
diff mbox series

Patch

diff --git a/meta-oe/dynamic-layers/selinux/recipes-security/refpolicy/refpolicy-targeted/0001-Added-sepolicy-for-adb-service.patch b/meta-oe/dynamic-layers/selinux/recipes-security/refpolicy/refpolicy-targeted/0001-Added-sepolicy-for-adb-service.patch
index 62f81e4ffb..29d45641d6 100644
--- a/meta-oe/dynamic-layers/selinux/recipes-security/refpolicy/refpolicy-targeted/0001-Added-sepolicy-for-adb-service.patch
+++ b/meta-oe/dynamic-layers/selinux/recipes-security/refpolicy/refpolicy-targeted/0001-Added-sepolicy-for-adb-service.patch
@@ -1,6 +1,6 @@ 
-From c110d893be565ade574ee2933c6e89197f833006 Mon Sep 17 00:00:00 2001
+From d1c726eb1da3718d05a694222fa0a6a0e944f381 Mon Sep 17 00:00:00 2001
 From: Gargi Misra <gmisra@qti.qualcomm.com>
-Date: Thu, 5 Mar 2026 12:39:42 +0530
+Date: Tue, 31 Mar 2026 23:39:22 +0530
 Subject: [PATCH] refpolicy-targeted: Added sepolicy for adb service
 
     - Labeled adb binary
@@ -12,15 +12,15 @@  Signed-off-by: Gargi Misra <gmisra@qti.qualcomm.com>
 ---
  policy/modules/services/adbd.fc |  5 +++++
  policy/modules/services/adbd.if |  5 +++++
- policy/modules/services/adbd.te | 25 +++++++++++++++++++++++++
- 3 files changed, 35 insertions(+)
+ policy/modules/services/adbd.te | 39 +++++++++++++++++++++++++++++++++
+ 3 files changed, 49 insertions(+)
  create mode 100644 policy/modules/services/adbd.fc
  create mode 100644 policy/modules/services/adbd.if
  create mode 100644 policy/modules/services/adbd.te
 
 diff --git a/policy/modules/services/adbd.fc b/policy/modules/services/adbd.fc
 new file mode 100644
-index 000000000..6f5bb9269
+index 000000000..57d4c1d45
 --- /dev/null
 +++ b/policy/modules/services/adbd.fc
 @@ -0,0 +1,5 @@
@@ -31,7 +31,7 @@  index 000000000..6f5bb9269
 +
 diff --git a/policy/modules/services/adbd.if b/policy/modules/services/adbd.if
 new file mode 100644
-index 000000000..612fc0106
+index 000000000..d71ab1374
 --- /dev/null
 +++ b/policy/modules/services/adbd.if
 @@ -0,0 +1,5 @@
@@ -42,10 +42,10 @@  index 000000000..612fc0106
 +
 diff --git a/policy/modules/services/adbd.te b/policy/modules/services/adbd.te
 new file mode 100644
-index 000000000..f7e8ac7d0
+index 000000000..a58c61c9e
 --- /dev/null
 +++ b/policy/modules/services/adbd.te
-@@ -0,0 +1,25 @@
+@@ -0,0 +1,39 @@
 +policy_module(adbd)
 +
 +########################################
@@ -64,13 +64,27 @@  index 000000000..f7e8ac7d0
 +# Minimal Rules Required for adbd service
 +allow adbd_t self:capability sys_resource;
 +
-+domain_interactive_fd(adbd_t)
 +dev_rw_usbfs(adbd_t)
-+files_read_etc_files(adbd_t)
-+files_rw_etc_runtime_files(adbd_t)
++
++# Required for semodule on adb shell
++domain_interactive_fd(adbd_t)
++
++# Required for adb pull
++files_read_all_symlinks(adbd_t)
++files_read_all_files(adbd_t)
++
++# Required for adb push on /tmp
++files_list_tmp(adbd_t)
++files_manage_generic_tmp_files(adbd_t)
++
 +term_use_ptmx(adbd_t)
 +term_use_generic_ptys(adbd_t)
 +
++
++
++
++
++
 -- 
 2.43.0