History log of /system/sepolicy/Android.mk
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
3df1fda5e3f9d6cd4b7c40b86bfb6c5109ca8296 27-Feb-2016 Nick Kralevich <nnk@google.com> Don't allow permissive SELinux domains on user builds.

It's a CTS requirement that all SELinux domains be in
enforcing mode. Add the same assertion to the build system
when targeting user builds.

In particular, this avoids a situation where device integrity
checking is enabled on user builds, but permissive denials
are being generated, causing the device to unexpectedly reboot
into safe mode.

A developer wanting to put an SELinux domain into permissive
mode for userdebug/eng purposes can write the following
in their policy:

userdebug_or_eng(`
permissive foo;
')

Bug: 26902605
Bug: 27313768

(cherry picked from commit bca98efa575bedab68f2d5eaee2cd1fd1741962b)

Change-Id: If6abe1fa70c79a1fccdbdd9ff273d92de7565a73
/system/sepolicy/Android.mk
7a294027177e46a2025933d9ce8ab99135b74825 15-Jan-2016 Jeffrey Vander Stoep <jeffv@google.com> Merge changes from topic \'fc_sort-2\' am: 87a73f199a
am: af77ab6b13

* commit 'af77ab6b136b0c4d44e912bbd2b98f958f7ceb45':
fc_sort: initial commit
checkfc: do not die on 0 length fc's
49693f1b4d7871e0e6ce2576fa68541ecb6d1f03 04-Jan-2016 William Roberts <william.c.roberts@intel.com> fc_sort: initial commit

Ordering matters in fc files; the last match wins. In builds where
many BOARD_SEPOLICY_DIRS are set, the order of that list becomes
increasingly important in order to maintain a cohesive built
file_contexts.

To correct this, we sort the device specific file_contexts entries
with the upstream fc_sort tool.

Change-Id: I3775eae11bfa5905cad0d02a0bf26c76ac03437c
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
b9053767ab46d587dc7e1ea3e0a6c93e598b9433 15-Jan-2016 Jeffrey Vander Stoep <jeffv@google.com> Merge "Revert "fc_sort: initial commit"" am: 5de7574a59
am: 62871e5874

* commit '62871e5874e6b1663c732c7f2a2b2d6b36604534':
Revert "fc_sort: initial commit"
b1fb7e4037831a0e6f0fc474c5058cf47292f6a0 15-Jan-2016 Jeffrey Vander Stoep <jeffv@google.com> Revert "fc_sort: initial commit"

Breaks builds with no device specific policy.

Bug: 26568553
This reverts commit 29d146887eacf432b90c0ae460060f79d84dbaca.

Change-Id: If9254d4ad3f104a96325beedebc05dd22664084a
/system/sepolicy/Android.mk
a654d9f3aadaba09f476bef9671130aa7f1b7f3e 14-Jan-2016 Jeffrey Vander Stoep <jeffv@google.com> Merge "fc_sort: initial commit" am: 2dea4525f3
am: faddabe6f5

* commit 'faddabe6f58f30f81938b928597ee7a792c34984':
fc_sort: initial commit
29d146887eacf432b90c0ae460060f79d84dbaca 04-Jan-2016 William Roberts <william.c.roberts@intel.com> fc_sort: initial commit

Ordering matters in fc files; the last match wins. In builds where
many BOARD_SEPOLICY_DIRS are set, the order of that list becomes
increasingly important in order to maintain a cohesive built
file_contexts.

To correct this, we sort the device specific file_contexts entries
with the upstream fc_sort tool.

Change-Id: Id79cc6f434c41179d5c0d0d739c4718918b0b1dc
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
9aa378ec3165c7a80b43dda718e4e2e779a67646 04-Jan-2016 Jeffrey Vander Stoep <jeffv@google.com> Merge "Reduce socket ioctl perms"
cbaa2b7d37c0810009cc0ffa4026334b4bf3096e 22-Dec-2015 Jeff Vander Stoep <jeffv@google.com> Reduce socket ioctl perms

Reduce the socket ioctl commands available to untrusted/isolated apps.
Neverallow accessing sensitive information or setting of network parameters.
Neverallow access to device private ioctls i.e. device specific
customizations as these are a common source of driver bugs.

Define common ioctl commands in ioctl_defines.

Bug: 26267358
Change-Id: Ic5c0af066e26d4cb2867568f53a3e65c5e3b5a5d
/system/sepolicy/Android.mk
efeac86de4ca327eaab3725e28449e94e033d0f1 29-Dec-2015 Daniel Cashman <dcashman@google.com> Merge changes from topic \'sepolicy-makefile-cleanup\' am: 1e5b7a1962
am: 26f06d172d

* commit '26f06d172dc2b55c42b1543c7ef02563241efce1':
Android.mk: cleanse all set but not unset variables
Android.mk: clean dependencies and clear variables
50a478ef72a91eb52797bec322c6cbaf58382da3 29-Dec-2015 William Roberts <william.c.roberts@intel.com> Android.mk: cleanse all set but not unset variables

Discovered by diffing the set of "set variables" with
the set of "cleared variables".

Script:

mydir=$(mktemp -d)

grep -E '(^[a-z].)[a-z0-9_\.]*\s*:?=.' Android.mk | cut -d' ' -f 1-1 | sort | uniq > $mydir/set_vars
grep -E '(^[a-z].)[a-z0-9_\.]*\s*:?=$' Android.mk | cut -d' ' -f1-1 | sort | uniq > $mydir/unset_vars
diff $mydir/set_vars $mydir/unset_vars
rm -rf $mydir

Change-Id: Ib50abac6b417a1bcc1894d9a7bafdbdca371006a
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
46749752e5e64834bfeeb03b5346b8b82ce099e2 29-Dec-2015 William Roberts <william.c.roberts@intel.com> Android.mk: clean dependencies and clear variables

Dependencies being built with newline files in between
were also including the list of files without the newlines,
thus make would have to process 3n-1 files instead of 2n-1
where n is the number of files to process.

Additionally the *_with_nl variables were not being cleared
out and polluting Make's global name-space.

Change-Id: I76ea1a3dfae994b32991730aea7e4308da52a583
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
4b412232c11c24797f72c395fd4c333828f05443 17-Dec-2015 William Roberts <william.c.roberts@intel.com> sectxfile_nl: fix superfluous dependencies am: cb1ab9858e
am: aeb403f233

* commit 'aeb403f233ada241a099777ccd0ef3b007e935e2':
sectxfile_nl: fix superfluous dependencies
cb1ab9858e4f44ee87c4a86f1cc9e858b8b36475 14-Dec-2015 William Roberts <william.c.roberts@intel.com> sectxfile_nl: fix superfluous dependencies

The target sectxfile_nl, which is an auto-generated newline file,
has dependencies on itself and the other files. The dependencies
should be on the other files and this newline file, not the other
way around. Ideally, the *_contexts recipes should have the
dependency recorded for their "contexts" files and the newline
file.

Additionally, recipe dependencies for building the *_contexts files
depended on the list of all the contexts files with the newline file
in that list, however an additional explicit addition of the newline
file was also added in. Remove this, since its in the full list of
files.

Change-Id: Iac658923f23a8d9263d392c44003b6bda4064646
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
e927937f2d54936a340044ef036a0001d5cb09e9 16-Dec-2015 Jeffrey Vander Stoep <jeffv@google.com> Merge "checkfc: add attribute test" am: d48773ab3e
am: c435b7590b

* commit 'c435b7590bd7d7f0594d48976fe931d1f6c07f32':
checkfc: add attribute test
ad3cb39e54040e5a03328d8006f428579d1654e0 25-Sep-2015 William Roberts <william.c.roberts@intel.com> checkfc: add attribute test

Enable checkfc to check *_contexts against a set of valid attributes
which must be associated with all types in the contexts file that
is being checked.

Since it's imperative that checkfc knows which file its checking to
choose the proper attribute set, the -s option is introduced to
indicate the service_contexts file. The property_contexts file continues
to use the existing -p and file_contexts requires no specification, aka
it's the default.

Failure examples:
file_contexts:
Error: type "init" is not of set: "fs_type, dev_type, file_type"

service_contexts:
Error: type "init_exec" is not of set: "service_manager_type"

property_contexts:
Error: type "bluetooth_service" is not of set: "property_type"

Change-Id: I62077e4d0760858a9459e753e14dfd209868080f
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
edb41d8744dac18f738523cde7275a88dea8a8c6 13-Dec-2015 Nick Kralevich <nnk@google.com> Merge "Ensure newlines are added between context config files" am: d6765a99f3
am: 5cfd34957e

* commit '5cfd34957e48cd79e53fbfb8aa4acf1d53f8f638':
Ensure newlines are added between context config files
c8801fec63a785be65808e70232ea241c779fcb5 11-Dec-2015 Richard Haines <richard_c_haines@btinternet.com> Ensure newlines are added between context config files

When multiple file_contexts, service_contexts and property_contexts
are processed by the m4(1) macro processor, they will fail if one
or more of the intermediate files final line is not terminated by
a newline. This patch adds an intervening file only containing a
newline.

Change-Id: Ie66b32fe477d08c69e6d6eb1725f658adc384ce4
Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
/system/sepolicy/Android.mk
3a0ce49b8623299ac7458306b30bda6adda12383 07-Dec-2015 Jeff Vander Stoep <jeffv@google.com> Migrate to upstream policy version 30

Grant untrusted_app and isolated_app unpriv_sock_perms, neverallow
priv_sock_perms to disallow access to MAC address and ESSID.

Change-Id: Idac3b657a153e7d7fdc647ff34b876a325d759b3
/system/sepolicy/Android.mk
4f9107df8f691164c56f86fa1d352c63b28bd02b 08-Dec-2015 Jeffrey Vander Stoep <jeffv@google.com> Revert "Migrate to upstream policy version 30"

This reverts commit 2ea23a6e1ade883ba81f58b364109c4da94ba584.

Change-Id: I5e9efa56d74ab22030611cab515e050e0bb77aca
/system/sepolicy/Android.mk
5ca5696e8b656466a9d46b13d7ab18a13d8c1bba 08-Dec-2015 Jeffrey Vander Stoep <jeffv@google.com> Revert "Migrate to upstream policy version 30"

This reverts commit 2ea23a6e1ade883ba81f58b364109c4da94ba584.

Change-Id: I5e9efa56d74ab22030611cab515e050e0bb77aca
/system/sepolicy/Android.mk
2ea23a6e1ade883ba81f58b364109c4da94ba584 07-Dec-2015 Jeff Vander Stoep <jeffv@google.com> Migrate to upstream policy version 30

Grant untrusted_app and isolated_app unpriv_sock_perms, neverallow
priv_sock_perms to disallow access to MAC address and ESSID.

Change-Id: Idac3b657a153e7d7fdc647ff34b876a325d759b3
/system/sepolicy/Android.mk
0fc831c3b0b8d9a4e10d0931131a0eed06cd4275 29-Jul-2015 Jeff Vander Stoep <jeffv@google.com> Temporarily downgrade to policy version number

Temporarily move from policy version 30 to 29 until device kernels
and prebuilts are all upgraded to the accepted upstream version of
the selinux ioctl command whitelisting code.

(cherry picked from commit 89765083f7da758ff5a5910027ea48ce065fe2fd)

Bug: 22846070

Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
/system/sepolicy/Android.mk
f88e31ea90effd77a5af326780f952b5191cb67b 02-Oct-2015 William Roberts <william.c.roberts@intel.com> am 7fc865a4: service_contexts: don\'t delete intermediate on failure

* commit '7fc865a4caec1a2ced41918449e34596f50f8c43':
service_contexts: don't delete intermediate on failure
630fd5d80c887b987c231d3f8923c272171ef870 02-Oct-2015 William Roberts <william.c.roberts@intel.com> am dcffd2b4: property_contexts: don\'t delete intermediate on failure

* commit 'dcffd2b482a625a99233d82019d7b96919c41600':
property_contexts: don't delete intermediate on failure
0f1b1f353b09560d0e52bcec2e6f66c5fb82756e 02-Oct-2015 Colin Cross <ccross@android.com> am 9eb6c874: Revert "property_contexts: don\'t delete intermediate on failure"

* commit '9eb6c87439da2b00699f644a8b8c335bf8cd9680':
Revert "property_contexts: don't delete intermediate on failure"
2a41cb70a7e3ab987422443855c17a97ec61d3e0 02-Oct-2015 Colin Cross <ccross@android.com> am efcaecab: Revert "service_contexts: don\'t delete intermediate on failure"

* commit 'efcaecab4eb075fdc69942e6915999458fb5f88b':
Revert "service_contexts: don't delete intermediate on failure"
4f821319f7ef3a60800171390c41c4678009d96b 02-Oct-2015 Jeffrey Vander Stoep <jeffv@google.com> am 23c42c38: Merge "service_contexts: don\'t delete intermediate on failure"

* commit '23c42c389b07f6ebda69ca8e834c27b27460879a':
service_contexts: don't delete intermediate on failure
89c1fd25822c7f0720d409d2e0e4782e001b4cfe 02-Oct-2015 Jeffrey Vander Stoep <jeffv@google.com> am e6e94762: Merge "property_contexts: don\'t delete intermediate on failure"

* commit 'e6e947622514bdf0b80bf093c0df1a7d9ae12c37':
property_contexts: don't delete intermediate on failure
7fc865a4caec1a2ced41918449e34596f50f8c43 29-Sep-2015 William Roberts <william.c.roberts@intel.com> service_contexts: don't delete intermediate on failure

When service_contexts fails to build, the file is deleted
leaving only the error message for debugging. Build
service_contexts and general variant as a temporary
intermediate before running checkfc.

Change-Id: Ib9dcbf21d0a28700d500cf0ea4e412b009758d5d
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
dcffd2b482a625a99233d82019d7b96919c41600 29-Sep-2015 William Roberts <william.c.roberts@intel.com> property_contexts: don't delete intermediate on failure

When property_contexts fails to build, the file is deleted
leaving only the error message for debugging. Build
property_contexts and general variant as a temporary
intermediate before running checkfc.

Change-Id: Ia86eb0480c9493ceab36fed779b2fe6ab85d2b3d
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
9eb6c87439da2b00699f644a8b8c335bf8cd9680 01-Oct-2015 Colin Cross <ccross@android.com> Revert "property_contexts: don't delete intermediate on failure"

This reverts commit 7f81b337bc600251b37de2dfa70c47781a2f2d3c.

Change-Id: I79834d0ef3adbf2eed53b07d17160876e2a999c6
/system/sepolicy/Android.mk
efcaecab4eb075fdc69942e6915999458fb5f88b 01-Oct-2015 Colin Cross <ccross@android.com> Revert "service_contexts: don't delete intermediate on failure"

This reverts commit f6ee7a521942036ef7f5c0f6bc74520509934141.

Change-Id: I4f1396e6e4aeecd1109f9c24494c6e82645c0663
/system/sepolicy/Android.mk
f6ee7a521942036ef7f5c0f6bc74520509934141 29-Sep-2015 William Roberts <william.c.roberts@intel.com> service_contexts: don't delete intermediate on failure

When service_contexts fails to build, the file is deleted
leaving only the error message for debugging. Build
service_contexts and general variant as a temporary
intermediate before running checkfc.

Change-Id: Ib9c9247d36e6a6406b4df84d10e982921c07d492
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
7f81b337bc600251b37de2dfa70c47781a2f2d3c 29-Sep-2015 William Roberts <william.c.roberts@intel.com> property_contexts: don't delete intermediate on failure

When property_contexts fails to build, the file is deleted
leaving only the error message for debugging. Build
property_contexts and general variant as a temporary
intermediate before running checkfc.

Change-Id: I431d6f4494fa119c1873eab0e77f0eed3fb5754e
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
92461b61698e4a62ff698c35fee1d98aee6ec626 28-Sep-2015 William Roberts <william.c.roberts@intel.com> am 3746a0ae: file_contexts: don\'t delete intermediate on failure

* commit '3746a0ae63a56a6b18fabd3e89bfe4760a1691e3':
file_contexts: don't delete intermediate on failure
3746a0ae63a56a6b18fabd3e89bfe4760a1691e3 25-Sep-2015 William Roberts <william.c.roberts@intel.com> file_contexts: don't delete intermediate on failure

Currently, if an error is detected in a file_contexts
file, the intermediate file_context.tmp file is removed,
thus making debugging of build issues problematic.

Instead, employ checkfc tool during the compilation recipe
so the m4 concatenated intermediate is preserved on
failure.

Change-Id: Ic827385d3bc3434b6c2a9bba5313cd42b5f15599
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
b49f5cf83f84beae0cbcf52111a4c3040493ff4d 19-Sep-2015 Ivan Krasin <krasin@google.com> am 9aa41303: asan: update condition to work with multiple SANITIZE_TARGET values.

* commit '9aa413036bde2c80c25b381bd685ab05f8390127':
asan: update condition to work with multiple SANITIZE_TARGET values.
9aa413036bde2c80c25b381bd685ab05f8390127 18-Sep-2015 Ivan Krasin <krasin@google.com> asan: update condition to work with multiple SANITIZE_TARGET values.

The goal is to enable SANITIZE_TARGET='address coverage', which
will be used by LLVMFuzzer.

Bug: 22850550
Change-Id: I953649186a7fae9b2495159237521f264d1de3b6
/system/sepolicy/Android.mk
4d526d86756bff4f3bdff9771b479d251613ae82 13-Aug-2015 William Roberts <william.c.roberts@intel.com> am 031e5ce9: Android.mk: Cleanup GENERAL_*_CONTEXTS variables

* commit '031e5ce9c5cd3334cd2a09645cb03306fb552494':
Android.mk: Cleanup GENERAL_*_CONTEXTS variables
dc858fe64da2d238569a28e153d469b6d6ace6f5 13-Aug-2015 William Roberts <william.c.roberts@intel.com> am 6aabc1c7: Android.mk: drop polluting variables

* commit '6aabc1c77b98d0ce8e13871047504afb90108733':
Android.mk: drop polluting variables
031e5ce9c5cd3334cd2a09645cb03306fb552494 13-Aug-2015 William Roberts <william.c.roberts@intel.com> Android.mk: Cleanup GENERAL_*_CONTEXTS variables

Change-Id: Ic70a1208b67fe3961871cdeb39369c2ed3e0ce28
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
6aabc1c77b98d0ce8e13871047504afb90108733 30-Jul-2015 William Roberts <william.c.roberts@intel.com> Android.mk: drop polluting variables

Some of the ALL_*_FILES variables remained that were used
in a way that could not be cleared. Move them to lower
case variants and use a build recipe PRIVATE_*_FILES variable.
This avoids polluting the global namespace.

Change-Id: I83748dab48141af7d3f10ad27fc9319eaf90b970
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
32bbafc1943a74645a7435beb841e0436e3ea628 13-Aug-2015 Richard Haines <richard_c_haines@btinternet.com> am c2d01914: Update Android.mk to support file_contexts.bin

* commit 'c2d01914d12b1c153b5ef32293079764a4342169':
Update Android.mk to support file_contexts.bin
c2d01914d12b1c153b5ef32293079764a4342169 06-Aug-2015 Richard Haines <richard_c_haines@btinternet.com> Update Android.mk to support file_contexts.bin

This change supports external/libselinux changes to implement
PCRE formatted binary file_contexts and general_file_contexts.bin
files.

The $(intermediates) directory will contain the original text file
(that is no longer used on the device) with a .tmp extension as well
as the .bin file to aid analysis.

A CleanSpec.mk file is added to remove the old file_contexts file.

Change-Id: I75a781100082c23536f70ce3603f7de42408b5ba
Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
/system/sepolicy/Android.mk
10c1e872cccc0a26f5d14fa5a79965c5e47f3c05 11-Aug-2015 Dan Willemsen <dwillemsen@google.com> am bc2a49f2: Don\'t assume ordering of

* commit 'bc2a49f24726faec8699ad2eefa73ccbdc7ff3d5':
Don't assume ordering of $(wildcard ...)
bc2a49f24726faec8699ad2eefa73ccbdc7ff3d5 11-Aug-2015 Dan Willemsen <dwillemsen@google.com> Don't assume ordering of $(wildcard ...)

There are no guarantees on the order of the results from a call to the
wildcard function. In fact, the order usually changes between make 3.81
and make 4.0 (and kati).

Instead, sort the results of wildcard in each sepolicy directory, so
that directory order is preserved, but content ordering is reliable.

Change-Id: I1620f89bbdd2b2902f2e0c40526e893ccf5f7775
/system/sepolicy/Android.mk
deb2f8b5f7dbb8360cf1b90bf17c9c7e3d925c41 27-Jul-2015 William Roberts <william.c.roberts@intel.com> am d2185582: Android.mk: Add support for BOARD_SEPOLICY_M4DEFS

* commit 'd21855824d178abea9ac93376757c7aed765cd83':
Android.mk: Add support for BOARD_SEPOLICY_M4DEFS
d21855824d178abea9ac93376757c7aed765cd83 16-Jul-2015 William Roberts <william.c.roberts@intel.com> Android.mk: Add support for BOARD_SEPOLICY_M4DEFS

Allow device builders to pass arbitrary m4 definitions
during the build via make variable BOARD_SEPOLICY_M4DEFS.
This enables OEMs to define their own static policy build
conditionals.

Change-Id: Ibea1dbb7b8615576c5668e47f16ed0eedfa0b73c
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
07039d386aa7bdb5c10115308fd9abbac0cccf93 23-Jul-2015 Colin Cross <ccross@android.com> am 29a463d5: Use build fingerprint from file

* commit '29a463d5d594a1b83288eff2da1f8829a69d3d46':
Use build fingerprint from file
29a463d5d594a1b83288eff2da1f8829a69d3d46 17-Jul-2015 Colin Cross <ccross@android.com> Use build fingerprint from file

Improve incremental ninja builds by keeping the command line the same
across builds.

Change-Id: Iedbaa40c9f816f91afc8f073a9ed7f9ffd5d9a53
/system/sepolicy/Android.mk
457e446fe7353ca3520fb16063ee9d26a8f136b4 16-Jul-2015 Nick Kralevich <nnk@google.com> am 1a6e29e2: Merge "android.mk: drop duplicate spaces"

* commit '1a6e29e251ead902509e4ff25fdfdcaf023d860e':
android.mk: drop duplicate spaces
85402534f353ecbe1b627e4178ab1a871b16cbd3 16-Jul-2015 William Roberts <william.c.roberts@intel.com> android.mk: drop duplicate spaces

Change-Id: Iae3edba40a94f78e78c0cc89a03e3f5a098d3909
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
b2420cf4ece072d36d118cf43a3e2af355ff30ae 10-Jul-2015 William Roberts <william.c.roberts@intel.com> am ffc86bea: Correct local variables for file_contexts_asan

* commit 'ffc86bea0e38147a9330177708aedbccd603627a':
Correct local variables for file_contexts_asan
ffc86bea0e38147a9330177708aedbccd603627a 29-Jun-2015 William Roberts <william.c.roberts@intel.com> Correct local variables for file_contexts_asan

Lowercase local variables and clear them to be
consistent with other recipes and prevent polluting
Make's global name space with set variables.

Change-Id: If455cd4f33d5babbea985867a711e8a10c21a00f
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
e1a2001fc5d05368bc01fa8d655a6f0e2a7b9758 07-Jul-2015 William Roberts <william.c.roberts@intel.com> am 99fe8df2: hide checkseapp command invocation

* commit '99fe8df245f4346c14a3dfaf856006c7ebf51ad2':
hide checkseapp command invocation
0046404b2c3b575c87418e0d790bbca9ea1a82cf 07-Jul-2015 William Roberts <william.c.roberts@intel.com> am b876993f: use a general sepolicy when building general targets

* commit 'b876993f4ee25fb299b7521b0dc565248d3db2a6':
use a general sepolicy when building general targets
99fe8df245f4346c14a3dfaf856006c7ebf51ad2 30-Jun-2015 William Roberts <william.c.roberts@intel.com> hide checkseapp command invocation

Change-Id: I040904b69b98c49d60546f024f5ace5b7c6f7d5e
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
807b8a6f9dcd59c8bbe9086c9c3d42a87ef286cd 07-Jul-2015 William Roberts <william.c.roberts@intel.com> am 3a74555c: Drop unused variable in Android.mk

* commit '3a74555c4e6c3b87c43b1eb311a2e418f6d88453':
Drop unused variable in Android.mk
b876993f4ee25fb299b7521b0dc565248d3db2a6 30-Jun-2015 William Roberts <william.c.roberts@intel.com> use a general sepolicy when building general targets

Change-Id: Ie800ebf9d8e68680ec377e8c51f7cd7717f3c755
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
3a74555c4e6c3b87c43b1eb311a2e418f6d88453 30-Jun-2015 William Roberts <william.c.roberts@intel.com> Drop unused variable in Android.mk

Change-Id: Ibd22582deb24fde49cdb71b8754446f3948db36c
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
bf4568d1cda87bb987a85026c686f3032f9b35d4 29-Jun-2015 William Roberts <william.c.roberts@intel.com> am 4ee7131a: Introduce seapp_neverallow test

* commit '4ee7131ade43a046ad784a91bdded7c3c77206cd':
Introduce seapp_neverallow test
4ee7131ade43a046ad784a91bdded7c3c77206cd 25-Jun-2015 William Roberts <william.c.roberts@intel.com> Introduce seapp_neverallow test

Produce a list of neverallow assertions from seapp_contexts into
a separate file, general_seapp_context_neverallows, to be used
during CTS neverallow checking.

Change-Id: I171ed43cf4ae4961f66d5d8f56695345493f1261
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
8f519b3f0f565783d0fab8c4769d2eb1320af0b3 29-Jun-2015 William Roberts <william.c.roberts@intel.com> am da52e859: correct colon usage on make targets

* commit 'da52e85906289d5b691404ffed1fb830065140f9':
correct colon usage on make targets
da52e85906289d5b691404ffed1fb830065140f9 27-Jun-2015 William Roberts <william.c.roberts@intel.com> correct colon usage on make targets

Change-Id: If944d8bd1e324f6500920ee3c5d44611ec7f8af9
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
942c0ea901bdcc1dfbc91d61716daea4b20d19ca 26-Jun-2015 William Roberts <william.c.roberts@intel.com> am 81e1f90c: check_seapp: add support for "neverallow" checks

* commit '81e1f90cd13b262f9e3021f64ae3574b8f5cd5d0':
check_seapp: add support for "neverallow" checks
81e1f90cd13b262f9e3021f64ae3574b8f5cd5d0 04-Jun-2015 William Roberts <william.c.roberts@intel.com> check_seapp: add support for "neverallow" checks

Introduce "neverallow" rules for seapp_contexts. A neverallow rule is
similar to the existing key-value-pair entries but the line begins
with "neverallow". A neverallow violation is detected when all keys,
both inputs and outputs are matched. The neverallow rules value
parameter (not the key) can contain regular expressions to assist in
matching. Neverallow rules are never output to the generated
seapp_contexts file.

Also, unless -o is specified, checkseapp runs in silent mode and
outputs nothing. Specifying - as an argument to -o outputs to stdout.

Sample Output:
Error: Rule in File "external/sepolicy/seapp_contexts" on line 87: "user=fake domain=system_app type=app_data_file" violates neverallow in File "external/sepolicy/seapp_contexts" on line 57: "user=((?!system).)* domain=system_app"

Change-Id: Ia4dcbf02feb774f2e201bb0c5d4ce385274d8b8d
Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
651a315ad276643930d24f25970338d868786532 15-Jun-2015 Evgenii Stepanov <eugenis@google.com> am 4b4c5645: Merge "Extend sepolicy for SANITIZE_TARGET."

* commit '4b4c5645931a0e187d261c4db6caac67d09ab4e4':
Extend sepolicy for SANITIZE_TARGET.
930304829b2cadd3c88876c6234af702d1e43bd5 13-Jun-2015 Evgenii Stepanov <eugenis@google.com> Extend sepolicy for SANITIZE_TARGET.

SANITIZE_TARGET adds shared libraries in /data/lib.

Bug: 21785137
Change-Id: I8ac3d059d88d57d24ed762ffc6202a4ce5a42333
/system/sepolicy/Android.mk
de9b5301a14abf388589b06e819bb001d69e0cf1 06-Jun-2015 Jeff Vander Stoep <jeffv@google.com> restrict app access to socket ioctls

Create a macro of unprivileged ioctls including
- All common socket ioctls except MAC address
- All wireless extensions ioctls except get/set ESSID
- Some commonly used tty ioctls

Bug: 21657002
Change-Id: Ib08be9cb70d08c1fa2c8bddbae519e7c2df5293c
/system/sepolicy/Android.mk
64b01c6165e77292cfc3649dccba18c60670495d 04-May-2015 Jeff Vander Stoep <jeffv@google.com> Update policy version to enable ioctl whitelisting

Bug: 20756547
Bug: 18087110
Change-Id: I9ff76f1cf359e38c19d7b50a5b7236fd673d937e
/system/sepolicy/Android.mk
8e0ca8867eac09f8fd740485f147684d6a88b803 01-Apr-2015 Stephen Smalley <sds@tycho.nsa.gov> Drop BOARD_SEPOLICY_UNION.

As suggested in the comments on
https://android-review.googlesource.com/#/c/141560/
drop BOARD_SEPOLICY_UNION and simplify the build_policy logic.
Union all files found under BOARD_SEPOLICY_DIRS.

Unlike BOARD_SEPOLICY_REPLACE/IGNORE, on which we trigger an error
to catch any lingering uses and force updating of the BoardConfig.mk
files, we only warn on uses of BOARD_SEPOLICY_UNION to avoid
breaking the build until all device BoardConfig*.mk files have been
updated, and since they should be harmless - the files will be unioned
regardless.

Change-Id: I4214893c999c23631f5456cb1b8edd59771ef13b
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
b4f17069b3514a4b7b3f5c42e879494bbe96bbaf 13-Mar-2015 Stephen Smalley <sds@tycho.nsa.gov> sepolicy: Drop BOARD_SEPOLICY_IGNORE/REPLACE support.

With changes I431c1ab22fc53749f623937154b9ec43469d9645 and
Ia54aa263f2245c7090f4b9d9703130c19f11bd28, it is no longer
legitimate to use BOARD_SEPOLICY_IGNORE or REPLACE with
any of the *_contexts files since the CTS requires the AOSP
entries to be present in the device files.

Further, these changes render BOARD_SEPOLICY_IGNORE unusable for
most policy files since all domains and types referenced within any
of the AOSP *_contexts entries must be defined in the kernel policy, so
you cannot use BOARD_SEPOLICY_IGNORE to exclude any .te file
that defines a type referenced in any of those *_contexts files.
There does not seem to be a significant need for such a facility,
as AOSP policy is small and only domains and types used by most
devices should be defined in external/sepolicy.

BOARD_SEPOLICY_REPLACE is commonly misused to eliminate neverallow rules
from AOSP policy, which will only lead to CTS failures, especially
since change Iefe508df265f62efa92f8eb74fc65542d39e3e74 introduced neverallow
checking on the entire policy via sepolicy-analyze. The only remaining
legitimate function of BOARD_SEPOLICY_REPLACE is to support overriding
AOSP .te files with more restrictive rule sets. However, the need for this
facility has been significantly reduced by the fact that AOSP policy
is now fully confined + enforcing for all domains, and further restrictions
beyond AOSP carry a compatibility risk.

Builders of custom policies and custom ROMs still have the freedom to
apply patches on top of external/sepolicy to tighten rule sets (which are
likely more maintainable than maintaining a completely separate copy of
the file via BOARD_SEPOLICY_REPLACE) and/or of using their own separate
policy build system as exemplified by
https://bitbucket.org/quarksecurity/build-policies

Change-Id: I2611e983f7cbfa15f9d45ec3ea301e94132b06fa
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
c93617315e69f9bd7319476afbd3f91d00dd6b5a 13-Mar-2015 Stephen Smalley <sds@tycho.nsa.gov> Fix rules for general_property_contexts.

Failed to include base_rules.mk, so this target was not being built.

Change-Id: I2414fa6c3e3e37c74f63c205e3694d1a811c956e
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
2e0cd5ad36321fd7a8f21768dac080d09b658920 12-Mar-2015 Stephen Smalley <sds@tycho.nsa.gov> Generate general versions of the other contexts files for tests.

Generate general forms of the remaining *_contexts files with only the
device-independent entries for use in CTS testing.

Change-Id: I2bf0e41db8a73c26754cedd92cbc3783ff03d6b5
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
377128778d2d2055044c8f4a65e7b0097ab59fd4 12-Mar-2015 Stephen Smalley <sds@tycho.nsa.gov> Generate a general_seapp_contexts file for tests.

Generate a general_seapp_contexts file with only the
device-independent entries, similar to general_sepolicy.conf.
This is for use by CTS tests to compare with the prefix of
device seapp_contexts.

Change-Id: If8d1456afff5347adff7157411c6a160484e0b39
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
f435a8e55653be6e5d95a995d80ed4982f5a1628 28-Feb-2015 Nick Kralevich <nnk@google.com> Delete unconfined domain

No longer used. :-)

Change-Id: I687cc36404e8ad8b899b6e76b1de7ee8c5392e07
/system/sepolicy/Android.mk
754f5ea7ee4bb252e6f84b2b1228d5e210abe0ce 03-Dec-2014 William Roberts <bill.c.roberts@gmail.com> Allow overiding FORCE_PERMISSIVE_TO_UNCONFINED

It's beneficial to be able to overide this in a device makefile
if you need to get the domains into an unconfined state to keep
the logs from filling up on kernel entries without having to add
rules into device specific policy.

Change-Id: I7778be01256ac601f247e4d6e12573d0d23d12a1
/system/sepolicy/Android.mk
f330f3752922f124305c67683d061c19c9518bed 13-Nov-2014 William Roberts <bill.c.roberts@gmail.com> Remove network shell script

This seems to not really being used, especially considering
that the init.rc does not have a oneshot service for it, and its
not using the build_policy() and other things to even make it
configurable.

Change-Id: I964f94b30103917ed39cf5d003564de456b169a5
/system/sepolicy/Android.mk
ee58864b953a2d3601e8e805be32bd71a16e9bd3 07-Nov-2014 Stephen Smalley <sds@tycho.nsa.gov> Revert "DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true"

Change-Id I52fd5fbe30a7f52f1143f176915ce55fb6a33f87 was only intended
for lollipop, not for master.

This reverts commit 2aa727e3f01f814384bd4a49281c7c39cf562ff6.

Change-Id: If2101939eb50cd6bbcde118b91c003d1f30d811c
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
39f92a8350cd02eaa279687699bc4208e9ab0dd8 06-Nov-2014 Nick Kralevich <nnk@google.com> am f7e98fe2: Merge "recovery.te: add /data neverallow rules"

* commit 'f7e98fe2c988d88a4a98a1fdfd07561cef013e5c':
recovery.te: add /data neverallow rules
a17a266e7e466d281f0730449c492de46390fc76 06-Nov-2014 Nick Kralevich <nnk@google.com> recovery.te: add /data neverallow rules

Recovery should never be accessing files from /data.
In particular, /data may be encrypted, and the files within
/data will be inaccessible to recovery, because recovery doesn't
know the decryption key.

Enforce write/execute restrictions on recovery. We can't tighten
it up further because domain.te contains some /data read-only
access rules, which shouldn't apply to recovery but do.

Create neverallow_macros, used for storing permission macros
useful for neverallow rules. Standardize recovery.te and
property_data_file on the new macros.

Change-Id: I02346ab924fe2fdb2edc7659cb68c4f8dffa1e88
/system/sepolicy/Android.mk
5a6ac67476cb642fc19206c9686488c0b21e224e 04-Aug-2014 dcashman <dcashman@google.com> am 3fe1bcbb: Merge "Generate selinux_policy.xml as part of CTS build."

* commit '3fe1bcbb8d2f2e17e7506d7fb0302068c9ccc915':
Generate selinux_policy.xml as part of CTS build.
704741a5c24113b22a47bb854f20e2f2c607dd36 26-Jul-2014 dcashman <dcashman@google.com> Generate selinux_policy.xml as part of CTS build.

Bug: 16563899
Bug: 14251916
Change-Id: Id3172b73f10186ba361caf6b7333e5d2a0648475
/system/sepolicy/Android.mk
2aa727e3f01f814384bd4a49281c7c39cf562ff6 14-Jul-2014 Nick Kralevich <nnk@google.com> DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true

Force any experimental SELinux domains (ones tagged with
"permissive_or_unconfined") into unconfined. This flag is
intended to be flipped when we're preparing a release,
to eliminate inconsistencies between user and userdebug devices,
and to ensure that we're enforcing a minimal set of rules for all
SELinux domains.

Without this change, our user builds will behave differently than
userdebug builds, complicating testing.

Change-Id: I52fd5fbe30a7f52f1143f176915ce55fb6a33f87
/system/sepolicy/Android.mk
db644f98ad302bcbf9e3a6ec184896c6b5c3ec9d 12-Jun-2014 Nick Kralevich <nnk@google.com> am 8eb63f24: am b0ee91a4: Merge "Add SELinux rules for service_manager."

* commit '8eb63f24bb34639d76246a2fe0276f5cada5c764':
Add SELinux rules for service_manager.
8eb63f24bb34639d76246a2fe0276f5cada5c764 12-Jun-2014 Nick Kralevich <nnk@google.com> am b0ee91a4: Merge "Add SELinux rules for service_manager."

* commit 'b0ee91a418a899dbd39678711ea65ed60418154e':
Add SELinux rules for service_manager.
f90c41f6e8d5c1266e154f46586a2ceb260f1be6 06-Jun-2014 Riley Spahn <rileyspahn@google.com> Add SELinux rules for service_manager.

Add a service_mananger class with the verb add.
Add a type that groups the services for each of the
processes that is allowed to start services in service.te
and an attribute for all services controlled by the service
manager. Add the service_contexts file which maps service
name to target label.

Bug: 12909011
Change-Id: I017032a50bc90c57b536e80b972118016d340c7d
/system/sepolicy/Android.mk
33bf667ab1f78ce35555d148ffb0e5f1b96fe9f0 31-May-2014 Robert Craig <rpcraig@tycho.ncsc.mil> am ec87ecb9: am 8571ed16: am 8b7545bf: Build the selinux_version file.

* commit 'ec87ecb99187ce4e7c4b01e3e2ff79e9f61a5968':
Build the selinux_version file.
ec87ecb99187ce4e7c4b01e3e2ff79e9f61a5968 31-May-2014 Robert Craig <rpcraig@tycho.ncsc.mil> am 8571ed16: am 8b7545bf: Build the selinux_version file.

* commit '8571ed162e85c507ea93b06c6816cdf99019625a':
Build the selinux_version file.
8b7545bf5745e1e0aba55b0334de40d2334728b1 20-Mar-2014 Robert Craig <rpcraig@tycho.ncsc.mil> Build the selinux_version file.

The selinux_version file is used to perform policy
versioning checks by libselinux and SELinuxMMAC. When
loading policy a check is first performed to determine
if the policy out in /data/security/current should be
used to override the base policy shipped with the device.
The selinux_version file is used to make that choice. The
contents of the file simply contains the BUILD_FINGERPRINT
that the policy was built against. A simple string comparison
is then performed by libselinux and SELinuxMMAC.

Change-Id: I69d9d071743cfd46bb247c98f94a193396f8ebbd
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
4a247480b3da612b60429b277ef508adfadb9de2 30-May-2014 Stephen Smalley <sds@tycho.nsa.gov> am c664083b: am ffbba62e: am e60723ab: Create a separate recovery policy.

* commit 'c664083badd1c73c144f53354c015681cd7e6951':
Create a separate recovery policy.
c664083badd1c73c144f53354c015681cd7e6951 30-May-2014 Stephen Smalley <sds@tycho.nsa.gov> am ffbba62e: am e60723ab: Create a separate recovery policy.

* commit 'ffbba62eafb759573aad4bcdc77d56026697ea00':
Create a separate recovery policy.
e60723ab59f48626c6a700ba645bfe5eac6f0fc3 29-May-2014 Stephen Smalley <sds@tycho.nsa.gov> Create a separate recovery policy.

Create a separate recovery policy and only include the
recovery domain allow rules in it.

Change-Id: I444107f9821eabf4164ba07a44d03bd71e719989
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
863b28236651afd0d2f4bf5b858e519114def1c9 06-Feb-2014 Nick Kralevich <nnk@google.com> am d188f5be: Merge "DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true" into klp-modular-dev

* commit 'd188f5be07e168c19a2cd46439c0319f4866c641':
DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true
2772e78ff99ae651df395ec10e7bb8fdf20b87f0 05-Feb-2014 Nick Kralevich <nnk@google.com> DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true

Force any experimental SELinux domains (ones tagged with
"permissive_or_unconfined") into unconfined. This flag is
intended to be flipped when we're approaching stabilization,
to eliminate inconsistencies between user and userdebug devices,
and to ensure that we're enforcing a minimal set of rules for all
SELinux domains.

Change-Id: I1467b6b633934b18689683f3a3085329bb96dae1
/system/sepolicy/Android.mk
6b0ff4756a17e7af22d283ac3599a8b1925e5827 29-Jan-2014 Robert Craig <rpcraig@tycho.ncsc.mil> Catch nonexistent BOARD_SEPOLICY_UNION policy files.

Added a new check to make sure that all listed
BOARD_SEPOLICY_UNION files are located somewhere
in the listed BOARD_SEPOLICY_DIRS locations. The
build will error out otherwise.

Change-Id: Icc5febc5fe5a7cccb90ac5b83e6289c2aa5bf069
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
623975fa5aece708032aaf29689d73e1f3a615e7 11-Jan-2014 Nick Kralevich <nnk@google.com> Support forcing permissive domains to unconfined.

Permissive domains are only intended for development.
When a device launches, we want to ensure that all
permissive domains are in, at a minimum, unconfined+enforcing.

Add FORCE_PERMISSIVE_TO_UNCONFINED to Android.mk. During
development, this flag is false, and permissive domains
are allowed. When SELinux new feature development has been
frozen immediately before release, this flag will be flipped
to true. Any previously permissive domains will move into
unconfined+enforcing.

This will ensure that all SELinux domains have at least a
minimal level of protection.

Unconditionally enable this flag for all user builds.

Change-Id: I1632f0da0022c80170d8eb57c82499ac13fd7858
/system/sepolicy/Android.mk
88ce951d89c4c4ad4d870ca34cc5bdcc8b60f54d 10-Jan-2014 Nick Kralevich <nnk@google.com> Create new conditional userdebug_or_eng

Create a new m4 macro called userdebug_or_eng. Arguments
passed to this macro are only emitted if we're performing
a userdebug or eng build.

Merge shell.te and shell_user.te and eliminate duplicate
lines. Same for su.te and su_user.te

Change-Id: I8fbabca65ec392aeafd5b90cef57b5066033fad0
/system/sepolicy/Android.mk
d99e6d5fa135882bb51878a3c68ed3a2aebe7d04 02-Dec-2013 Stephen Smalley <sds@tycho.nsa.gov> Restrict the ability to set SELinux enforcing mode to init.

Also make su and shell permissive in non-user builds to allow
use of setenforce without violating the neverallow rule.

Change-Id: Ie76ee04e90d5a76dfaa5f56e9e3eb7e283328a3f
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
c3c9052bc7bf7f55e66a7560a28800066a6e044b 25-Oct-2013 Nick Kralevich <nnk@google.com> Make DEFAULT_SYSTEM_DEV_CERTIFICATE available in keys.conf

In 9af6f1bd59ee2fb0622db8ff25c4806c5527a0b3, the -d option
was dropped from insertkeys.py. This was done to allow an
Android distribution to replace the default version of
keys.conf distributed in external/sepolicy/keys.conf. keys.conf
was modified to reference the publicly known test keys in
build/target/product/security.

Unfortunately, this broke Google's build of Android. Instead
of incorporating our keys directory, we were using the
default AOSP keys. As a result, apps were getting assigned
to the wrong SELinux domain. (see "Steps to reproduce" below)

This change continues to allow others to replace keys.conf,
but makes DEFAULT_SYSTEM_DEV_CERTIFICATE available as an
environment variable in case the customized version wants to
make reference to it. This change also modifies the stock
version of keys.conf to use DEFAULT_SYSTEM_DEV_CERTIFICATE,
which should be appropriate for most Android distributions.
It doesn't make any sense to force each OEM to have a copy of
this file.

Steps to reproduce.

1) Compile and boot Android.
2) Run the following command: "adb shell ps -Z | grep process.media"

Expected:

$ adb shell ps -Z | grep process.media
u:r:media_app:s0 u0_a5 1332 202 android.process.media

Actual:

$ adb shell ps -Z | grep process.media
u:r:untrusted_app:s0 u0_a5 3617 187 android.process.media

Bug: 11327304
Change-Id: Ica24fb25c5f9c0e2f4d181718c757cf372467822
/system/sepolicy/Android.mk
9af6f1bd59ee2fb0622db8ff25c4806c5527a0b3 22-Aug-2013 William Roberts <wroberts@tresys.com> Drop -d option on insertkeys.py in Android.mk

This breaks the ability for users to have certs in many
directories. Currently the design is to allow keys.conf
to specify arbitrary locations for pem files, relative to
the root of the Android tree. If users want to have a
common prefix on all the keys, then they can export
DEFAULT_SYSTEM_DEV_CERTIFICATE, and make that an environment
variable in their keys.conf file.

Signed-off-by: William Roberts <wroberts@tresys.com>

Change-Id: I23455b891206cab6eca7db08ff3c28283f87c640
Signed-off-by: William Roberts <wroberts@tresys.com>
/system/sepolicy/Android.mk
e267afa32070609b080d4a7900cd27179430e04d 01-Apr-2013 Stephen Smalley <sds@tycho.nsa.gov> am e543a8bc: Increase policy version to 26.

* commit 'e543a8bc2a2d08ff381e5ae9e34cc2a094acf895':
Increase policy version to 26.
e543a8bc2a2d08ff381e5ae9e34cc2a094acf895 01-Apr-2013 Stephen Smalley <sds@tycho.nsa.gov> Increase policy version to 26.

Increase the SELinux policy version to 26. This is needed
for name-based transitions used by the manta sepolicy.
Requires kernel 3.0 or higher.

Change-Id: I046fa9f7122f77506c70b2c735345bc0194935df
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
020b5ff6311044ef7a2200dd4db69f5cccf46213 28-Mar-2013 Geremy Condra <gcondra@google.com> Add a key directory argument to insertkeys.py

This allows us to better integrate key selection with our existing
build process.

Change-Id: I6e3eb5fbbfffb8e31c5edcf16f74df7c38abe537
/system/sepolicy/Android.mk
e693ed7c187804b3b1ae49bf0d31bd43e7a19e08 15-Mar-2013 William Roberts <bill.c.roberts@gmail.com> Remove the su domain from -user builds.

Change-Id: I86f2f28f7c558b8e9a70e5aa9ebcfa8bf26f9ef7
/system/sepolicy/Android.mk
7f2392eeb03eeb88f2699061f4adaeb1fcbd1de2 27-Mar-2013 Robert Craig <rpcraig@tycho.ncsc.mil> Expand insertkeys.py script to allow union of files.

Allow script to union mac_permissions.xml files
specified using the BOARD_SEPOLICY_DIRS and
BOARD_SEPOLICY_UNION constructs.

Change-Id: I4fc65fd1ab4c612f25e966f030247e54a270b614
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
65d4f44c1fd999d9cf9c4ef4dc65deb71bafcd8e 27-Mar-2013 Robert Craig <rpcraig@tycho.ncsc.mil> Various policy updates.

Assortment of policy changes include:
* Bluetooth domain to talk to init and procfs.
* New device node domains.
* Allow zygote to talk to its executable.
* Update system domain access to new device node domains.
* Create a post-process sepolicy with dontaudits removed.
* Allow rild to use the tty device.

Change-Id: Ibb96b590d0035b8f6d1606cd5e4393c174d10ffb
Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
52fc95d1b7e29a61d315eb7378c3b47985f4fd74 26-Mar-2013 William Roberts <w.roberts@sta.samsung.com> Fix makefile error with ANDROID_BUILD_TOP

Use TOP instead of ANDROID_BUILD_TOP

Fix spelling issues in keys.conf

Change-Id: Ib90b3041af5ef68f30f4ab78c768ad225987ef2d
/system/sepolicy/Android.mk
cd4104e84b438827fddd6a7fe6cb86e91392152d 26-Mar-2013 Geremy Condra <gcondra@google.com> Revert "Revert "Dynamic insertion of pubkey to mac_permissions.xml""

This reverts commit 1446e714af0b0c358b5ecf37c5d704c96c72cf7c

Hidden dependency has been resolved.

Change-Id: Ia535c0b9468ea5f705dff9813186a7fa8bab84ae
/system/sepolicy/Android.mk
15b3ceda5cd0fea1f0b5b19d4795d7290a75b39d 12-Feb-2013 William Roberts <w.roberts@sta.samsung.com> Add BOARD_SEPOLICY_IGNORE

See README for further details.

Change-Id: I4599c7ecd5a552e38de89d0a9e496e047068fe05
/system/sepolicy/Android.mk
1446e714af0b0c358b5ecf37c5d704c96c72cf7c 19-Mar-2013 Geremy Condra <gcondra@google.com> Revert "Dynamic insertion of pubkey to mac_permissions.xml"

This reverts commit 22fc04103b70dd5a1cb1b5a8309ef20461e06289

Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
/system/sepolicy/Android.mk
5a2988fcb5f1b76c87d9bf8e671c38d1b03188ab 04-Jan-2013 William Roberts <w.roberts@sta.samsung.com> Remove duplicate paths from sepolicy_replace_paths

Change-Id: I5d5362ad0055275052b0c2ba535b599a8e26112e
/system/sepolicy/Android.mk
d98d26ef3c1fe9b44497ed4e2a1fcf66505092ba 23-Jan-2013 Robert Craig <rpcraig@tycho.ncsc.mil> property_contexts checks added to checkfc.

Change-Id: If361ea93fabd343728196eed2663fd572ecaa70b
Signed-off-by: Robert Craig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
22fc04103b70dd5a1cb1b5a8309ef20461e06289 05-Dec-2012 William Roberts <w.roberts@sta.samsung.com> Dynamic insertion of pubkey to mac_permissions.xml

Support the inseretion of the public key from pem
files into the mac_permissions.xml file at build
time.

Change-Id: Ia42b6cba39bf93723ed3fb85236eb8f80a08962a
/system/sepolicy/Android.mk
2c8a55dcf4e571c198118dd4459d62894f6378f3 30-Nov-2012 William Roberts <w.roberts@sta.samsung.com> Replaceable mac_permission.xml support

Support overriding ma_permissions.xml
in BOARD_SEPOLICY_REPLACE

Change-Id: If0bca8bf29bc431a291b6d7b20de132e68cd6a79
/system/sepolicy/Android.mk
eab23895cd13ccb2a552dd9713bd1e88cf41e522 01-Nov-2012 Jean-Baptiste Queru <jbq@google.com> Merge "Revert "Include su.te only for userdebug/eng builds."" into jb-mr1-dev-plus-aosp
eefaa83d4c8437b216718115f6d4d407b2e9d0d8 01-Nov-2012 Alice Chu <alice.chu@sta.samsung.com> am cdfb06f5: Moved Android policy tools to tools directory

* commit 'cdfb06f55394d68a7df1110d83070961a2cc52aa':
Moved Android policy tools to tools directory
9ceb47b0c0f693e760d6ad0535f4a165491fa772 01-Nov-2012 Kenny Root <kroot@google.com> Revert "Include su.te only for userdebug/eng builds."

This reverts commit af56ac19545ff083ceb3c1ddf4bf8e2663d4b934.

Change-Id: Id658a90b58ea31365051c0878c58393fd055fc69
/system/sepolicy/Android.mk
cdfb06f55394d68a7df1110d83070961a2cc52aa 01-Nov-2012 Alice Chu <alice.chu@sta.samsung.com> Moved Android policy tools to tools directory

Change-Id: I57b0dd9f8071eae492020f410c87f465ba820711
/system/sepolicy/Android.mk
a2517b20cb340a6dd19c846b21f34ed0244b65d6 30-Oct-2012 Kenny Root <kroot@google.com> resolved conflicts for merge of 47cd396b to jb-mr1-dev-plus-aosp

Change-Id: I3112f4cf0fafb6e7e3c9c60084a097f5e6190c22
47cd396b11ca4b62d4d99902bec1b981760e818a 18-Oct-2012 rpcraig <robertpcraig@gmail.com> Add better per-device sepolicy support.

This is a rewrite of the existing implementation.
Three new variables are now needed to add/modify
the exisitng base policy. They are, BOARD_SEPOLICY_REPLACE
and BOARD_SEPOLICY_UNION which govern what files
are replaced and concatenated, and BOARD_SEPOLICY_DIRS
which lists the various directories that will contain
the BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION
policy files.

Change-Id: Id33381268cef03245c56bc5242fec7da9b6c6493
Signed-off-by: rpcraig <robertpcraig@gmail.com>
/system/sepolicy/Android.mk
6b964fa1f265c1c0d6f236efbf3c471b76fdf05c 26-Oct-2012 Ying Wang <wangying@google.com> am d8b122c7: Use file target as dependency.

* commit 'd8b122c7bbe3a57620bee0a5c6bfcb8f7c574081':
Use file target as dependency.
d8b122c7bbe3a57620bee0a5c6bfcb8f7c574081 26-Oct-2012 Ying Wang <wangying@google.com> Use file target as dependency.

"sepolicy" is a phony target defined by the build system.
If you use it as dependency of a file target, you'll get unnecessary
rebuild.

Change-Id: I3a948ebbaff6a146050eb86a3d04cdc050f7c001
/system/sepolicy/Android.mk
ced365aa645d35f022f413f53731af61ada812fd 17-Oct-2012 Stephen Smalley <sds@tycho.nsa.gov> am 01a58af1: Add a checkfc utility to check file_contexts validity and invoke it.

* commit '01a58af19494420bb259505bc5404790a21fdd64':
Add a checkfc utility to check file_contexts validity and invoke it.
01a58af19494420bb259505bc5404790a21fdd64 02-Oct-2012 Stephen Smalley <sds@tycho.nsa.gov> Add a checkfc utility to check file_contexts validity and invoke it.

Change-Id: I4b12dc3dcb432edbdf95dd3bc97f809912ce86d1
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
44374bc5edc0ed46d402d1f0353fd9ff1e2ee0ac 17-Oct-2012 Kenny Root <kroot@google.com> am 659aaced: Remove HAVE_SELINUX guard

* commit '659aaced054c21048c712fe1f5831a86c99213d8':
Remove HAVE_SELINUX guard
659aaced054c21048c712fe1f5831a86c99213d8 10-Oct-2012 Kenny Root <kroot@google.com> Remove HAVE_SELINUX guard

Change-Id: I45b4a749bf4fb085d96d912871bae33aa5288119
/system/sepolicy/Android.mk
9822c1d08f11c9fb98a6f2530ba693285fe12f2b 19-Sep-2012 Stephen Smalley <sds@tycho.nsa.gov> am 66a3e8d9: Drop the use of a policy version suffix on the sepolicy file.

* commit '66a3e8d91ef6098dd7cab127530f1cdb7973f53e':
Drop the use of a policy version suffix on the sepolicy file.
66a3e8d91ef6098dd7cab127530f1cdb7973f53e 18-Sep-2012 Stephen Smalley <sds@tycho.nsa.gov> Drop the use of a policy version suffix on the sepolicy file.

The policy version suffix support was carried over from conventional
Linux distributions, where we needed to support simultaneous installation
of multiple kernels and policies. This isn't required for Android, so
get rid of it and thereby simplify the policy pathname.

We still default to generating a specific policy version (the highest
one supported by the emulator kernel), but this can be overridden
by setting POLICYVERS on the make command-line or in the environment.

Requires a corresponding change to libselinux.

Change-Id: I40c88e13e8063ea37c2b9ab5b3ff8b0aa595402a
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
d0f027ccc8f4a7aa8d872df9a195197590f234dc 06-Sep-2012 Jean-Baptiste Queru <jbq@google.com> am 10f9a372: Merge upstream sepolicy into AOSP

* commit '10f9a3727a5c46ef23f5f0385ae4ffec20cb46d9':
Corrected gramatical issues
Added new line to end of file
Changed seapp_contexts temporary file naming
Fix mls checking code
Support overrides in seapp_contexts
Add tf_daemon labeling support.
Add ppp/mtp policy.
per device seapp_context support
dhcp policy.
Trusted Execution Environment policy.
98ed392e68e041340ca8881ebf0a3cdf6bd5e880 05-Sep-2012 William Roberts <w.roberts@sta.samsung.com> Changed seapp_contexts temporary file naming

Change-Id: I4f522869eeaa6f84771e4ee2328f65296dcc29db
/system/sepolicy/Android.mk
0ae3a8a2d50799d0b91d992434cdd4d3151b0348 04-Sep-2012 William Roberts <w.roberts@sta.samsung.com> Fix mls checking code

Change-Id: I614caa520e218f8f148eef641fed2301571da8e1
/system/sepolicy/Android.mk
f0e0a94e032e55c13bc54f1cffe243f04872278e 28-Aug-2012 William Roberts <w.roberts@sta.samsung.com> Support overrides in seapp_contexts

Provides support for overriding seapp_contexts declerations
in per device seapp_contexts files.

Change-Id: I23a0ffa1d24f1ce57825b168f29a2e885d3e1c51
/system/sepolicy/Android.mk
171a06257124401af2e7c33fbbcbc69c18e45486 16-Aug-2012 William Roberts <bill.c.roberts@gmail.com> per device seapp_context support
/system/sepolicy/Android.mk
aa7fb3be1b456a2884c3fa707aa590196b2c70c3 13-Aug-2012 Jean-Baptiste Queru <jbq@google.com> resolved conflicts for merge of 0c2e5705 to jb-mr1-dev

Change-Id: Iee1d877788b9397ca29a6cfe7bc3015c3edbe5ac
b19665c39da76c0e24c8cd9583e30c4a50567510 30-Jul-2012 rpcraig <rpcraig@tycho.ncsc.mil> Add mac_permissions.xml file.

This was moved from external/mac-policy.git
/system/sepolicy/Android.mk
af56ac19545ff083ceb3c1ddf4bf8e2663d4b934 17-Jul-2012 Matt Finifter <finifter@google.com> Include su.te only for userdebug/eng builds.

Change-Id: Ia544f13910abbe5e9f6a6cafae397415a41a7a94
/system/sepolicy/Android.mk
dc1072365e99cef38e0d234989ba29e0e2df2b4c 12-Jul-2012 William Roberts <bill.c.roberts@gmail.com> Support for ocontexts per device.

ocontexts was split up into 4 files:
1.fs_use
2.genfs_contexts
3.initial_sid_contexts
4.port_contexts

Each file has their respective declerations in them.
Devices, in their respective device directory, can now specify sepolicy.fs_use, sepolicy.genfs_contexts, sepolicy.port_contexts, and sepolicy.initial_sid_contexts. These declerations will be added right behind their respective sepolicy counterparts in the concatenated configuration file.
/system/sepolicy/Android.mk
70d4fc2243721a54cd177959e05cf81b54c4e226 20-Jun-2012 Joshua Brindle <jbrindle@tresys.com> Add selinux network script to policy

Signed-off-by: Joshua Brindle <jbrindle@tresys.com>
/system/sepolicy/Android.mk
efd6d6e0dab97a49706f1116dde2ec87257f79c1 18-May-2012 Stephen Smalley <sds@tycho.nsa.gov> Apply m4 to file_contexts and property_contexts to support includes.
/system/sepolicy/Android.mk
f5f899c3c0f684ffba6950b343e652abd78d0fd9 10-Apr-2012 The Android Open Source Project <initial-contribution@android.com> Merge from upstream sepolicy

Change-Id: I99085d575e3d884fb04ac03ac998eb3c53eb2d9f
f4ea5b25399e4c6a10aa353b0c3d40564f78e89c 10-Apr-2012 Ying Wang <wangying@google.com> Use the checkpolicy built from source.

Change-Id: I22f49db3d59b50ed8975d8c1146bb9c322adbf7e
/system/sepolicy/Android.mk
124720a6976a69357522299afbe5591854e40775 04-Apr-2012 Stephen Smalley <sds@tycho.nsa.gov> Add policy for property service.
New property_contexts file for property selabel backend.
New property.te file with property type declarations.
New property_service security class and set permission.
Allow rules for setting properties.
/system/sepolicy/Android.mk
64935c7d87ce76ed542e16fce3dde9883b507d7a 06-Mar-2012 Stephen Smalley <sds@tycho.nsa.gov> Limit per-device policy files to a well-defined sepolicy prefix.

Avoid any future collisions with the use of .fc or .te suffixes in the
per-device directories. If we want multiple file support, add a separate
subdirectory for sepolicy files.
/system/sepolicy/Android.mk
5b340befb4f964365c856606050254a65df909d1 06-Mar-2012 Stephen Smalley <sds@tycho.nsa.gov> Add support for per-device .te and .fc files.
/system/sepolicy/Android.mk
7e8cf24f58651228029eb4e53e4094a86f4d2bdb 02-Feb-2012 Stephen Smalley <sds@tycho.nsa.gov> Do not build if HAVE_SELINUX=false.
/system/sepolicy/Android.mk
2b826fcbe8231bf13affd63dbed865b315e1eddc 24-Jan-2012 Stephen Smalley <sds@tycho.nsa.gov> Add a dependency on checkpolicy.
/system/sepolicy/Android.mk
02fb5f3c6abbb7f12c278a04966314d06f6378e3 18-Jan-2012 Ying Wang <wangying@google.com> Rewrite Android.mk.
/system/sepolicy/Android.mk
2dd4e51d5c2a2dfc0bfdee9303269f5a665f6e35 04-Jan-2012 Stephen Smalley <sds@tycho.nsa.gov> SE Android policy.
/system/sepolicy/Android.mk