3df1fda5e3f9d6cd4b7c40b86bfb6c5109ca8296 |
|
27-Feb-2016 |
Nick Kralevich <nnk@google.com> |
Don't allow permissive SELinux domains on user builds. It's a CTS requirement that all SELinux domains be in enforcing mode. Add the same assertion to the build system when targeting user builds. In particular, this avoids a situation where device integrity checking is enabled on user builds, but permissive denials are being generated, causing the device to unexpectedly reboot into safe mode. A developer wanting to put an SELinux domain into permissive mode for userdebug/eng purposes can write the following in their policy: userdebug_or_eng(` permissive foo; ') Bug: 26902605 Bug: 27313768 (cherry picked from commit bca98efa575bedab68f2d5eaee2cd1fd1741962b) Change-Id: If6abe1fa70c79a1fccdbdd9ff273d92de7565a73
/system/sepolicy/Android.mk
|
7a294027177e46a2025933d9ce8ab99135b74825 |
|
15-Jan-2016 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge changes from topic \'fc_sort-2\' am: 87a73f199a am: af77ab6b13 * commit 'af77ab6b136b0c4d44e912bbd2b98f958f7ceb45': fc_sort: initial commit checkfc: do not die on 0 length fc's
|
49693f1b4d7871e0e6ce2576fa68541ecb6d1f03 |
|
04-Jan-2016 |
William Roberts <william.c.roberts@intel.com> |
fc_sort: initial commit Ordering matters in fc files; the last match wins. In builds where many BOARD_SEPOLICY_DIRS are set, the order of that list becomes increasingly important in order to maintain a cohesive built file_contexts. To correct this, we sort the device specific file_contexts entries with the upstream fc_sort tool. Change-Id: I3775eae11bfa5905cad0d02a0bf26c76ac03437c Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
b9053767ab46d587dc7e1ea3e0a6c93e598b9433 |
|
15-Jan-2016 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge "Revert "fc_sort: initial commit"" am: 5de7574a59 am: 62871e5874 * commit '62871e5874e6b1663c732c7f2a2b2d6b36604534': Revert "fc_sort: initial commit"
|
b1fb7e4037831a0e6f0fc474c5058cf47292f6a0 |
|
15-Jan-2016 |
Jeffrey Vander Stoep <jeffv@google.com> |
Revert "fc_sort: initial commit" Breaks builds with no device specific policy. Bug: 26568553 This reverts commit 29d146887eacf432b90c0ae460060f79d84dbaca. Change-Id: If9254d4ad3f104a96325beedebc05dd22664084a
/system/sepolicy/Android.mk
|
a654d9f3aadaba09f476bef9671130aa7f1b7f3e |
|
14-Jan-2016 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge "fc_sort: initial commit" am: 2dea4525f3 am: faddabe6f5 * commit 'faddabe6f58f30f81938b928597ee7a792c34984': fc_sort: initial commit
|
29d146887eacf432b90c0ae460060f79d84dbaca |
|
04-Jan-2016 |
William Roberts <william.c.roberts@intel.com> |
fc_sort: initial commit Ordering matters in fc files; the last match wins. In builds where many BOARD_SEPOLICY_DIRS are set, the order of that list becomes increasingly important in order to maintain a cohesive built file_contexts. To correct this, we sort the device specific file_contexts entries with the upstream fc_sort tool. Change-Id: Id79cc6f434c41179d5c0d0d739c4718918b0b1dc Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
9aa378ec3165c7a80b43dda718e4e2e779a67646 |
|
04-Jan-2016 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge "Reduce socket ioctl perms"
|
cbaa2b7d37c0810009cc0ffa4026334b4bf3096e |
|
22-Dec-2015 |
Jeff Vander Stoep <jeffv@google.com> |
Reduce socket ioctl perms Reduce the socket ioctl commands available to untrusted/isolated apps. Neverallow accessing sensitive information or setting of network parameters. Neverallow access to device private ioctls i.e. device specific customizations as these are a common source of driver bugs. Define common ioctl commands in ioctl_defines. Bug: 26267358 Change-Id: Ic5c0af066e26d4cb2867568f53a3e65c5e3b5a5d
/system/sepolicy/Android.mk
|
efeac86de4ca327eaab3725e28449e94e033d0f1 |
|
29-Dec-2015 |
Daniel Cashman <dcashman@google.com> |
Merge changes from topic \'sepolicy-makefile-cleanup\' am: 1e5b7a1962 am: 26f06d172d * commit '26f06d172dc2b55c42b1543c7ef02563241efce1': Android.mk: cleanse all set but not unset variables Android.mk: clean dependencies and clear variables
|
50a478ef72a91eb52797bec322c6cbaf58382da3 |
|
29-Dec-2015 |
William Roberts <william.c.roberts@intel.com> |
Android.mk: cleanse all set but not unset variables Discovered by diffing the set of "set variables" with the set of "cleared variables". Script: mydir=$(mktemp -d) grep -E '(^[a-z].)[a-z0-9_\.]*\s*:?=.' Android.mk | cut -d' ' -f 1-1 | sort | uniq > $mydir/set_vars grep -E '(^[a-z].)[a-z0-9_\.]*\s*:?=$' Android.mk | cut -d' ' -f1-1 | sort | uniq > $mydir/unset_vars diff $mydir/set_vars $mydir/unset_vars rm -rf $mydir Change-Id: Ib50abac6b417a1bcc1894d9a7bafdbdca371006a Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
46749752e5e64834bfeeb03b5346b8b82ce099e2 |
|
29-Dec-2015 |
William Roberts <william.c.roberts@intel.com> |
Android.mk: clean dependencies and clear variables Dependencies being built with newline files in between were also including the list of files without the newlines, thus make would have to process 3n-1 files instead of 2n-1 where n is the number of files to process. Additionally the *_with_nl variables were not being cleared out and polluting Make's global name-space. Change-Id: I76ea1a3dfae994b32991730aea7e4308da52a583 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
4b412232c11c24797f72c395fd4c333828f05443 |
|
17-Dec-2015 |
William Roberts <william.c.roberts@intel.com> |
sectxfile_nl: fix superfluous dependencies am: cb1ab9858e am: aeb403f233 * commit 'aeb403f233ada241a099777ccd0ef3b007e935e2': sectxfile_nl: fix superfluous dependencies
|
cb1ab9858e4f44ee87c4a86f1cc9e858b8b36475 |
|
14-Dec-2015 |
William Roberts <william.c.roberts@intel.com> |
sectxfile_nl: fix superfluous dependencies The target sectxfile_nl, which is an auto-generated newline file, has dependencies on itself and the other files. The dependencies should be on the other files and this newline file, not the other way around. Ideally, the *_contexts recipes should have the dependency recorded for their "contexts" files and the newline file. Additionally, recipe dependencies for building the *_contexts files depended on the list of all the contexts files with the newline file in that list, however an additional explicit addition of the newline file was also added in. Remove this, since its in the full list of files. Change-Id: Iac658923f23a8d9263d392c44003b6bda4064646 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
e927937f2d54936a340044ef036a0001d5cb09e9 |
|
16-Dec-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge "checkfc: add attribute test" am: d48773ab3e am: c435b7590b * commit 'c435b7590bd7d7f0594d48976fe931d1f6c07f32': checkfc: add attribute test
|
ad3cb39e54040e5a03328d8006f428579d1654e0 |
|
25-Sep-2015 |
William Roberts <william.c.roberts@intel.com> |
checkfc: add attribute test Enable checkfc to check *_contexts against a set of valid attributes which must be associated with all types in the contexts file that is being checked. Since it's imperative that checkfc knows which file its checking to choose the proper attribute set, the -s option is introduced to indicate the service_contexts file. The property_contexts file continues to use the existing -p and file_contexts requires no specification, aka it's the default. Failure examples: file_contexts: Error: type "init" is not of set: "fs_type, dev_type, file_type" service_contexts: Error: type "init_exec" is not of set: "service_manager_type" property_contexts: Error: type "bluetooth_service" is not of set: "property_type" Change-Id: I62077e4d0760858a9459e753e14dfd209868080f Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
edb41d8744dac18f738523cde7275a88dea8a8c6 |
|
13-Dec-2015 |
Nick Kralevich <nnk@google.com> |
Merge "Ensure newlines are added between context config files" am: d6765a99f3 am: 5cfd34957e * commit '5cfd34957e48cd79e53fbfb8aa4acf1d53f8f638': Ensure newlines are added between context config files
|
c8801fec63a785be65808e70232ea241c779fcb5 |
|
11-Dec-2015 |
Richard Haines <richard_c_haines@btinternet.com> |
Ensure newlines are added between context config files When multiple file_contexts, service_contexts and property_contexts are processed by the m4(1) macro processor, they will fail if one or more of the intermediate files final line is not terminated by a newline. This patch adds an intervening file only containing a newline. Change-Id: Ie66b32fe477d08c69e6d6eb1725f658adc384ce4 Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
/system/sepolicy/Android.mk
|
3a0ce49b8623299ac7458306b30bda6adda12383 |
|
07-Dec-2015 |
Jeff Vander Stoep <jeffv@google.com> |
Migrate to upstream policy version 30 Grant untrusted_app and isolated_app unpriv_sock_perms, neverallow priv_sock_perms to disallow access to MAC address and ESSID. Change-Id: Idac3b657a153e7d7fdc647ff34b876a325d759b3
/system/sepolicy/Android.mk
|
4f9107df8f691164c56f86fa1d352c63b28bd02b |
|
08-Dec-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
Revert "Migrate to upstream policy version 30" This reverts commit 2ea23a6e1ade883ba81f58b364109c4da94ba584. Change-Id: I5e9efa56d74ab22030611cab515e050e0bb77aca
/system/sepolicy/Android.mk
|
5ca5696e8b656466a9d46b13d7ab18a13d8c1bba |
|
08-Dec-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
Revert "Migrate to upstream policy version 30" This reverts commit 2ea23a6e1ade883ba81f58b364109c4da94ba584. Change-Id: I5e9efa56d74ab22030611cab515e050e0bb77aca
/system/sepolicy/Android.mk
|
2ea23a6e1ade883ba81f58b364109c4da94ba584 |
|
07-Dec-2015 |
Jeff Vander Stoep <jeffv@google.com> |
Migrate to upstream policy version 30 Grant untrusted_app and isolated_app unpriv_sock_perms, neverallow priv_sock_perms to disallow access to MAC address and ESSID. Change-Id: Idac3b657a153e7d7fdc647ff34b876a325d759b3
/system/sepolicy/Android.mk
|
0fc831c3b0b8d9a4e10d0931131a0eed06cd4275 |
|
29-Jul-2015 |
Jeff Vander Stoep <jeffv@google.com> |
Temporarily downgrade to policy version number Temporarily move from policy version 30 to 29 until device kernels and prebuilts are all upgraded to the accepted upstream version of the selinux ioctl command whitelisting code. (cherry picked from commit 89765083f7da758ff5a5910027ea48ce065fe2fd) Bug: 22846070 Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
/system/sepolicy/Android.mk
|
f88e31ea90effd77a5af326780f952b5191cb67b |
|
02-Oct-2015 |
William Roberts <william.c.roberts@intel.com> |
am 7fc865a4: service_contexts: don\'t delete intermediate on failure * commit '7fc865a4caec1a2ced41918449e34596f50f8c43': service_contexts: don't delete intermediate on failure
|
630fd5d80c887b987c231d3f8923c272171ef870 |
|
02-Oct-2015 |
William Roberts <william.c.roberts@intel.com> |
am dcffd2b4: property_contexts: don\'t delete intermediate on failure * commit 'dcffd2b482a625a99233d82019d7b96919c41600': property_contexts: don't delete intermediate on failure
|
0f1b1f353b09560d0e52bcec2e6f66c5fb82756e |
|
02-Oct-2015 |
Colin Cross <ccross@android.com> |
am 9eb6c874: Revert "property_contexts: don\'t delete intermediate on failure" * commit '9eb6c87439da2b00699f644a8b8c335bf8cd9680': Revert "property_contexts: don't delete intermediate on failure"
|
2a41cb70a7e3ab987422443855c17a97ec61d3e0 |
|
02-Oct-2015 |
Colin Cross <ccross@android.com> |
am efcaecab: Revert "service_contexts: don\'t delete intermediate on failure" * commit 'efcaecab4eb075fdc69942e6915999458fb5f88b': Revert "service_contexts: don't delete intermediate on failure"
|
4f821319f7ef3a60800171390c41c4678009d96b |
|
02-Oct-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
am 23c42c38: Merge "service_contexts: don\'t delete intermediate on failure" * commit '23c42c389b07f6ebda69ca8e834c27b27460879a': service_contexts: don't delete intermediate on failure
|
89c1fd25822c7f0720d409d2e0e4782e001b4cfe |
|
02-Oct-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
am e6e94762: Merge "property_contexts: don\'t delete intermediate on failure" * commit 'e6e947622514bdf0b80bf093c0df1a7d9ae12c37': property_contexts: don't delete intermediate on failure
|
7fc865a4caec1a2ced41918449e34596f50f8c43 |
|
29-Sep-2015 |
William Roberts <william.c.roberts@intel.com> |
service_contexts: don't delete intermediate on failure When service_contexts fails to build, the file is deleted leaving only the error message for debugging. Build service_contexts and general variant as a temporary intermediate before running checkfc. Change-Id: Ib9dcbf21d0a28700d500cf0ea4e412b009758d5d Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
dcffd2b482a625a99233d82019d7b96919c41600 |
|
29-Sep-2015 |
William Roberts <william.c.roberts@intel.com> |
property_contexts: don't delete intermediate on failure When property_contexts fails to build, the file is deleted leaving only the error message for debugging. Build property_contexts and general variant as a temporary intermediate before running checkfc. Change-Id: Ia86eb0480c9493ceab36fed779b2fe6ab85d2b3d Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
9eb6c87439da2b00699f644a8b8c335bf8cd9680 |
|
01-Oct-2015 |
Colin Cross <ccross@android.com> |
Revert "property_contexts: don't delete intermediate on failure" This reverts commit 7f81b337bc600251b37de2dfa70c47781a2f2d3c. Change-Id: I79834d0ef3adbf2eed53b07d17160876e2a999c6
/system/sepolicy/Android.mk
|
efcaecab4eb075fdc69942e6915999458fb5f88b |
|
01-Oct-2015 |
Colin Cross <ccross@android.com> |
Revert "service_contexts: don't delete intermediate on failure" This reverts commit f6ee7a521942036ef7f5c0f6bc74520509934141. Change-Id: I4f1396e6e4aeecd1109f9c24494c6e82645c0663
/system/sepolicy/Android.mk
|
f6ee7a521942036ef7f5c0f6bc74520509934141 |
|
29-Sep-2015 |
William Roberts <william.c.roberts@intel.com> |
service_contexts: don't delete intermediate on failure When service_contexts fails to build, the file is deleted leaving only the error message for debugging. Build service_contexts and general variant as a temporary intermediate before running checkfc. Change-Id: Ib9c9247d36e6a6406b4df84d10e982921c07d492 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
7f81b337bc600251b37de2dfa70c47781a2f2d3c |
|
29-Sep-2015 |
William Roberts <william.c.roberts@intel.com> |
property_contexts: don't delete intermediate on failure When property_contexts fails to build, the file is deleted leaving only the error message for debugging. Build property_contexts and general variant as a temporary intermediate before running checkfc. Change-Id: I431d6f4494fa119c1873eab0e77f0eed3fb5754e Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
92461b61698e4a62ff698c35fee1d98aee6ec626 |
|
28-Sep-2015 |
William Roberts <william.c.roberts@intel.com> |
am 3746a0ae: file_contexts: don\'t delete intermediate on failure * commit '3746a0ae63a56a6b18fabd3e89bfe4760a1691e3': file_contexts: don't delete intermediate on failure
|
3746a0ae63a56a6b18fabd3e89bfe4760a1691e3 |
|
25-Sep-2015 |
William Roberts <william.c.roberts@intel.com> |
file_contexts: don't delete intermediate on failure Currently, if an error is detected in a file_contexts file, the intermediate file_context.tmp file is removed, thus making debugging of build issues problematic. Instead, employ checkfc tool during the compilation recipe so the m4 concatenated intermediate is preserved on failure. Change-Id: Ic827385d3bc3434b6c2a9bba5313cd42b5f15599 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
b49f5cf83f84beae0cbcf52111a4c3040493ff4d |
|
19-Sep-2015 |
Ivan Krasin <krasin@google.com> |
am 9aa41303: asan: update condition to work with multiple SANITIZE_TARGET values. * commit '9aa413036bde2c80c25b381bd685ab05f8390127': asan: update condition to work with multiple SANITIZE_TARGET values.
|
9aa413036bde2c80c25b381bd685ab05f8390127 |
|
18-Sep-2015 |
Ivan Krasin <krasin@google.com> |
asan: update condition to work with multiple SANITIZE_TARGET values. The goal is to enable SANITIZE_TARGET='address coverage', which will be used by LLVMFuzzer. Bug: 22850550 Change-Id: I953649186a7fae9b2495159237521f264d1de3b6
/system/sepolicy/Android.mk
|
4d526d86756bff4f3bdff9771b479d251613ae82 |
|
13-Aug-2015 |
William Roberts <william.c.roberts@intel.com> |
am 031e5ce9: Android.mk: Cleanup GENERAL_*_CONTEXTS variables * commit '031e5ce9c5cd3334cd2a09645cb03306fb552494': Android.mk: Cleanup GENERAL_*_CONTEXTS variables
|
dc858fe64da2d238569a28e153d469b6d6ace6f5 |
|
13-Aug-2015 |
William Roberts <william.c.roberts@intel.com> |
am 6aabc1c7: Android.mk: drop polluting variables * commit '6aabc1c77b98d0ce8e13871047504afb90108733': Android.mk: drop polluting variables
|
031e5ce9c5cd3334cd2a09645cb03306fb552494 |
|
13-Aug-2015 |
William Roberts <william.c.roberts@intel.com> |
Android.mk: Cleanup GENERAL_*_CONTEXTS variables Change-Id: Ic70a1208b67fe3961871cdeb39369c2ed3e0ce28 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
6aabc1c77b98d0ce8e13871047504afb90108733 |
|
30-Jul-2015 |
William Roberts <william.c.roberts@intel.com> |
Android.mk: drop polluting variables Some of the ALL_*_FILES variables remained that were used in a way that could not be cleared. Move them to lower case variants and use a build recipe PRIVATE_*_FILES variable. This avoids polluting the global namespace. Change-Id: I83748dab48141af7d3f10ad27fc9319eaf90b970 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
32bbafc1943a74645a7435beb841e0436e3ea628 |
|
13-Aug-2015 |
Richard Haines <richard_c_haines@btinternet.com> |
am c2d01914: Update Android.mk to support file_contexts.bin * commit 'c2d01914d12b1c153b5ef32293079764a4342169': Update Android.mk to support file_contexts.bin
|
c2d01914d12b1c153b5ef32293079764a4342169 |
|
06-Aug-2015 |
Richard Haines <richard_c_haines@btinternet.com> |
Update Android.mk to support file_contexts.bin This change supports external/libselinux changes to implement PCRE formatted binary file_contexts and general_file_contexts.bin files. The $(intermediates) directory will contain the original text file (that is no longer used on the device) with a .tmp extension as well as the .bin file to aid analysis. A CleanSpec.mk file is added to remove the old file_contexts file. Change-Id: I75a781100082c23536f70ce3603f7de42408b5ba Signed-off-by: Richard Haines <richard_c_haines@btinternet.com>
/system/sepolicy/Android.mk
|
10c1e872cccc0a26f5d14fa5a79965c5e47f3c05 |
|
11-Aug-2015 |
Dan Willemsen <dwillemsen@google.com> |
am bc2a49f2: Don\'t assume ordering of * commit 'bc2a49f24726faec8699ad2eefa73ccbdc7ff3d5': Don't assume ordering of $(wildcard ...)
|
bc2a49f24726faec8699ad2eefa73ccbdc7ff3d5 |
|
11-Aug-2015 |
Dan Willemsen <dwillemsen@google.com> |
Don't assume ordering of $(wildcard ...) There are no guarantees on the order of the results from a call to the wildcard function. In fact, the order usually changes between make 3.81 and make 4.0 (and kati). Instead, sort the results of wildcard in each sepolicy directory, so that directory order is preserved, but content ordering is reliable. Change-Id: I1620f89bbdd2b2902f2e0c40526e893ccf5f7775
/system/sepolicy/Android.mk
|
deb2f8b5f7dbb8360cf1b90bf17c9c7e3d925c41 |
|
27-Jul-2015 |
William Roberts <william.c.roberts@intel.com> |
am d2185582: Android.mk: Add support for BOARD_SEPOLICY_M4DEFS * commit 'd21855824d178abea9ac93376757c7aed765cd83': Android.mk: Add support for BOARD_SEPOLICY_M4DEFS
|
d21855824d178abea9ac93376757c7aed765cd83 |
|
16-Jul-2015 |
William Roberts <william.c.roberts@intel.com> |
Android.mk: Add support for BOARD_SEPOLICY_M4DEFS Allow device builders to pass arbitrary m4 definitions during the build via make variable BOARD_SEPOLICY_M4DEFS. This enables OEMs to define their own static policy build conditionals. Change-Id: Ibea1dbb7b8615576c5668e47f16ed0eedfa0b73c Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
07039d386aa7bdb5c10115308fd9abbac0cccf93 |
|
23-Jul-2015 |
Colin Cross <ccross@android.com> |
am 29a463d5: Use build fingerprint from file * commit '29a463d5d594a1b83288eff2da1f8829a69d3d46': Use build fingerprint from file
|
29a463d5d594a1b83288eff2da1f8829a69d3d46 |
|
17-Jul-2015 |
Colin Cross <ccross@android.com> |
Use build fingerprint from file Improve incremental ninja builds by keeping the command line the same across builds. Change-Id: Iedbaa40c9f816f91afc8f073a9ed7f9ffd5d9a53
/system/sepolicy/Android.mk
|
457e446fe7353ca3520fb16063ee9d26a8f136b4 |
|
16-Jul-2015 |
Nick Kralevich <nnk@google.com> |
am 1a6e29e2: Merge "android.mk: drop duplicate spaces" * commit '1a6e29e251ead902509e4ff25fdfdcaf023d860e': android.mk: drop duplicate spaces
|
85402534f353ecbe1b627e4178ab1a871b16cbd3 |
|
16-Jul-2015 |
William Roberts <william.c.roberts@intel.com> |
android.mk: drop duplicate spaces Change-Id: Iae3edba40a94f78e78c0cc89a03e3f5a098d3909 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
b2420cf4ece072d36d118cf43a3e2af355ff30ae |
|
10-Jul-2015 |
William Roberts <william.c.roberts@intel.com> |
am ffc86bea: Correct local variables for file_contexts_asan * commit 'ffc86bea0e38147a9330177708aedbccd603627a': Correct local variables for file_contexts_asan
|
ffc86bea0e38147a9330177708aedbccd603627a |
|
29-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
Correct local variables for file_contexts_asan Lowercase local variables and clear them to be consistent with other recipes and prevent polluting Make's global name space with set variables. Change-Id: If455cd4f33d5babbea985867a711e8a10c21a00f Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
e1a2001fc5d05368bc01fa8d655a6f0e2a7b9758 |
|
07-Jul-2015 |
William Roberts <william.c.roberts@intel.com> |
am 99fe8df2: hide checkseapp command invocation * commit '99fe8df245f4346c14a3dfaf856006c7ebf51ad2': hide checkseapp command invocation
|
0046404b2c3b575c87418e0d790bbca9ea1a82cf |
|
07-Jul-2015 |
William Roberts <william.c.roberts@intel.com> |
am b876993f: use a general sepolicy when building general targets * commit 'b876993f4ee25fb299b7521b0dc565248d3db2a6': use a general sepolicy when building general targets
|
99fe8df245f4346c14a3dfaf856006c7ebf51ad2 |
|
30-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
hide checkseapp command invocation Change-Id: I040904b69b98c49d60546f024f5ace5b7c6f7d5e Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
807b8a6f9dcd59c8bbe9086c9c3d42a87ef286cd |
|
07-Jul-2015 |
William Roberts <william.c.roberts@intel.com> |
am 3a74555c: Drop unused variable in Android.mk * commit '3a74555c4e6c3b87c43b1eb311a2e418f6d88453': Drop unused variable in Android.mk
|
b876993f4ee25fb299b7521b0dc565248d3db2a6 |
|
30-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
use a general sepolicy when building general targets Change-Id: Ie800ebf9d8e68680ec377e8c51f7cd7717f3c755 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
3a74555c4e6c3b87c43b1eb311a2e418f6d88453 |
|
30-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
Drop unused variable in Android.mk Change-Id: Ibd22582deb24fde49cdb71b8754446f3948db36c Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
bf4568d1cda87bb987a85026c686f3032f9b35d4 |
|
29-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
am 4ee7131a: Introduce seapp_neverallow test * commit '4ee7131ade43a046ad784a91bdded7c3c77206cd': Introduce seapp_neverallow test
|
4ee7131ade43a046ad784a91bdded7c3c77206cd |
|
25-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
Introduce seapp_neverallow test Produce a list of neverallow assertions from seapp_contexts into a separate file, general_seapp_context_neverallows, to be used during CTS neverallow checking. Change-Id: I171ed43cf4ae4961f66d5d8f56695345493f1261 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
8f519b3f0f565783d0fab8c4769d2eb1320af0b3 |
|
29-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
am da52e859: correct colon usage on make targets * commit 'da52e85906289d5b691404ffed1fb830065140f9': correct colon usage on make targets
|
da52e85906289d5b691404ffed1fb830065140f9 |
|
27-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
correct colon usage on make targets Change-Id: If944d8bd1e324f6500920ee3c5d44611ec7f8af9 Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
942c0ea901bdcc1dfbc91d61716daea4b20d19ca |
|
26-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
am 81e1f90c: check_seapp: add support for "neverallow" checks * commit '81e1f90cd13b262f9e3021f64ae3574b8f5cd5d0': check_seapp: add support for "neverallow" checks
|
81e1f90cd13b262f9e3021f64ae3574b8f5cd5d0 |
|
04-Jun-2015 |
William Roberts <william.c.roberts@intel.com> |
check_seapp: add support for "neverallow" checks Introduce "neverallow" rules for seapp_contexts. A neverallow rule is similar to the existing key-value-pair entries but the line begins with "neverallow". A neverallow violation is detected when all keys, both inputs and outputs are matched. The neverallow rules value parameter (not the key) can contain regular expressions to assist in matching. Neverallow rules are never output to the generated seapp_contexts file. Also, unless -o is specified, checkseapp runs in silent mode and outputs nothing. Specifying - as an argument to -o outputs to stdout. Sample Output: Error: Rule in File "external/sepolicy/seapp_contexts" on line 87: "user=fake domain=system_app type=app_data_file" violates neverallow in File "external/sepolicy/seapp_contexts" on line 57: "user=((?!system).)* domain=system_app" Change-Id: Ia4dcbf02feb774f2e201bb0c5d4ce385274d8b8d Signed-off-by: William Roberts <william.c.roberts@intel.com>
/system/sepolicy/Android.mk
|
651a315ad276643930d24f25970338d868786532 |
|
15-Jun-2015 |
Evgenii Stepanov <eugenis@google.com> |
am 4b4c5645: Merge "Extend sepolicy for SANITIZE_TARGET." * commit '4b4c5645931a0e187d261c4db6caac67d09ab4e4': Extend sepolicy for SANITIZE_TARGET.
|
930304829b2cadd3c88876c6234af702d1e43bd5 |
|
13-Jun-2015 |
Evgenii Stepanov <eugenis@google.com> |
Extend sepolicy for SANITIZE_TARGET. SANITIZE_TARGET adds shared libraries in /data/lib. Bug: 21785137 Change-Id: I8ac3d059d88d57d24ed762ffc6202a4ce5a42333
/system/sepolicy/Android.mk
|
de9b5301a14abf388589b06e819bb001d69e0cf1 |
|
06-Jun-2015 |
Jeff Vander Stoep <jeffv@google.com> |
restrict app access to socket ioctls Create a macro of unprivileged ioctls including - All common socket ioctls except MAC address - All wireless extensions ioctls except get/set ESSID - Some commonly used tty ioctls Bug: 21657002 Change-Id: Ib08be9cb70d08c1fa2c8bddbae519e7c2df5293c
/system/sepolicy/Android.mk
|
64b01c6165e77292cfc3649dccba18c60670495d |
|
04-May-2015 |
Jeff Vander Stoep <jeffv@google.com> |
Update policy version to enable ioctl whitelisting Bug: 20756547 Bug: 18087110 Change-Id: I9ff76f1cf359e38c19d7b50a5b7236fd673d937e
/system/sepolicy/Android.mk
|
8e0ca8867eac09f8fd740485f147684d6a88b803 |
|
01-Apr-2015 |
Stephen Smalley <sds@tycho.nsa.gov> |
Drop BOARD_SEPOLICY_UNION. As suggested in the comments on https://android-review.googlesource.com/#/c/141560/ drop BOARD_SEPOLICY_UNION and simplify the build_policy logic. Union all files found under BOARD_SEPOLICY_DIRS. Unlike BOARD_SEPOLICY_REPLACE/IGNORE, on which we trigger an error to catch any lingering uses and force updating of the BoardConfig.mk files, we only warn on uses of BOARD_SEPOLICY_UNION to avoid breaking the build until all device BoardConfig*.mk files have been updated, and since they should be harmless - the files will be unioned regardless. Change-Id: I4214893c999c23631f5456cb1b8edd59771ef13b Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
b4f17069b3514a4b7b3f5c42e879494bbe96bbaf |
|
13-Mar-2015 |
Stephen Smalley <sds@tycho.nsa.gov> |
sepolicy: Drop BOARD_SEPOLICY_IGNORE/REPLACE support. With changes I431c1ab22fc53749f623937154b9ec43469d9645 and Ia54aa263f2245c7090f4b9d9703130c19f11bd28, it is no longer legitimate to use BOARD_SEPOLICY_IGNORE or REPLACE with any of the *_contexts files since the CTS requires the AOSP entries to be present in the device files. Further, these changes render BOARD_SEPOLICY_IGNORE unusable for most policy files since all domains and types referenced within any of the AOSP *_contexts entries must be defined in the kernel policy, so you cannot use BOARD_SEPOLICY_IGNORE to exclude any .te file that defines a type referenced in any of those *_contexts files. There does not seem to be a significant need for such a facility, as AOSP policy is small and only domains and types used by most devices should be defined in external/sepolicy. BOARD_SEPOLICY_REPLACE is commonly misused to eliminate neverallow rules from AOSP policy, which will only lead to CTS failures, especially since change Iefe508df265f62efa92f8eb74fc65542d39e3e74 introduced neverallow checking on the entire policy via sepolicy-analyze. The only remaining legitimate function of BOARD_SEPOLICY_REPLACE is to support overriding AOSP .te files with more restrictive rule sets. However, the need for this facility has been significantly reduced by the fact that AOSP policy is now fully confined + enforcing for all domains, and further restrictions beyond AOSP carry a compatibility risk. Builders of custom policies and custom ROMs still have the freedom to apply patches on top of external/sepolicy to tighten rule sets (which are likely more maintainable than maintaining a completely separate copy of the file via BOARD_SEPOLICY_REPLACE) and/or of using their own separate policy build system as exemplified by https://bitbucket.org/quarksecurity/build-policies Change-Id: I2611e983f7cbfa15f9d45ec3ea301e94132b06fa Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
c93617315e69f9bd7319476afbd3f91d00dd6b5a |
|
13-Mar-2015 |
Stephen Smalley <sds@tycho.nsa.gov> |
Fix rules for general_property_contexts. Failed to include base_rules.mk, so this target was not being built. Change-Id: I2414fa6c3e3e37c74f63c205e3694d1a811c956e Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
2e0cd5ad36321fd7a8f21768dac080d09b658920 |
|
12-Mar-2015 |
Stephen Smalley <sds@tycho.nsa.gov> |
Generate general versions of the other contexts files for tests. Generate general forms of the remaining *_contexts files with only the device-independent entries for use in CTS testing. Change-Id: I2bf0e41db8a73c26754cedd92cbc3783ff03d6b5 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
377128778d2d2055044c8f4a65e7b0097ab59fd4 |
|
12-Mar-2015 |
Stephen Smalley <sds@tycho.nsa.gov> |
Generate a general_seapp_contexts file for tests. Generate a general_seapp_contexts file with only the device-independent entries, similar to general_sepolicy.conf. This is for use by CTS tests to compare with the prefix of device seapp_contexts. Change-Id: If8d1456afff5347adff7157411c6a160484e0b39 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
f435a8e55653be6e5d95a995d80ed4982f5a1628 |
|
28-Feb-2015 |
Nick Kralevich <nnk@google.com> |
Delete unconfined domain No longer used. :-) Change-Id: I687cc36404e8ad8b899b6e76b1de7ee8c5392e07
/system/sepolicy/Android.mk
|
754f5ea7ee4bb252e6f84b2b1228d5e210abe0ce |
|
03-Dec-2014 |
William Roberts <bill.c.roberts@gmail.com> |
Allow overiding FORCE_PERMISSIVE_TO_UNCONFINED It's beneficial to be able to overide this in a device makefile if you need to get the domains into an unconfined state to keep the logs from filling up on kernel entries without having to add rules into device specific policy. Change-Id: I7778be01256ac601f247e4d6e12573d0d23d12a1
/system/sepolicy/Android.mk
|
f330f3752922f124305c67683d061c19c9518bed |
|
13-Nov-2014 |
William Roberts <bill.c.roberts@gmail.com> |
Remove network shell script This seems to not really being used, especially considering that the init.rc does not have a oneshot service for it, and its not using the build_policy() and other things to even make it configurable. Change-Id: I964f94b30103917ed39cf5d003564de456b169a5
/system/sepolicy/Android.mk
|
ee58864b953a2d3601e8e805be32bd71a16e9bd3 |
|
07-Nov-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
Revert "DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true" Change-Id I52fd5fbe30a7f52f1143f176915ce55fb6a33f87 was only intended for lollipop, not for master. This reverts commit 2aa727e3f01f814384bd4a49281c7c39cf562ff6. Change-Id: If2101939eb50cd6bbcde118b91c003d1f30d811c Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
39f92a8350cd02eaa279687699bc4208e9ab0dd8 |
|
06-Nov-2014 |
Nick Kralevich <nnk@google.com> |
am f7e98fe2: Merge "recovery.te: add /data neverallow rules" * commit 'f7e98fe2c988d88a4a98a1fdfd07561cef013e5c': recovery.te: add /data neverallow rules
|
a17a266e7e466d281f0730449c492de46390fc76 |
|
06-Nov-2014 |
Nick Kralevich <nnk@google.com> |
recovery.te: add /data neverallow rules Recovery should never be accessing files from /data. In particular, /data may be encrypted, and the files within /data will be inaccessible to recovery, because recovery doesn't know the decryption key. Enforce write/execute restrictions on recovery. We can't tighten it up further because domain.te contains some /data read-only access rules, which shouldn't apply to recovery but do. Create neverallow_macros, used for storing permission macros useful for neverallow rules. Standardize recovery.te and property_data_file on the new macros. Change-Id: I02346ab924fe2fdb2edc7659cb68c4f8dffa1e88
/system/sepolicy/Android.mk
|
5a6ac67476cb642fc19206c9686488c0b21e224e |
|
04-Aug-2014 |
dcashman <dcashman@google.com> |
am 3fe1bcbb: Merge "Generate selinux_policy.xml as part of CTS build." * commit '3fe1bcbb8d2f2e17e7506d7fb0302068c9ccc915': Generate selinux_policy.xml as part of CTS build.
|
704741a5c24113b22a47bb854f20e2f2c607dd36 |
|
26-Jul-2014 |
dcashman <dcashman@google.com> |
Generate selinux_policy.xml as part of CTS build. Bug: 16563899 Bug: 14251916 Change-Id: Id3172b73f10186ba361caf6b7333e5d2a0648475
/system/sepolicy/Android.mk
|
2aa727e3f01f814384bd4a49281c7c39cf562ff6 |
|
14-Jul-2014 |
Nick Kralevich <nnk@google.com> |
DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true Force any experimental SELinux domains (ones tagged with "permissive_or_unconfined") into unconfined. This flag is intended to be flipped when we're preparing a release, to eliminate inconsistencies between user and userdebug devices, and to ensure that we're enforcing a minimal set of rules for all SELinux domains. Without this change, our user builds will behave differently than userdebug builds, complicating testing. Change-Id: I52fd5fbe30a7f52f1143f176915ce55fb6a33f87
/system/sepolicy/Android.mk
|
db644f98ad302bcbf9e3a6ec184896c6b5c3ec9d |
|
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am 8eb63f24: am b0ee91a4: Merge "Add SELinux rules for service_manager." * commit '8eb63f24bb34639d76246a2fe0276f5cada5c764': Add SELinux rules for service_manager.
|
8eb63f24bb34639d76246a2fe0276f5cada5c764 |
|
12-Jun-2014 |
Nick Kralevich <nnk@google.com> |
am b0ee91a4: Merge "Add SELinux rules for service_manager." * commit 'b0ee91a418a899dbd39678711ea65ed60418154e': Add SELinux rules for service_manager.
|
f90c41f6e8d5c1266e154f46586a2ceb260f1be6 |
|
06-Jun-2014 |
Riley Spahn <rileyspahn@google.com> |
Add SELinux rules for service_manager. Add a service_mananger class with the verb add. Add a type that groups the services for each of the processes that is allowed to start services in service.te and an attribute for all services controlled by the service manager. Add the service_contexts file which maps service name to target label. Bug: 12909011 Change-Id: I017032a50bc90c57b536e80b972118016d340c7d
/system/sepolicy/Android.mk
|
33bf667ab1f78ce35555d148ffb0e5f1b96fe9f0 |
|
31-May-2014 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
am ec87ecb9: am 8571ed16: am 8b7545bf: Build the selinux_version file. * commit 'ec87ecb99187ce4e7c4b01e3e2ff79e9f61a5968': Build the selinux_version file.
|
ec87ecb99187ce4e7c4b01e3e2ff79e9f61a5968 |
|
31-May-2014 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
am 8571ed16: am 8b7545bf: Build the selinux_version file. * commit '8571ed162e85c507ea93b06c6816cdf99019625a': Build the selinux_version file.
|
8b7545bf5745e1e0aba55b0334de40d2334728b1 |
|
20-Mar-2014 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Build the selinux_version file. The selinux_version file is used to perform policy versioning checks by libselinux and SELinuxMMAC. When loading policy a check is first performed to determine if the policy out in /data/security/current should be used to override the base policy shipped with the device. The selinux_version file is used to make that choice. The contents of the file simply contains the BUILD_FINGERPRINT that the policy was built against. A simple string comparison is then performed by libselinux and SELinuxMMAC. Change-Id: I69d9d071743cfd46bb247c98f94a193396f8ebbd Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
|
4a247480b3da612b60429b277ef508adfadb9de2 |
|
30-May-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
am c664083b: am ffbba62e: am e60723ab: Create a separate recovery policy. * commit 'c664083badd1c73c144f53354c015681cd7e6951': Create a separate recovery policy.
|
c664083badd1c73c144f53354c015681cd7e6951 |
|
30-May-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
am ffbba62e: am e60723ab: Create a separate recovery policy. * commit 'ffbba62eafb759573aad4bcdc77d56026697ea00': Create a separate recovery policy.
|
e60723ab59f48626c6a700ba645bfe5eac6f0fc3 |
|
29-May-2014 |
Stephen Smalley <sds@tycho.nsa.gov> |
Create a separate recovery policy. Create a separate recovery policy and only include the recovery domain allow rules in it. Change-Id: I444107f9821eabf4164ba07a44d03bd71e719989 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
863b28236651afd0d2f4bf5b858e519114def1c9 |
|
06-Feb-2014 |
Nick Kralevich <nnk@google.com> |
am d188f5be: Merge "DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true" into klp-modular-dev * commit 'd188f5be07e168c19a2cd46439c0319f4866c641': DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true
|
2772e78ff99ae651df395ec10e7bb8fdf20b87f0 |
|
05-Feb-2014 |
Nick Kralevich <nnk@google.com> |
DO NOT MERGE: Flip FORCE_PERMISSIVE_TO_UNCONFINED to true Force any experimental SELinux domains (ones tagged with "permissive_or_unconfined") into unconfined. This flag is intended to be flipped when we're approaching stabilization, to eliminate inconsistencies between user and userdebug devices, and to ensure that we're enforcing a minimal set of rules for all SELinux domains. Change-Id: I1467b6b633934b18689683f3a3085329bb96dae1
/system/sepolicy/Android.mk
|
6b0ff4756a17e7af22d283ac3599a8b1925e5827 |
|
29-Jan-2014 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Catch nonexistent BOARD_SEPOLICY_UNION policy files. Added a new check to make sure that all listed BOARD_SEPOLICY_UNION files are located somewhere in the listed BOARD_SEPOLICY_DIRS locations. The build will error out otherwise. Change-Id: Icc5febc5fe5a7cccb90ac5b83e6289c2aa5bf069 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
|
623975fa5aece708032aaf29689d73e1f3a615e7 |
|
11-Jan-2014 |
Nick Kralevich <nnk@google.com> |
Support forcing permissive domains to unconfined. Permissive domains are only intended for development. When a device launches, we want to ensure that all permissive domains are in, at a minimum, unconfined+enforcing. Add FORCE_PERMISSIVE_TO_UNCONFINED to Android.mk. During development, this flag is false, and permissive domains are allowed. When SELinux new feature development has been frozen immediately before release, this flag will be flipped to true. Any previously permissive domains will move into unconfined+enforcing. This will ensure that all SELinux domains have at least a minimal level of protection. Unconditionally enable this flag for all user builds. Change-Id: I1632f0da0022c80170d8eb57c82499ac13fd7858
/system/sepolicy/Android.mk
|
88ce951d89c4c4ad4d870ca34cc5bdcc8b60f54d |
|
10-Jan-2014 |
Nick Kralevich <nnk@google.com> |
Create new conditional userdebug_or_eng Create a new m4 macro called userdebug_or_eng. Arguments passed to this macro are only emitted if we're performing a userdebug or eng build. Merge shell.te and shell_user.te and eliminate duplicate lines. Same for su.te and su_user.te Change-Id: I8fbabca65ec392aeafd5b90cef57b5066033fad0
/system/sepolicy/Android.mk
|
d99e6d5fa135882bb51878a3c68ed3a2aebe7d04 |
|
02-Dec-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Restrict the ability to set SELinux enforcing mode to init. Also make su and shell permissive in non-user builds to allow use of setenforce without violating the neverallow rule. Change-Id: Ie76ee04e90d5a76dfaa5f56e9e3eb7e283328a3f Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
c3c9052bc7bf7f55e66a7560a28800066a6e044b |
|
25-Oct-2013 |
Nick Kralevich <nnk@google.com> |
Make DEFAULT_SYSTEM_DEV_CERTIFICATE available in keys.conf In 9af6f1bd59ee2fb0622db8ff25c4806c5527a0b3, the -d option was dropped from insertkeys.py. This was done to allow an Android distribution to replace the default version of keys.conf distributed in external/sepolicy/keys.conf. keys.conf was modified to reference the publicly known test keys in build/target/product/security. Unfortunately, this broke Google's build of Android. Instead of incorporating our keys directory, we were using the default AOSP keys. As a result, apps were getting assigned to the wrong SELinux domain. (see "Steps to reproduce" below) This change continues to allow others to replace keys.conf, but makes DEFAULT_SYSTEM_DEV_CERTIFICATE available as an environment variable in case the customized version wants to make reference to it. This change also modifies the stock version of keys.conf to use DEFAULT_SYSTEM_DEV_CERTIFICATE, which should be appropriate for most Android distributions. It doesn't make any sense to force each OEM to have a copy of this file. Steps to reproduce. 1) Compile and boot Android. 2) Run the following command: "adb shell ps -Z | grep process.media" Expected: $ adb shell ps -Z | grep process.media u:r:media_app:s0 u0_a5 1332 202 android.process.media Actual: $ adb shell ps -Z | grep process.media u:r:untrusted_app:s0 u0_a5 3617 187 android.process.media Bug: 11327304 Change-Id: Ica24fb25c5f9c0e2f4d181718c757cf372467822
/system/sepolicy/Android.mk
|
9af6f1bd59ee2fb0622db8ff25c4806c5527a0b3 |
|
22-Aug-2013 |
William Roberts <wroberts@tresys.com> |
Drop -d option on insertkeys.py in Android.mk This breaks the ability for users to have certs in many directories. Currently the design is to allow keys.conf to specify arbitrary locations for pem files, relative to the root of the Android tree. If users want to have a common prefix on all the keys, then they can export DEFAULT_SYSTEM_DEV_CERTIFICATE, and make that an environment variable in their keys.conf file. Signed-off-by: William Roberts <wroberts@tresys.com> Change-Id: I23455b891206cab6eca7db08ff3c28283f87c640 Signed-off-by: William Roberts <wroberts@tresys.com>
/system/sepolicy/Android.mk
|
e267afa32070609b080d4a7900cd27179430e04d |
|
01-Apr-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
am e543a8bc: Increase policy version to 26. * commit 'e543a8bc2a2d08ff381e5ae9e34cc2a094acf895': Increase policy version to 26.
|
e543a8bc2a2d08ff381e5ae9e34cc2a094acf895 |
|
01-Apr-2013 |
Stephen Smalley <sds@tycho.nsa.gov> |
Increase policy version to 26. Increase the SELinux policy version to 26. This is needed for name-based transitions used by the manta sepolicy. Requires kernel 3.0 or higher. Change-Id: I046fa9f7122f77506c70b2c735345bc0194935df Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
020b5ff6311044ef7a2200dd4db69f5cccf46213 |
|
28-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Add a key directory argument to insertkeys.py This allows us to better integrate key selection with our existing build process. Change-Id: I6e3eb5fbbfffb8e31c5edcf16f74df7c38abe537
/system/sepolicy/Android.mk
|
e693ed7c187804b3b1ae49bf0d31bd43e7a19e08 |
|
15-Mar-2013 |
William Roberts <bill.c.roberts@gmail.com> |
Remove the su domain from -user builds. Change-Id: I86f2f28f7c558b8e9a70e5aa9ebcfa8bf26f9ef7
/system/sepolicy/Android.mk
|
7f2392eeb03eeb88f2699061f4adaeb1fcbd1de2 |
|
27-Mar-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Expand insertkeys.py script to allow union of files. Allow script to union mac_permissions.xml files specified using the BOARD_SEPOLICY_DIRS and BOARD_SEPOLICY_UNION constructs. Change-Id: I4fc65fd1ab4c612f25e966f030247e54a270b614 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
|
65d4f44c1fd999d9cf9c4ef4dc65deb71bafcd8e |
|
27-Mar-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Various policy updates. Assortment of policy changes include: * Bluetooth domain to talk to init and procfs. * New device node domains. * Allow zygote to talk to its executable. * Update system domain access to new device node domains. * Create a post-process sepolicy with dontaudits removed. * Allow rild to use the tty device. Change-Id: Ibb96b590d0035b8f6d1606cd5e4393c174d10ffb Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
|
52fc95d1b7e29a61d315eb7378c3b47985f4fd74 |
|
26-Mar-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Fix makefile error with ANDROID_BUILD_TOP Use TOP instead of ANDROID_BUILD_TOP Fix spelling issues in keys.conf Change-Id: Ib90b3041af5ef68f30f4ab78c768ad225987ef2d
/system/sepolicy/Android.mk
|
cd4104e84b438827fddd6a7fe6cb86e91392152d |
|
26-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Revert "Revert "Dynamic insertion of pubkey to mac_permissions.xml"" This reverts commit 1446e714af0b0c358b5ecf37c5d704c96c72cf7c Hidden dependency has been resolved. Change-Id: Ia535c0b9468ea5f705dff9813186a7fa8bab84ae
/system/sepolicy/Android.mk
|
15b3ceda5cd0fea1f0b5b19d4795d7290a75b39d |
|
12-Feb-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Add BOARD_SEPOLICY_IGNORE See README for further details. Change-Id: I4599c7ecd5a552e38de89d0a9e496e047068fe05
/system/sepolicy/Android.mk
|
1446e714af0b0c358b5ecf37c5d704c96c72cf7c |
|
19-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Revert "Dynamic insertion of pubkey to mac_permissions.xml" This reverts commit 22fc04103b70dd5a1cb1b5a8309ef20461e06289 Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
/system/sepolicy/Android.mk
|
5a2988fcb5f1b76c87d9bf8e671c38d1b03188ab |
|
04-Jan-2013 |
William Roberts <w.roberts@sta.samsung.com> |
Remove duplicate paths from sepolicy_replace_paths Change-Id: I5d5362ad0055275052b0c2ba535b599a8e26112e
/system/sepolicy/Android.mk
|
d98d26ef3c1fe9b44497ed4e2a1fcf66505092ba |
|
23-Jan-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
property_contexts checks added to checkfc. Change-Id: If361ea93fabd343728196eed2663fd572ecaa70b Signed-off-by: Robert Craig <rpcraig@tycho.ncsc.mil>
/system/sepolicy/Android.mk
|
22fc04103b70dd5a1cb1b5a8309ef20461e06289 |
|
05-Dec-2012 |
William Roberts <w.roberts@sta.samsung.com> |
Dynamic insertion of pubkey to mac_permissions.xml Support the inseretion of the public key from pem files into the mac_permissions.xml file at build time. Change-Id: Ia42b6cba39bf93723ed3fb85236eb8f80a08962a
/system/sepolicy/Android.mk
|
2c8a55dcf4e571c198118dd4459d62894f6378f3 |
|
30-Nov-2012 |
William Roberts <w.roberts@sta.samsung.com> |
Replaceable mac_permission.xml support Support overriding ma_permissions.xml in BOARD_SEPOLICY_REPLACE Change-Id: If0bca8bf29bc431a291b6d7b20de132e68cd6a79
/system/sepolicy/Android.mk
|
eab23895cd13ccb2a552dd9713bd1e88cf41e522 |
|
01-Nov-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "Revert "Include su.te only for userdebug/eng builds."" into jb-mr1-dev-plus-aosp
|
eefaa83d4c8437b216718115f6d4d407b2e9d0d8 |
|
01-Nov-2012 |
Alice Chu <alice.chu@sta.samsung.com> |
am cdfb06f5: Moved Android policy tools to tools directory * commit 'cdfb06f55394d68a7df1110d83070961a2cc52aa': Moved Android policy tools to tools directory
|
9ceb47b0c0f693e760d6ad0535f4a165491fa772 |
|
01-Nov-2012 |
Kenny Root <kroot@google.com> |
Revert "Include su.te only for userdebug/eng builds." This reverts commit af56ac19545ff083ceb3c1ddf4bf8e2663d4b934. Change-Id: Id658a90b58ea31365051c0878c58393fd055fc69
/system/sepolicy/Android.mk
|
cdfb06f55394d68a7df1110d83070961a2cc52aa |
|
01-Nov-2012 |
Alice Chu <alice.chu@sta.samsung.com> |
Moved Android policy tools to tools directory Change-Id: I57b0dd9f8071eae492020f410c87f465ba820711
/system/sepolicy/Android.mk
|
a2517b20cb340a6dd19c846b21f34ed0244b65d6 |
|
30-Oct-2012 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 47cd396b to jb-mr1-dev-plus-aosp Change-Id: I3112f4cf0fafb6e7e3c9c60084a097f5e6190c22
|
47cd396b11ca4b62d4d99902bec1b981760e818a |
|
18-Oct-2012 |
rpcraig <robertpcraig@gmail.com> |
Add better per-device sepolicy support. This is a rewrite of the existing implementation. Three new variables are now needed to add/modify the exisitng base policy. They are, BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION which govern what files are replaced and concatenated, and BOARD_SEPOLICY_DIRS which lists the various directories that will contain the BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION policy files. Change-Id: Id33381268cef03245c56bc5242fec7da9b6c6493 Signed-off-by: rpcraig <robertpcraig@gmail.com>
/system/sepolicy/Android.mk
|
6b964fa1f265c1c0d6f236efbf3c471b76fdf05c |
|
26-Oct-2012 |
Ying Wang <wangying@google.com> |
am d8b122c7: Use file target as dependency. * commit 'd8b122c7bbe3a57620bee0a5c6bfcb8f7c574081': Use file target as dependency.
|
d8b122c7bbe3a57620bee0a5c6bfcb8f7c574081 |
|
26-Oct-2012 |
Ying Wang <wangying@google.com> |
Use file target as dependency. "sepolicy" is a phony target defined by the build system. If you use it as dependency of a file target, you'll get unnecessary rebuild. Change-Id: I3a948ebbaff6a146050eb86a3d04cdc050f7c001
/system/sepolicy/Android.mk
|
ced365aa645d35f022f413f53731af61ada812fd |
|
17-Oct-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
am 01a58af1: Add a checkfc utility to check file_contexts validity and invoke it. * commit '01a58af19494420bb259505bc5404790a21fdd64': Add a checkfc utility to check file_contexts validity and invoke it.
|
01a58af19494420bb259505bc5404790a21fdd64 |
|
02-Oct-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add a checkfc utility to check file_contexts validity and invoke it. Change-Id: I4b12dc3dcb432edbdf95dd3bc97f809912ce86d1 Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
44374bc5edc0ed46d402d1f0353fd9ff1e2ee0ac |
|
17-Oct-2012 |
Kenny Root <kroot@google.com> |
am 659aaced: Remove HAVE_SELINUX guard * commit '659aaced054c21048c712fe1f5831a86c99213d8': Remove HAVE_SELINUX guard
|
659aaced054c21048c712fe1f5831a86c99213d8 |
|
10-Oct-2012 |
Kenny Root <kroot@google.com> |
Remove HAVE_SELINUX guard Change-Id: I45b4a749bf4fb085d96d912871bae33aa5288119
/system/sepolicy/Android.mk
|
9822c1d08f11c9fb98a6f2530ba693285fe12f2b |
|
19-Sep-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
am 66a3e8d9: Drop the use of a policy version suffix on the sepolicy file. * commit '66a3e8d91ef6098dd7cab127530f1cdb7973f53e': Drop the use of a policy version suffix on the sepolicy file.
|
66a3e8d91ef6098dd7cab127530f1cdb7973f53e |
|
18-Sep-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Drop the use of a policy version suffix on the sepolicy file. The policy version suffix support was carried over from conventional Linux distributions, where we needed to support simultaneous installation of multiple kernels and policies. This isn't required for Android, so get rid of it and thereby simplify the policy pathname. We still default to generating a specific policy version (the highest one supported by the emulator kernel), but this can be overridden by setting POLICYVERS on the make command-line or in the environment. Requires a corresponding change to libselinux. Change-Id: I40c88e13e8063ea37c2b9ab5b3ff8b0aa595402a Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
/system/sepolicy/Android.mk
|
d0f027ccc8f4a7aa8d872df9a195197590f234dc |
|
06-Sep-2012 |
Jean-Baptiste Queru <jbq@google.com> |
am 10f9a372: Merge upstream sepolicy into AOSP * commit '10f9a3727a5c46ef23f5f0385ae4ffec20cb46d9': Corrected gramatical issues Added new line to end of file Changed seapp_contexts temporary file naming Fix mls checking code Support overrides in seapp_contexts Add tf_daemon labeling support. Add ppp/mtp policy. per device seapp_context support dhcp policy. Trusted Execution Environment policy.
|
98ed392e68e041340ca8881ebf0a3cdf6bd5e880 |
|
05-Sep-2012 |
William Roberts <w.roberts@sta.samsung.com> |
Changed seapp_contexts temporary file naming Change-Id: I4f522869eeaa6f84771e4ee2328f65296dcc29db
/system/sepolicy/Android.mk
|
0ae3a8a2d50799d0b91d992434cdd4d3151b0348 |
|
04-Sep-2012 |
William Roberts <w.roberts@sta.samsung.com> |
Fix mls checking code Change-Id: I614caa520e218f8f148eef641fed2301571da8e1
/system/sepolicy/Android.mk
|
f0e0a94e032e55c13bc54f1cffe243f04872278e |
|
28-Aug-2012 |
William Roberts <w.roberts@sta.samsung.com> |
Support overrides in seapp_contexts Provides support for overriding seapp_contexts declerations in per device seapp_contexts files. Change-Id: I23a0ffa1d24f1ce57825b168f29a2e885d3e1c51
/system/sepolicy/Android.mk
|
171a06257124401af2e7c33fbbcbc69c18e45486 |
|
16-Aug-2012 |
William Roberts <bill.c.roberts@gmail.com> |
per device seapp_context support
/system/sepolicy/Android.mk
|
aa7fb3be1b456a2884c3fa707aa590196b2c70c3 |
|
13-Aug-2012 |
Jean-Baptiste Queru <jbq@google.com> |
resolved conflicts for merge of 0c2e5705 to jb-mr1-dev Change-Id: Iee1d877788b9397ca29a6cfe7bc3015c3edbe5ac
|
b19665c39da76c0e24c8cd9583e30c4a50567510 |
|
30-Jul-2012 |
rpcraig <rpcraig@tycho.ncsc.mil> |
Add mac_permissions.xml file. This was moved from external/mac-policy.git
/system/sepolicy/Android.mk
|
af56ac19545ff083ceb3c1ddf4bf8e2663d4b934 |
|
17-Jul-2012 |
Matt Finifter <finifter@google.com> |
Include su.te only for userdebug/eng builds. Change-Id: Ia544f13910abbe5e9f6a6cafae397415a41a7a94
/system/sepolicy/Android.mk
|
dc1072365e99cef38e0d234989ba29e0e2df2b4c |
|
12-Jul-2012 |
William Roberts <bill.c.roberts@gmail.com> |
Support for ocontexts per device. ocontexts was split up into 4 files: 1.fs_use 2.genfs_contexts 3.initial_sid_contexts 4.port_contexts Each file has their respective declerations in them. Devices, in their respective device directory, can now specify sepolicy.fs_use, sepolicy.genfs_contexts, sepolicy.port_contexts, and sepolicy.initial_sid_contexts. These declerations will be added right behind their respective sepolicy counterparts in the concatenated configuration file.
/system/sepolicy/Android.mk
|
70d4fc2243721a54cd177959e05cf81b54c4e226 |
|
20-Jun-2012 |
Joshua Brindle <jbrindle@tresys.com> |
Add selinux network script to policy Signed-off-by: Joshua Brindle <jbrindle@tresys.com>
/system/sepolicy/Android.mk
|
efd6d6e0dab97a49706f1116dde2ec87257f79c1 |
|
18-May-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Apply m4 to file_contexts and property_contexts to support includes.
/system/sepolicy/Android.mk
|
f5f899c3c0f684ffba6950b343e652abd78d0fd9 |
|
10-Apr-2012 |
The Android Open Source Project <initial-contribution@android.com> |
Merge from upstream sepolicy Change-Id: I99085d575e3d884fb04ac03ac998eb3c53eb2d9f
|
f4ea5b25399e4c6a10aa353b0c3d40564f78e89c |
|
10-Apr-2012 |
Ying Wang <wangying@google.com> |
Use the checkpolicy built from source. Change-Id: I22f49db3d59b50ed8975d8c1146bb9c322adbf7e
/system/sepolicy/Android.mk
|
124720a6976a69357522299afbe5591854e40775 |
|
04-Apr-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add policy for property service. New property_contexts file for property selabel backend. New property.te file with property type declarations. New property_service security class and set permission. Allow rules for setting properties.
/system/sepolicy/Android.mk
|
64935c7d87ce76ed542e16fce3dde9883b507d7a |
|
06-Mar-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Limit per-device policy files to a well-defined sepolicy prefix. Avoid any future collisions with the use of .fc or .te suffixes in the per-device directories. If we want multiple file support, add a separate subdirectory for sepolicy files.
/system/sepolicy/Android.mk
|
5b340befb4f964365c856606050254a65df909d1 |
|
06-Mar-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add support for per-device .te and .fc files.
/system/sepolicy/Android.mk
|
7e8cf24f58651228029eb4e53e4094a86f4d2bdb |
|
02-Feb-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Do not build if HAVE_SELINUX=false.
/system/sepolicy/Android.mk
|
2b826fcbe8231bf13affd63dbed865b315e1eddc |
|
24-Jan-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
Add a dependency on checkpolicy.
/system/sepolicy/Android.mk
|
02fb5f3c6abbb7f12c278a04966314d06f6378e3 |
|
18-Jan-2012 |
Ying Wang <wangying@google.com> |
Rewrite Android.mk.
/system/sepolicy/Android.mk
|
2dd4e51d5c2a2dfc0bfdee9303269f5a665f6e35 |
|
04-Jan-2012 |
Stephen Smalley <sds@tycho.nsa.gov> |
SE Android policy.
/system/sepolicy/Android.mk
|