Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container Registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
4d168f1a
Commit
4d168f1a
authored
7 years ago
by
Tri Vo
Committed by
android-build-merger
7 years ago
Browse files
Options
Downloads
Plain Diff
Merge changes from topic "27_mapping_test" am:
a6c6c046
am:
f7066845
Change-Id: I209563c2eeb181452e0ef196f7a8bcff1d4ce3dc
parents
641608a9
f7066845
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
Android.mk
+10
-96
10 additions, 96 deletions
Android.mk
treble_sepolicy_tests_for_release.mk
+103
-0
103 additions, 0 deletions
treble_sepolicy_tests_for_release.mk
with
113 additions
and
96 deletions
Android.mk
+
10
−
96
View file @
4d168f1a
...
...
@@ -236,7 +236,8 @@ ifneq ($(with_asan),true)
ifneq
($(SELINUX_IGNORE_NEVERALLOWS),true)
LOCAL_REQUIRED_MODULES
+=
\
sepolicy_tests
\
treble_sepolicy_tests
\
treble_sepolicy_tests_26.0
\
treble_sepolicy_tests_27.0
\
endif
endif
...
...
@@ -1289,73 +1290,8 @@ $(sepolicy_tests): $(HOST_OUT_EXECUTABLES)/sepolicy_tests $(all_fc_files) $(buil
##################################
ifeq
($(PRODUCT_SEPOLICY_SPLIT),true)
include
$(CLEAR_VARS)
# For Treble builds run tests verifying that processes are properly labeled and
# permissions granted do not violate the treble model. Also ensure that treble
# compatibility guarantees are upheld between SELinux version bumps.
LOCAL_MODULE
:=
treble_sepolicy_tests
LOCAL_MODULE_CLASS
:=
ETC
LOCAL_MODULE_TAGS
:=
tests
include
$(BUILD_SYSTEM)/base_rules.mk
# 26.0_plat - the platform policy shipped as part of the 26.0 release. This is
# built to enable us to determine the diff between the current policy and the
# 26.0 policy, which will be used in tests to make sure that compatibility has
# been maintained by our mapping files.
26.0_PLAT_PUBLIC_POLICY
:=
$(
LOCAL_PATH
)
/prebuilts/api/26.0/public
26.0_PLAT_PRIVATE_POLICY
:=
$(
LOCAL_PATH
)
/prebuilts/api/26.0/private
26.0_plat_policy.conf
:=
$(
intermediates
)
/26.0_plat_policy.conf
$(26.0_plat_policy.conf)
:
PRIVATE_MLS_SENS := $(MLS_SENS)
$(26.0_plat_policy.conf)
:
PRIVATE_MLS_CATS := $(MLS_CATS)
$(26.0_plat_policy.conf)
:
PRIVATE_TGT_ARCH := $(my_target_arch)
$(26.0_plat_policy.conf)
:
PRIVATE_TGT_WITH_ASAN := $(with_asan)
$(26.0_plat_policy.conf)
:
PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS)
$(26.0_plat_policy.conf)
:
PRIVATE_SEPOLICY_SPLIT := true
$(26.0_plat_policy.conf)
:
$(call build_policy
,
$(sepolicy_build_files)
,
\
$(26.0_PLAT_PUBLIC_POLICY) $(26.0_PLAT_PRIVATE_POLICY))
$(
transform-policy-to-conf
)
$(
hide
)
sed
'/dontaudit/d'
$@
>
$@
.dontaudit
built_26.0_plat_sepolicy
:=
$(
intermediates
)
/built_26.0_plat_sepolicy
$(built_26.0_plat_sepolicy)
:
PRIVATE_ADDITIONAL_CIL_FILES :=
\
$(call build_policy
,
technical_debt.cil
,
$(26.0_PLAT_PRIVATE_POLICY))
$(built_26.0_plat_sepolicy)
:
PRIVATE_NEVERALLOW_ARG := $(NEVERALLOW_ARG)
$(built_26.0_plat_sepolicy)
:
$(26.0_plat_policy.conf) $(HOST_OUT_EXECUTABLES)/checkpolicy
\
$(HOST_OUT_EXECUTABLES)/secilc
\
$(call build_policy
,
technical_debt.cil
,
$(26.0_PLAT_PRIVATE_POLICY))
\
$(built_sepolicy_neverallows)
@
mkdir
-p
$(
dir
$@
)
$(
hide
)
$(
CHECKPOLICY_ASAN_OPTIONS
)
$(
HOST_OUT_EXECUTABLES
)
/checkpolicy
-M
-C
-c
\
$(
POLICYVERS
)
-o
$@
$<
$(
hide
)
cat
$(
PRIVATE_ADDITIONAL_CIL_FILES
)
>>
$@
$(
hide
)
$(
HOST_OUT_EXECUTABLES
)
/secilc
-m
-M
true
-G
-c
$(
POLICYVERS
)
$(
PRIVATE_NEVERALLOW_ARG
)
$@
-o
$@
-f
/dev/null
26.0_plat_policy.conf
:=
# 26.0_compat - the current plat_sepolicy.cil built with the compatibility file
# targeting the 26.0 SELinux release. This ensures that our policy will build
# when used on a device that has non-platform policy targetting the 26.0 release.
26.0_compat
:=
$(
intermediates
)
/26.0_compat
26.0_mapping.cil
:=
$(
LOCAL_PATH
)
/private/compat/26.0/26.0.cil
26.0_mapping.ignore.cil
:=
$(
LOCAL_PATH
)
/private/compat/26.0/26.0.ignore.cil
26.0_nonplat
:=
$(
LOCAL_PATH
)
/prebuilts/api/26.0/nonplat_sepolicy.cil
$(26.0_compat)
:
PRIVATE_CIL_FILES :=
\
$(built_plat_cil) $(26.0_mapping.cil) $(26.0_nonplat)
$(26.0_compat)
:
$(HOST_OUT_EXECUTABLES)/secilc
\
$(built_plat_cil) $(26.0_mapping.cil) $(26.0_nonplat)
$(
hide
)
$(
HOST_OUT_EXECUTABLES
)
/secilc
-m
-M
true
-G
-N
-c
$(
POLICYVERS
)
\
$(
PRIVATE_CIL_FILES
)
-o
$@
-f
/dev/null
# 26.0_mapping.combined.cil - a combination of the mapping file used when
# combining the current platform policy with nonplatform policy based on the
# 26.0 policy release and also a special ignored file that exists purely for
# these tests.
26.0_mapping.combined.cil
:=
$(
intermediates
)
/26.0_mapping.combined.cil
$(26.0_mapping.combined.cil)
:
$(26.0_mapping.cil) $(26.0_mapping.ignore.cil)
mkdir
-p
$(
dir
$@
)
cat
$^
>
$@
intermediates
:=
$(
call intermediates-dir-for,ETC,built_plat_sepolicy,,,,
)
# plat_sepolicy - the current platform policy only, built into a policy binary.
# TODO - this currently excludes partner extensions, but support should be added
...
...
@@ -1392,39 +1328,17 @@ $(built_sepolicy_neverallows)
all_fc_files
:=
$(
built_plat_fc
)
$(
built_vendor_fc
)
all_fc_args
:=
$(
foreach file,
$(
all_fc_files
)
,
-f
$(
file
))
treble_sepolicy_tests
:=
$(
intermediates
)
/treble_sepolicy_tests
$(treble_sepolicy_tests)
:
ALL_FC_ARGS := $(all_fc_args)
$(treble_sepolicy_tests)
:
PRIVATE_SEPOLICY := $(built_sepolicy)
$(treble_sepolicy_tests)
:
PRIVATE_SEPOLICY_OLD := $(built_26.0_plat_sepolicy)
$(treble_sepolicy_tests)
:
PRIVATE_COMBINED_MAPPING := $(26.0_mapping.combined.cil)
$(treble_sepolicy_tests)
:
PRIVATE_PLAT_SEPOLICY := $(built_plat_sepolicy)
ifeq
($(PRODUCT_FULL_TREBLE_OVERRIDE),true)
$(treble_sepolicy_tests)
:
PRIVATE_FAKE_TREBLE := --fake-treble
else
$(treble_sepolicy_tests)
:
PRIVATE_FAKE_TREBLE :=
endif
$(treble_sepolicy_tests)
:
$(HOST_OUT_EXECUTABLES)/treble_sepolicy_tests
\
$(all_fc_files) $(built_sepolicy) $(built_plat_sepolicy)
\
$(built_26.0_plat_sepolicy) $(26.0_compat) $(26.0_mapping.combined.cil)
@
mkdir
-p
$(
dir
$@
)
$(
hide
)
$(
HOST_OUT_EXECUTABLES
)
/treble_sepolicy_tests
-l
\
$(
HOST_OUT
)
/lib64/libsepolwrap.
$(
SHAREDLIB_EXT
)
$(
ALL_FC_ARGS
)
\
-b
$(
PRIVATE_PLAT_SEPOLICY
)
-m
$(
PRIVATE_COMBINED_MAPPING
)
\
-o
$(
PRIVATE_SEPOLICY_OLD
)
-p
$(
PRIVATE_SEPOLICY
)
\
$(
PRIVATE_FAKE_TREBLE
)
$(
hide
)
touch
$@
# Tests for Treble compatibility of current platform policy and vendor policy of
# given release version.
version_under_treble_tests
:=
26.0
include
$(LOCAL_PATH)/treble_sepolicy_tests_for_release.mk
version_under_treble_tests
:=
27.0
include
$(LOCAL_PATH)/treble_sepolicy_tests_for_release.mk
26.0_PLAT_PUBLIC_POLICY
:=
26.0_PLAT_PRIVATE_POLICY
:=
26.0_compat
:=
26.0_mapping.cil
:=
26.0_mapping.combined.cil
:=
26.0_mapping.ignore.cil
:=
26.0_nonplat
:=
BASE_PLAT_PUBLIC_POLICY
:=
BASE_PLAT_PRIVATE_POLICY
:=
base_plat_policy.conf
:=
built_26.0_plat_sepolicy
:=
plat_sepolicy
:=
endif
# ($(PRODUCT_SEPOLICY_SPLIT),true)
...
...
This diff is collapsed.
Click to expand it.
treble_sepolicy_tests_for_release.mk
0 → 100644
+
103
−
0
View file @
4d168f1a
version
:=
$(
version_under_treble_tests
)
include
$(CLEAR_VARS)
# For Treble builds run tests verifying that processes are properly labeled and
# permissions granted do not violate the treble model. Also ensure that treble
# compatibility guarantees are upheld between SELinux version bumps.
LOCAL_MODULE
:=
treble_sepolicy_tests_
$(
version
)
LOCAL_MODULE_CLASS
:=
ETC
LOCAL_MODULE_TAGS
:=
tests
include
$(BUILD_SYSTEM)/base_rules.mk
# $(version)_plat - the platform policy shipped as part of the $(version) release. This is
# built to enable us to determine the diff between the current policy and the
# $(version) policy, which will be used in tests to make sure that compatibility has
# been maintained by our mapping files.
$(version)_PLAT_PUBLIC_POLICY
:=
$(
LOCAL_PATH
)
/prebuilts/api/
$(
version
)
/public
$(version)_PLAT_PRIVATE_POLICY
:=
$(
LOCAL_PATH
)
/prebuilts/api/
$(
version
)
/private
$(version)_plat_policy.conf
:=
$(
intermediates
)
/
$(
version
)
_plat_policy.conf
$($(version)_plat_policy.conf)
:
PRIVATE_MLS_SENS := $(MLS_SENS)
$($(version)_plat_policy.conf)
:
PRIVATE_MLS_CATS := $(MLS_CATS)
$($(version)_plat_policy.conf)
:
PRIVATE_TGT_ARCH := $(my_target_arch)
$($(version)_plat_policy.conf)
:
PRIVATE_TGT_WITH_ASAN := $(with_asan)
$($(version)_plat_policy.conf)
:
PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS)
$($(version)_plat_policy.conf)
:
PRIVATE_SEPOLICY_SPLIT := true
$($(version)_plat_policy.conf)
:
$(call build_policy
,
$(sepolicy_build_files)
,
\
$($(version)_PLAT_PUBLIC_POLICY) $($(version)_PLAT_PRIVATE_POLICY))
$(
transform-policy-to-conf
)
$(
hide
)
sed
'/dontaudit/d'
$@
>
$@
.dontaudit
built_$(version)_plat_sepolicy
:=
$(
intermediates
)
/built_
$(
version
)
_plat_sepolicy
$(built_$(version)_plat_sepolicy)
:
PRIVATE_ADDITIONAL_CIL_FILES :=
\
$(call build_policy
,
technical_debt.cil
,
$($(version)_PLAT_PRIVATE_POLICY))
$(built_$(version)_plat_sepolicy)
:
PRIVATE_NEVERALLOW_ARG := $(NEVERALLOW_ARG)
$(built_$(version)_plat_sepolicy)
:
$($(version)_plat_policy.conf) $(HOST_OUT_EXECUTABLES)/checkpolicy
\
$(HOST_OUT_EXECUTABLES)/secilc
\
$(call build_policy
,
technical_debt.cil
,
$($(version)_PLAT_PRIVATE_POLICY))
\
$(built_sepolicy_neverallows)
@
mkdir
-p
$(
dir
$@
)
$(
hide
)
$(
CHECKPOLICY_ASAN_OPTIONS
)
$(
HOST_OUT_EXECUTABLES
)
/checkpolicy
-M
-C
-c
\
$(
POLICYVERS
)
-o
$@
$<
$(
hide
)
cat
$(
PRIVATE_ADDITIONAL_CIL_FILES
)
>>
$@
$(
hide
)
$(
HOST_OUT_EXECUTABLES
)
/secilc
-m
-M
true
-G
-c
$(
POLICYVERS
)
$(
PRIVATE_NEVERALLOW_ARG
)
$@
-o
$@
-f
/dev/null
$(version)_plat_policy.conf
:=
# $(version)_compat - the current plat_sepolicy.cil built with the compatibility file
# targeting the $(version) SELinux release. This ensures that our policy will build
# when used on a device that has non-platform policy targetting the $(version) release.
$(version)_compat
:=
$(
intermediates
)
/
$(
version
)
_compat
$(version)_mapping.cil
:=
$(
LOCAL_PATH
)
/private/compat/
$(
version
)
/
$(
version
)
.cil
$(version)_mapping.ignore.cil
:=
$(
LOCAL_PATH
)
/private/compat/
$(
version
)
/
$(
version
)
.ignore.cil
$(version)_nonplat
:=
$(
LOCAL_PATH
)
/prebuilts/api/
$(
version
)
/nonplat_sepolicy.cil
$($(version)_compat)
:
PRIVATE_CIL_FILES :=
\
$(built_plat_cil) $($(version)_mapping.cil) $($(version)_nonplat)
$($(version)_compat)
:
$(HOST_OUT_EXECUTABLES)/secilc
\
$(built_plat_cil) $($(version)_mapping.cil) $($(version)_nonplat)
$(
hide
)
$(
HOST_OUT_EXECUTABLES
)
/secilc
-m
-M
true
-G
-N
-c
$(
POLICYVERS
)
\
$(
PRIVATE_CIL_FILES
)
-o
$@
-f
/dev/null
# $(version)_mapping.combined.cil - a combination of the mapping file used when
# combining the current platform policy with nonplatform policy based on the
# $(version) policy release and also a special ignored file that exists purely for
# these tests.
$(version)_mapping.combined.cil
:=
$(
intermediates
)
/
$(
version
)
_mapping.combined.cil
$($(version)_mapping.combined.cil)
:
$($(version)_mapping.cil) $($(version)_mapping.ignore.cil)
mkdir
-p
$(
dir
$@
)
cat
$^
>
$@
treble_sepolicy_tests_$(version)
:=
$(
intermediates
)
/treble_sepolicy_tests_
$(
version
)
$(treble_sepolicy_tests_$(version))
:
ALL_FC_ARGS := $(all_fc_args)
$(treble_sepolicy_tests_$(version))
:
PRIVATE_SEPOLICY := $(built_sepolicy)
$(treble_sepolicy_tests_$(version))
:
PRIVATE_SEPOLICY_OLD := $(built_$(version)_plat_sepolicy)
$(treble_sepolicy_tests_$(version))
:
PRIVATE_COMBINED_MAPPING := $($(version)_mapping.combined.cil)
$(treble_sepolicy_tests_$(version))
:
PRIVATE_PLAT_SEPOLICY := $(built_plat_sepolicy)
ifeq
($(PRODUCT_FULL_TREBLE_OVERRIDE),true)
$(treble_sepolicy_tests_$(version))
:
PRIVATE_FAKE_TREBLE := --fake-treble
else
$(treble_sepolicy_tests_$(version))
:
PRIVATE_FAKE_TREBLE :=
endif
$(treble_sepolicy_tests_$(version))
:
$(HOST_OUT_EXECUTABLES)/treble_sepolicy_tests
\
$(all_fc_files) $(built_sepolicy) $(built_plat_sepolicy)
\
$(built_$(version)_plat_sepolicy) $($(version)_compat) $($(version)_mapping.combined.cil)
@
mkdir
-p
$(
dir
$@
)
$(
hide
)
$(
HOST_OUT_EXECUTABLES
)
/treble_sepolicy_tests
-l
\
$(
HOST_OUT
)
/lib64/libsepolwrap.
$(
SHAREDLIB_EXT
)
$(
ALL_FC_ARGS
)
\
-b
$(
PRIVATE_PLAT_SEPOLICY
)
-m
$(
PRIVATE_COMBINED_MAPPING
)
\
-o
$(
PRIVATE_SEPOLICY_OLD
)
-p
$(
PRIVATE_SEPOLICY
)
\
$(
PRIVATE_FAKE_TREBLE
)
$(
hide
)
touch
$@
$(version)_PLAT_PUBLIC_POLICY
:=
$(version)_PLAT_PRIVATE_POLICY
:=
$(version)_compat
:=
$(version)_mapping.cil
:=
$(version)_mapping.combined.cil
:=
$(version)_mapping.ignore.cil
:=
$(version)_nonplat
:=
built_$(version)_plat_sepolicy
:=
version
:=
version_under_treble_tests
:=
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment