- Aug 12, 2015
-
-
Stephen Smalley authored
Extend checkfc to support comparing two file_contexts or file_contexts.bin files. This is for use by the CTS SELinuxHostTest to compare the AOSP general_file_contexts with the device file_contexts.bin file. Depends on I0fe63e0c7f11ae067b5aac2f468f7842e5d76986. Change-Id: I2fff2f8cf87690a76219ddf4cf38939650f34782 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Feb 06, 2015
-
-
dcashman authored
Also, divide each sepolicy-analyze function into its own component for simplified command-line parsing and potentially eventual modularization. Bug: 18005561 Cherry-pick of commit: ef4fd306 with commit: 47c14611 squashed in. Bug: 19191637 Change-Id: Id66cad549b7311a6bbd92fd64b6ec2c60d0433a4
-
- Feb 05, 2015
-
-
Stephen Smalley authored
See NEVERALLOW CHECKING in tools/README for documentation. Depends on change I45b3502ff96b1d093574e1fecff93a582f8d00bd for libsepol to support reporting all neverallow failures. Cherry-pick of commit: 59906bf8 with build-fix from commit: 74bbf703 added manually. Bug: 19191637 Change-Id: I1c18fa854b3c5f5e05d5dc42d9006c5fdacebdc3 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Nov 19, 2014
-
-
dcashman authored
Also, divide each sepolicy-analyze function into its own component for simplified command-line parsing and potentially eventual modularization. Bug: 18005561 Cherry-pick from: https://android-review.googlesource.com/#/c/111626/ Change-Id: I751a99feffe820308ec58514fdba4cdef184d964
-
- Nov 13, 2014
-
-
Stephen Smalley authored
See NEVERALLOW CHECKING in tools/README for documentation. Depends on change I45b3502ff96b1d093574e1fecff93a582f8d00bd for libsepol to support reporting all neverallow failures. Change-Id: I47c16ccb910ac730c092cb3ab977c59cb8197ce0 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Oct 31, 2014
-
-
dcashman authored
Also, divide each sepolicy-analyze function into its own component for simplified command-line parsing and potentially eventual modularization. Bug: 18005561 Change-Id: I45fa07d776cf1bec7d60dba0c03ee05142b86c19
-
- Oct 14, 2014
-
-
Stephen Smalley authored
See NEVERALLOW CHECKING in tools/README for documentation. Depends on change I45b3502ff96b1d093574e1fecff93a582f8d00bd for libsepol to support reporting all neverallow failures. Change-Id: I47c16ccb910ac730c092cb3ab977c59cb8197ce0 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Mar 25, 2014
-
-
Robert Craig authored
Change-Id: Iabda448d252d3b1ce19809c7f5de0dca3942f60c Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Nov 19, 2013
-
-
Stephen Smalley authored
Usage: sepolicy-analyze -D -P out/target/product/<board>/root/sepolicy Displays duplicate allow rules, i.e. pairs of allow rules that grant the same permissions where one allow rule is written directly in terms of individual types and the other is written in terms of attributes associated with those same types. The rule with individual types is a candidate for removal. The rule with individual types may be directly represented in the source policy or may be a result of expansion of a type negation (e.g. domain -foo -bar is expanded to individual allow rules by the policy compiler). Domains with unconfineddomain will typically have such duplicate rules as a natural side effect and can be ignored. Also add a tools/README with a description of all of the tools. Change-Id: I07838dbd22c5cc8a4a65b57003ccae38129050f5 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-