- May 30, 2014
-
-
Stephen Smalley authored
Create a separate recovery policy and only include the recovery domain allow rules in it. Change-Id: I444107f9821eabf4164ba07a44d03bd71e719989 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Jan 29, 2014
-
-
Robert Craig authored
Added a new check to make sure that all listed BOARD_SEPOLICY_UNION files are located somewhere in the listed BOARD_SEPOLICY_DIRS locations. The build will error out otherwise. Change-Id: Icc5febc5fe5a7cccb90ac5b83e6289c2aa5bf069 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Jan 11, 2014
-
-
Nick Kralevich authored
Permissive domains are only intended for development. When a device launches, we want to ensure that all permissive domains are in, at a minimum, unconfined+enforcing. Add FORCE_PERMISSIVE_TO_UNCONFINED to Android.mk. During development, this flag is false, and permissive domains are allowed. When SELinux new feature development has been frozen immediately before release, this flag will be flipped to true. Any previously permissive domains will move into unconfined+enforcing. This will ensure that all SELinux domains have at least a minimal level of protection. Unconditionally enable this flag for all user builds. Change-Id: I1632f0da0022c80170d8eb57c82499ac13fd7858
-
- Jan 09, 2014
-
-
Nick Kralevich authored
Create a new m4 macro called userdebug_or_eng. Arguments passed to this macro are only emitted if we're performing a userdebug or eng build. Merge shell.te and shell_user.te and eliminate duplicate lines. Same for su.te and su_user.te Change-Id: I8fbabca65ec392aeafd5b90cef57b5066033fad0
-
- Dec 02, 2013
-
-
Stephen Smalley authored
Also make su and shell permissive in non-user builds to allow use of setenforce without violating the neverallow rule. Change-Id: Ie76ee04e90d5a76dfaa5f56e9e3eb7e283328a3f Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Oct 28, 2013
-
-
Nick Kralevich authored
In 9af6f1bd, the -d option was dropped from insertkeys.py. This was done to allow an Android distribution to replace the default version of keys.conf distributed in external/sepolicy/keys.conf. keys.conf was modified to reference the publicly known test keys in build/target/product/security. Unfortunately, this broke Google's build of Android. Instead of incorporating our keys directory, we were using the default AOSP keys. As a result, apps were getting assigned to the wrong SELinux domain. (see "Steps to reproduce" below) This change continues to allow others to replace keys.conf, but makes DEFAULT_SYSTEM_DEV_CERTIFICATE available as an environment variable in case the customized version wants to make reference to it. This change also modifies the stock version of keys.conf to use DEFAULT_SYSTEM_DEV_CERTIFICATE, which should be appropriate for most Android distributions. It doesn't make any sense to force each OEM to have a copy of this file. Steps to reproduce. 1) Compile and boot Android. 2) Run the following command: "adb shell ps -Z | grep process.media" Expected: $ adb shell ps -Z | grep process.media u:r:media_app:s0 u0_a5 1332 202 android.process.media Actual: $ adb shell ps -Z | grep process.media u:r:untrusted_app:s0 u0_a5 3617 187 android.process.media Bug: 11327304 Change-Id: Ica24fb25c5f9c0e2f4d181718c757cf372467822
-
- Sep 06, 2013
-
-
William Roberts authored
This breaks the ability for users to have certs in many directories. Currently the design is to allow keys.conf to specify arbitrary locations for pem files, relative to the root of the Android tree. If users want to have a common prefix on all the keys, then they can export DEFAULT_SYSTEM_DEV_CERTIFICATE, and make that an environment variable in their keys.conf file. Signed-off-by:
William Roberts <wroberts@tresys.com> Change-Id: I23455b891206cab6eca7db08ff3c28283f87c640 Signed-off-by:
William Roberts <wroberts@tresys.com>
-
- Apr 05, 2013
-
-
Stephen Smalley authored
Increase the SELinux policy version to 26. This is needed for name-based transitions used by the manta sepolicy. Requires kernel 3.0 or higher. Change-Id: I046fa9f7122f77506c70b2c735345bc0194935df Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Apr 01, 2013
-
-
Stephen Smalley authored
Increase the SELinux policy version to 26. This is needed for name-based transitions used by the manta sepolicy. Requires kernel 3.0 or higher. Change-Id: I046fa9f7122f77506c70b2c735345bc0194935df Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Mar 29, 2013
-
-
Geremy Condra authored
This allows us to better integrate key selection with our existing build process. Change-Id: I6e3eb5fbbfffb8e31c5edcf16f74df7c38abe537
-
- Mar 28, 2013
-
-
Geremy Condra authored
This allows us to better integrate key selection with our existing build process. Change-Id: I6e3eb5fbbfffb8e31c5edcf16f74df7c38abe537
-
- Mar 27, 2013
-
-
William Roberts authored
Change-Id: I86f2f28f7c558b8e9a70e5aa9ebcfa8bf26f9ef7
-
Robert Craig authored
Allow script to union mac_permissions.xml files specified using the BOARD_SEPOLICY_DIRS and BOARD_SEPOLICY_UNION constructs. Change-Id: I4fc65fd1ab4c612f25e966f030247e54a270b614 Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
Robert Craig authored
Assortment of policy changes include: * Bluetooth domain to talk to init and procfs. * New device node domains. * Allow zygote to talk to its executable. * Update system domain access to new device node domains. * Create a post-process sepolicy with dontaudits removed. * Allow rild to use the tty device. Change-Id: Ibb96b590d0035b8f6d1606cd5e4393c174d10ffb Signed-off-by:
rpcraig <rpcraig@tycho.ncsc.mil>
-
- Mar 26, 2013
-
-
Geremy Condra authored
This reverts commit 60d4d71e This should (finally) be fixed in https://android-review.googlesource.com/#/c/54730/ Change-Id: I3dd358560f7236f28387ffbe247fc2b004e303ea
-
William Roberts authored
Use TOP instead of ANDROID_BUILD_TOP Fix spelling issues in keys.conf Change-Id: Ib90b3041af5ef68f30f4ab78c768ad225987ef2d
-
Geremy Condra authored
This reverts commit cd4104e8 This builds clean locally, but seems to explode on the build servers. Reverting until there's a solution. Change-Id: I09200db37c193f39c77486d5957a8f5916e38aa0
-
Geremy Condra authored
This reverts commit 1446e714 Hidden dependency has been resolved. Change-Id: Ia535c0b9468ea5f705dff9813186a7fa8bab84ae
-
- Mar 21, 2013
-
-
William Roberts authored
See README for further details. Change-Id: I4599c7ecd5a552e38de89d0a9e496e047068fe05
-
- Mar 19, 2013
-
-
Geremy Condra authored
This reverts commit 22fc0410 Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
-
Geremy Condra authored
This reverts commit 22fc0410 Change-Id: I2d91b1262e8d0e82a21ea7c5333b1e86f3ed9bee
-
William Roberts authored
Change-Id: I5d5362ad0055275052b0c2ba535b599a8e26112e
-
Robert Craig authored
Change-Id: If361ea93fabd343728196eed2663fd572ecaa70b Signed-off-by:
Robert Craig <rpcraig@tycho.ncsc.mil>
-
- Dec 08, 2012
-
-
William Roberts authored
Support the inseretion of the public key from pem files into the mac_permissions.xml file at build time. Change-Id: Ia42b6cba39bf93723ed3fb85236eb8f80a08962a
-
- Dec 05, 2012
-
-
William Roberts authored
Support overriding ma_permissions.xml in BOARD_SEPOLICY_REPLACE Change-Id: If0bca8bf29bc431a291b6d7b20de132e68cd6a79
-
- Nov 01, 2012
-
-
Kenny Root authored
This reverts commit af56ac19. Change-Id: Id658a90b58ea31365051c0878c58393fd055fc69
-
Alice Chu authored
Change-Id: I57b0dd9f8071eae492020f410c87f465ba820711
-
- Oct 26, 2012
-
-
rpcraig authored
This is a rewrite of the existing implementation. Three new variables are now needed to add/modify the exisitng base policy. They are, BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION which govern what files are replaced and concatenated, and BOARD_SEPOLICY_DIRS which lists the various directories that will contain the BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION policy files. Change-Id: Id33381268cef03245c56bc5242fec7da9b6c6493 Signed-off-by:
rpcraig <robertpcraig@gmail.com>
-
Ying Wang authored
"sepolicy" is a phony target defined by the build system. If you use it as dependency of a file target, you'll get unnecessary rebuild. Change-Id: I3a948ebbaff6a146050eb86a3d04cdc050f7c001
-
- Oct 17, 2012
-
-
Stephen Smalley authored
Change-Id: I4b12dc3dcb432edbdf95dd3bc97f809912ce86d1 Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Oct 10, 2012
-
-
Kenny Root authored
Change-Id: I45b4a749bf4fb085d96d912871bae33aa5288119
-
- Sep 18, 2012
-
-
Stephen Smalley authored
The policy version suffix support was carried over from conventional Linux distributions, where we needed to support simultaneous installation of multiple kernels and policies. This isn't required for Android, so get rid of it and thereby simplify the policy pathname. We still default to generating a specific policy version (the highest one supported by the emulator kernel), but this can be overridden by setting POLICYVERS on the make command-line or in the environment. Requires a corresponding change to libselinux. Change-Id: I40c88e13e8063ea37c2b9ab5b3ff8b0aa595402a Signed-off-by:
Stephen Smalley <sds@tycho.nsa.gov>
-
- Sep 05, 2012
-
-
William Roberts authored
Change-Id: I4f522869eeaa6f84771e4ee2328f65296dcc29db
-
- Sep 04, 2012
-
-
William Roberts authored
Change-Id: I614caa520e218f8f148eef641fed2301571da8e1
-
William Roberts authored
Provides support for overriding seapp_contexts declerations in per device seapp_contexts files. Change-Id: I23a0ffa1d24f1ce57825b168f29a2e885d3e1c51
-
- Aug 16, 2012
-
-
William Roberts authored
-
- Jul 30, 2012
-
-
rpcraig authored
This was moved from external/mac-policy.git
-
- Jul 18, 2012
-
-
Matt Finifter authored
Change-Id: Ia544f13910abbe5e9f6a6cafae397415a41a7a94
-
- Jul 12, 2012
-
-
William Roberts authored
ocontexts was split up into 4 files: 1.fs_use 2.genfs_contexts 3.initial_sid_contexts 4.port_contexts Each file has their respective declerations in them. Devices, in their respective device directory, can now specify sepolicy.fs_use, sepolicy.genfs_contexts, sepolicy.port_contexts, and sepolicy.initial_sid_contexts. These declerations will be added right behind their respective sepolicy counterparts in the concatenated configuration file.
-
- Jun 21, 2012
-
-
Joshua Brindle authored
Signed-off-by:
Joshua Brindle <jbrindle@tresys.com>
-