Skip to content
Snippets Groups Projects
  1. May 30, 2014
  2. Jan 29, 2014
  3. Jan 11, 2014
    • Nick Kralevich's avatar
      Support forcing permissive domains to unconfined. · 623975fa
      Nick Kralevich authored
      Permissive domains are only intended for development.
      When a device launches, we want to ensure that all
      permissive domains are in, at a minimum, unconfined+enforcing.
      
      Add FORCE_PERMISSIVE_TO_UNCONFINED to Android.mk. During
      development, this flag is false, and permissive domains
      are allowed. When SELinux new feature development has been
      frozen immediately before release, this flag will be flipped
      to true. Any previously permissive domains will move into
      unconfined+enforcing.
      
      This will ensure that all SELinux domains have at least a
      minimal level of protection.
      
      Unconditionally enable this flag for all user builds.
      
      Change-Id: I1632f0da0022c80170d8eb57c82499ac13fd7858
      623975fa
  4. Jan 09, 2014
    • Nick Kralevich's avatar
      Create new conditional userdebug_or_eng · 88ce951d
      Nick Kralevich authored
      Create a new m4 macro called userdebug_or_eng. Arguments
      passed to this macro are only emitted if we're performing
      a userdebug or eng build.
      
      Merge shell.te and shell_user.te and eliminate duplicate
      lines. Same for su.te and su_user.te
      
      Change-Id: I8fbabca65ec392aeafd5b90cef57b5066033fad0
      88ce951d
  5. Dec 02, 2013
  6. Oct 28, 2013
    • Nick Kralevich's avatar
      Make DEFAULT_SYSTEM_DEV_CERTIFICATE available in keys.conf · c3c9052b
      Nick Kralevich authored
      In 9af6f1bd, the -d option
      was dropped from insertkeys.py. This was done to allow an
      Android distribution to replace the default version of
      keys.conf distributed in external/sepolicy/keys.conf. keys.conf
      was modified to reference the publicly known test keys in
      build/target/product/security.
      
      Unfortunately, this broke Google's build of Android. Instead
      of incorporating our keys directory, we were using the
      default AOSP keys. As a result, apps were getting assigned
      to the wrong SELinux domain. (see "Steps to reproduce" below)
      
      This change continues to allow others to replace keys.conf,
      but makes DEFAULT_SYSTEM_DEV_CERTIFICATE available as an
      environment variable in case the customized version wants to
      make reference to it. This change also modifies the stock
      version of keys.conf to use DEFAULT_SYSTEM_DEV_CERTIFICATE,
      which should be appropriate for most Android distributions.
      It doesn't make any sense to force each OEM to have a copy of
      this file.
      
      Steps to reproduce.
      
      1) Compile and boot Android.
      2) Run the following command: "adb shell ps -Z | grep process.media"
      
      Expected:
      
        $ adb shell ps -Z | grep process.media
        u:r:media_app:s0               u0_a5     1332  202   android.process.media
      
      Actual:
      
        $ adb shell ps -Z | grep process.media
        u:r:untrusted_app:s0           u0_a5     3617  187   android.process.media
      
      Bug: 11327304
      Change-Id: Ica24fb25c5f9c0e2f4d181718c757cf372467822
      c3c9052b
  7. Sep 06, 2013
  8. Apr 05, 2013
  9. Apr 01, 2013
  10. Mar 29, 2013
  11. Mar 28, 2013
  12. Mar 27, 2013
  13. Mar 26, 2013
  14. Mar 21, 2013
  15. Mar 19, 2013
  16. Dec 08, 2012
  17. Dec 05, 2012
  18. Nov 01, 2012
  19. Oct 26, 2012
    • rpcraig's avatar
      Add better per-device sepolicy support. · 47cd396b
      rpcraig authored
      
      This is a rewrite of the existing implementation.
      Three new variables are now needed to add/modify
      the exisitng base policy. They are, BOARD_SEPOLICY_REPLACE
      and BOARD_SEPOLICY_UNION which govern what files
      are replaced and concatenated, and BOARD_SEPOLICY_DIRS
      which lists the various directories that will contain
      the BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION
      policy files.
      
      Change-Id: Id33381268cef03245c56bc5242fec7da9b6c6493
      Signed-off-by: default avatarrpcraig <robertpcraig@gmail.com>
      47cd396b
    • Ying Wang's avatar
      Use file target as dependency. · d8b122c7
      Ying Wang authored
      "sepolicy" is a phony target defined by the build system.
      If you use it as dependency of a file target, you'll get unnecessary
      rebuild.
      
      Change-Id: I3a948ebbaff6a146050eb86a3d04cdc050f7c001
      d8b122c7
  20. Oct 17, 2012
  21. Oct 10, 2012
  22. Sep 18, 2012
    • Stephen Smalley's avatar
      Drop the use of a policy version suffix on the sepolicy file. · 66a3e8d9
      Stephen Smalley authored
      
      The policy version suffix support was carried over from conventional
      Linux distributions, where we needed to support simultaneous installation
      of multiple kernels and policies.  This isn't required for Android, so
      get rid of it and thereby simplify the policy pathname.
      
      We still default to generating a specific policy version (the highest
      one supported by the emulator kernel), but this can be overridden
      by setting POLICYVERS on the make command-line or in the environment.
      
      Requires a corresponding change to libselinux.
      
      Change-Id: I40c88e13e8063ea37c2b9ab5b3ff8b0aa595402a
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      66a3e8d9
  23. Sep 05, 2012
  24. Sep 04, 2012
  25. Aug 16, 2012
  26. Jul 30, 2012
  27. Jul 18, 2012
  28. Jul 12, 2012
    • William Roberts's avatar
      Support for ocontexts per device. · dc107236
      William Roberts authored
      ocontexts was split up into 4 files:
      1.fs_use
      2.genfs_contexts
      3.initial_sid_contexts
      4.port_contexts
      
      Each file has their respective declerations in them.
      Devices, in their respective device directory, can now specify sepolicy.fs_use, sepolicy.genfs_contexts, sepolicy.port_contexts, and sepolicy.initial_sid_contexts. These declerations will be added right behind their respective sepolicy counterparts in the concatenated configuration file.
      dc107236
  29. Jun 21, 2012
Loading