Skip to content
Snippets Groups Projects
  1. Aug 29, 2016
  2. Jul 01, 2016
  3. May 13, 2016
  4. Mar 01, 2016
    • Nick Kralevich's avatar
      suppress unnecessary makefile output · 6ef10bd4
      Nick Kralevich authored
      checkpolicy spits out a bunch of unnecessary lines during normal
      operation, which bloat the logs and hide other more important
      warnings. Suppress the normal output.
      
      SELinux compile time errors are printed to stderr, and are
      uneffected by this change.
      
      Change-Id: I07f2cbe8afcd14abf1c025355a169b5214ed5c6e
      6ef10bd4
  5. Feb 27, 2016
    • Nick Kralevich's avatar
      Don't allow permissive SELinux domains on user builds. · 3df1fda5
      Nick Kralevich authored
      It's a CTS requirement that all SELinux domains be in
      enforcing mode. Add the same assertion to the build system
      when targeting user builds.
      
      In particular, this avoids a situation where device integrity
      checking is enabled on user builds, but permissive denials
      are being generated, causing the device to unexpectedly reboot
      into safe mode.
      
      A developer wanting to put an SELinux domain into permissive
      mode for userdebug/eng purposes can write the following
      in their policy:
      
        userdebug_or_eng(`
          permissive foo;
        ')
      
      Bug: 26902605
      Bug: 27313768
      
      (cherry picked from commit bca98efa)
      
      Change-Id: If6abe1fa70c79a1fccdbdd9ff273d92de7565a73
      3df1fda5
    • Nick Kralevich's avatar
      Don't allow permissive SELinux domains on user builds. · bca98efa
      Nick Kralevich authored
      It's a CTS requirement that all SELinux domains be in
      enforcing mode. Add the same assertion to the build system
      when targeting user builds.
      
      In particular, this avoids a situation where device integrity
      checking is enabled on user builds, but permissive denials
      are being generated, causing the device to unexpectedly reboot
      into safe mode.
      
      A developer wanting to put an SELinux domain into permissive
      mode for userdebug/eng purposes can write the following
      in their policy:
      
        userdebug_or_eng(`
          permissive foo;
        ')
      
      Bug: 26902605
      Bug: 27313768
      Change-Id: Ic0971d9e96a28f2a98f9d56a547661d24fb81a21
      bca98efa
  6. Jan 15, 2016
    • William Roberts's avatar
      fc_sort: initial commit · 49693f1b
      William Roberts authored
      
      Ordering matters in fc files; the last match wins. In builds where
      many BOARD_SEPOLICY_DIRS are set, the order of that list becomes
      increasingly important in order to maintain a cohesive built
      file_contexts.
      
      To correct this, we sort the device specific file_contexts entries
      with the upstream fc_sort tool.
      
      Change-Id: I3775eae11bfa5905cad0d02a0bf26c76ac03437c
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      49693f1b
  7. Jan 14, 2016
  8. Jan 07, 2016
    • William Roberts's avatar
      fc_sort: initial commit · 29d14688
      William Roberts authored
      
      Ordering matters in fc files; the last match wins. In builds where
      many BOARD_SEPOLICY_DIRS are set, the order of that list becomes
      increasingly important in order to maintain a cohesive built
      file_contexts.
      
      To correct this, we sort the device specific file_contexts entries
      with the upstream fc_sort tool.
      
      Change-Id: Id79cc6f434c41179d5c0d0d739c4718918b0b1dc
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      29d14688
  9. Jan 04, 2016
    • Jeff Vander Stoep's avatar
      Reduce socket ioctl perms · cbaa2b7d
      Jeff Vander Stoep authored
      Reduce the socket ioctl commands available to untrusted/isolated apps.
      Neverallow accessing sensitive information or setting of network parameters.
      Neverallow access to device private ioctls i.e. device specific
      customizations as these are a common source of driver bugs.
      
      Define common ioctl commands in ioctl_defines.
      
      Bug: 26267358
      Change-Id: Ic5c0af066e26d4cb2867568f53a3e65c5e3b5a5d
      cbaa2b7d
  10. Dec 29, 2015
    • William Roberts's avatar
      Android.mk: cleanse all set but not unset variables · 50a478ef
      William Roberts authored
      
      Discovered by diffing the set of "set variables" with
      the set of "cleared variables".
      
      Script:
      
      mydir=$(mktemp -d)
      
      grep -E '(^[a-z].)[a-z0-9_\.]*\s*:?=.' Android.mk  | cut -d' ' -f 1-1 | sort | uniq > $mydir/set_vars
      grep -E '(^[a-z].)[a-z0-9_\.]*\s*:?=$' Android.mk | cut -d' ' -f1-1 | sort | uniq > $mydir/unset_vars
      diff $mydir/set_vars $mydir/unset_vars
      rm -rf $mydir
      
      Change-Id: Ib50abac6b417a1bcc1894d9a7bafdbdca371006a
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      50a478ef
    • William Roberts's avatar
      Android.mk: clean dependencies and clear variables · 46749752
      William Roberts authored
      
      Dependencies being built with newline files in between
      were also including the list of files without the newlines,
      thus make would have to process 3n-1 files instead of 2n-1
      where n is the number of files to process.
      
      Additionally the *_with_nl variables were not being cleared
      out and polluting Make's global name-space.
      
      Change-Id: I76ea1a3dfae994b32991730aea7e4308da52a583
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      46749752
  11. Dec 16, 2015
    • William Roberts's avatar
      sectxfile_nl: fix superfluous dependencies · cb1ab985
      William Roberts authored
      
      The target sectxfile_nl, which is an auto-generated newline file,
      has dependencies on itself and the other files. The dependencies
      should be on the other files and this newline file, not the other
      way around. Ideally, the *_contexts recipes should have the
      dependency recorded for their "contexts" files and the newline
      file.
      
      Additionally, recipe dependencies for building the *_contexts files
      depended on the list of all the contexts files with the newline file
      in that list, however an additional explicit addition of the newline
      file was also added in. Remove this, since its in the full list of
      files.
      
      Change-Id: Iac658923f23a8d9263d392c44003b6bda4064646
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      cb1ab985
  12. Dec 14, 2015
    • William Roberts's avatar
      checkfc: add attribute test · ad3cb39e
      William Roberts authored
      
      Enable checkfc to check *_contexts against a set of valid attributes
      which must be associated with all types in the contexts file that
      is being checked.
      
      Since it's imperative that checkfc knows which file its checking to
      choose the proper attribute set, the -s option is introduced to
      indicate the service_contexts file. The property_contexts file continues
      to use the existing -p and file_contexts requires no specification, aka
      it's the default.
      
      Failure examples:
      file_contexts:
      Error: type "init" is not of set: "fs_type, dev_type, file_type"
      
      service_contexts:
      Error: type "init_exec" is not of set: "service_manager_type"
      
      property_contexts:
      Error: type "bluetooth_service" is not of set: "property_type"
      
      Change-Id: I62077e4d0760858a9459e753e14dfd209868080f
      Signed-off-by: default avatarWilliam Roberts <william.c.roberts@intel.com>
      ad3cb39e
  13. Dec 13, 2015
  14. Dec 11, 2015
    • Jeff Vander Stoep's avatar
      Migrate to upstream policy version 30 · 3a0ce49b
      Jeff Vander Stoep authored
      Grant untrusted_app and isolated_app unpriv_sock_perms, neverallow
      priv_sock_perms to disallow access to MAC address and ESSID.
      
      Change-Id: Idac3b657a153e7d7fdc647ff34b876a325d759b3
      3a0ce49b
  15. Dec 08, 2015
  16. Oct 23, 2015
    • Jeff Vander Stoep's avatar
      Temporarily downgrade to policy version number · 0fc831c3
      Jeff Vander Stoep authored
      Temporarily move from policy version 30 to 29 until device kernels
      and prebuilts are all upgraded to the accepted upstream version of
      the selinux ioctl command whitelisting code.
      
      (cherry picked from commit 89765083)
      
      Bug: 22846070
      
      Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
      0fc831c3
  17. Oct 01, 2015
  18. Sep 29, 2015
  19. Sep 28, 2015
  20. Sep 18, 2015
  21. Aug 13, 2015
  22. Aug 12, 2015
    • Richard Haines's avatar
      Update Android.mk to support file_contexts.bin · c2d01914
      Richard Haines authored
      
      This change supports external/libselinux changes to implement
      PCRE formatted binary file_contexts and general_file_contexts.bin
      files.
      
      The $(intermediates) directory will contain the original text file
      (that is no longer used on the device) with a .tmp extension as well
      as the .bin file to aid analysis.
      
      A CleanSpec.mk file is added to remove the old file_contexts file.
      
      Change-Id: I75a781100082c23536f70ce3603f7de42408b5ba
      Signed-off-by: default avatarRichard Haines <richard_c_haines@btinternet.com>
      c2d01914
  23. Aug 11, 2015
    • Dan Willemsen's avatar
      Don't assume ordering of $(wildcard ...) · bc2a49f2
      Dan Willemsen authored
      There are no guarantees on the order of the results from a call to the
      wildcard function. In fact, the order usually changes between make 3.81
      and make 4.0 (and kati).
      
      Instead, sort the results of wildcard in each sepolicy directory, so
      that directory order is preserved, but content ordering is reliable.
      
      Change-Id: I1620f89bbdd2b2902f2e0c40526e893ccf5f7775
      bc2a49f2
  24. Jul 30, 2015
    • Jeff Vander Stoep's avatar
      Temporarily downgrade to policy version number · 89765083
      Jeff Vander Stoep authored
      Temporarily move from policy version 30 to 29 until device kernels
      and prebuilts are all upgraded to the accepted upstream version of
      the selinux ioctl command whitelisting code.
      
      Bug: 22846070
      
      Change-Id: I31d1e80aaee164cf41a2f01c6ca846a000898ef4
      89765083
  25. Jul 24, 2015
  26. Jul 17, 2015
    • Colin Cross's avatar
      Use build fingerprint from file · 29a463d5
      Colin Cross authored
      Improve incremental ninja builds by keeping the command line the same
      across builds.
      
      Change-Id: Iedbaa40c9f816f91afc8f073a9ed7f9ffd5d9a53
      29a463d5
  27. Jul 16, 2015
  28. Jul 10, 2015
  29. Jul 07, 2015
  30. Jun 30, 2015
Loading