Skip to content
Snippets Groups Projects
  1. Mar 13, 2015
    • Stephen Smalley's avatar
      sepolicy: Drop BOARD_SEPOLICY_IGNORE/REPLACE support. · b4f17069
      Stephen Smalley authored
      With changes I431c1ab22fc53749f623937154b9ec43469d9645 and
      Ia54aa263f2245c7090f4b9d9703130c19f11bd28, it is no longer
      legitimate to use BOARD_SEPOLICY_IGNORE or REPLACE with
      any of the *_contexts files since the CTS requires the AOSP
      entries to be present in the device files.
      
      Further, these changes render BOARD_SEPOLICY_IGNORE unusable for
      most policy files since all domains and types referenced within any
      of the AOSP *_contexts entries must be defined in the kernel policy, so
      you cannot use BOARD_SEPOLICY_IGNORE to exclude any .te file
      that defines a type referenced in any of those *_contexts files.
      There does not seem to be a significant need for such a facility,
      as AOSP policy is small and only domains and types used by most
      devices should be defined in external/sepolicy.
      
      BOARD_SEPOLICY_REPLACE is commonly misused to eliminate neverallow rules
      from AOSP policy, which will only lead to CTS failures, especially
      since change Iefe508df265f62efa92f8eb74fc65542d39e3e74 introduced neverallow
      checking on the entire policy via sepolicy-analyze.  The only remaining
      legitimate function of BOARD_SEPOLICY_REPLACE is to support overriding
      AOSP .te files with more restrictive rule sets.  However, the need for this
      facility has been significantly reduced by the fact that AOSP policy
      is now fully confined + enforcing for all domains, and further restrictions
      beyond AOSP carry a compatibility risk.
      
      Builders of custom policies and custom ROMs still have the freedom to
      apply patches on top of external/sepolicy to tighten rule sets (which are
      likely more maintainable than maintaining a completely separate copy of
      the file via BOARD_SEPOLICY_REPLACE) and/or of using their own separate
      policy build system as exemplified by
      https://bitbucket.org/quarksecurity/build-policies
      
      
      
      Change-Id: I2611e983f7cbfa15f9d45ec3ea301e94132b06fa
      Signed-off-by: default avatarStephen Smalley <sds@tycho.nsa.gov>
      b4f17069
  2. Feb 23, 2015
  3. Jul 22, 2014
  4. Feb 03, 2014
    • Robert Craig's avatar
      Update README. · 9dbd005a
      Robert Craig authored
      
      Commit Icc5febc5fe5a7cccb90ac5b83e6289c2aa5bf069
      introduced a new error check for non existent
      BOARD_SEPOLICY_UNION files. Need an update to
      the docs describing the change.
      
      Change-Id: If96c9046565b05e0811ab2d526ae12a3b8b90bf0
      Signed-off-by: default avatarrpcraig <rpcraig@tycho.ncsc.mil>
      9dbd005a
  5. Nov 01, 2013
    • Nick Kralevich's avatar
      README: recommend concatenation vs assignment · 7316b18a
      Nick Kralevich authored
      Recommend using concatenation versus assignment when making
      policy declarations inside BoardConfig.mk. This will allow
      sepolicy to exist in the vendor directory.
      
      Change-Id: If982217fcb3645d9c6b37a341755b5b65f26fc5f
      7316b18a
  6. Oct 30, 2013
    • William Roberts's avatar
      readme: add info on generating pem files from apks · 9793a452
      William Roberts authored
      Often times OEMs and other integrators will need to create PEM
      files from presigned APKs they are integrating. This patch will
      update the README to include a technique for doing so.
      
      Change-Id: Ica52269542409d2038cfe30cbd5f28ead2fba4de
      9793a452
  7. Oct 29, 2013
    • William Roberts's avatar
      README: Add quip on keys.conf supporting env vars · fd22922d
      William Roberts authored
      Since Change-Id: If4f169d9ed4f37b6ebd062508de058f3baeafead
      the insert_keys.py tool has had support for expanding
      environment variable strings. This change addresses the lack
      of an updated README covering said change.
      
      Change-Id: I88e81ea58fb84110da3fc3cfb8b49fd0d6c027c2
      fd22922d
  8. Mar 27, 2013
  9. Mar 26, 2013
  10. Mar 21, 2013
  11. Mar 19, 2013
  12. Dec 08, 2012
  13. Nov 27, 2012
    • William Roberts's avatar
      README for configuration of selinux policy · 3f1ed6ec
      William Roberts authored
      This README intends to document the various configuration options
      that exist for specifiying device specific additions to the policy.
      
      Change-Id: I7db708429a67deeb89b0c155a116606dcbbbc975
      3f1ed6ec
Loading