2018-03-22 19:35:02 +01:00
|
|
|
// Copyright (C) 2018 The Android Open Source Project
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2021-02-04 08:07:40 +01:00
|
|
|
package {
|
|
|
|
default_applicable_licenses: ["system_sepolicy_license"],
|
|
|
|
}
|
|
|
|
|
|
|
|
// Added automatically by a large-scale-change that took the approach of
|
|
|
|
// 'apply every license found to every target'. While this makes sure we respect
|
|
|
|
// every license restriction, it may not be entirely correct.
|
|
|
|
//
|
|
|
|
// e.g. GPL in an MIT project might only apply to the contrib/ directory.
|
|
|
|
//
|
|
|
|
// Please consider splitting the single license below into multiple licenses,
|
|
|
|
// taking care not to lose any license_kind information, and overriding the
|
|
|
|
// default license using the 'licenses: [...]' property on targets as needed.
|
|
|
|
//
|
|
|
|
// For unused files, consider creating a 'filegroup' with "//visibility:private"
|
|
|
|
// to attach the license to, and including a comment whether the files may be
|
|
|
|
// used in the current project.
|
|
|
|
// http://go/android-license-faq
|
|
|
|
license {
|
|
|
|
name: "system_sepolicy_license",
|
|
|
|
visibility: [":__subpackages__"],
|
|
|
|
license_kinds: [
|
|
|
|
"SPDX-license-identifier-Apache-2.0",
|
|
|
|
"legacy_unencumbered",
|
|
|
|
],
|
|
|
|
license_text: [
|
|
|
|
"NOTICE",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2019-02-15 21:18:15 +01:00
|
|
|
cc_defaults { name: "selinux_policy_version", cflags: ["-DSEPOLICY_VERSION=30"], }
|
|
|
|
|
2018-03-26 05:03:58 +02:00
|
|
|
se_filegroup {
|
|
|
|
name: "26.0.board.compat.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/26.0/26.0.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
|
|
|
se_filegroup {
|
|
|
|
name: "27.0.board.compat.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/27.0/27.0.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2018-07-11 11:30:44 +02:00
|
|
|
se_filegroup {
|
|
|
|
name: "28.0.board.compat.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/28.0/28.0.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2019-06-02 02:04:13 +02:00
|
|
|
se_filegroup {
|
|
|
|
name: "29.0.board.compat.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/29.0/29.0.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2020-05-07 13:19:05 +02:00
|
|
|
se_filegroup {
|
|
|
|
name: "30.0.board.compat.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/30.0/30.0.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2019-03-05 10:20:54 +01:00
|
|
|
se_filegroup {
|
|
|
|
name: "26.0.board.ignore.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/26.0/26.0.ignore.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
|
|
|
se_filegroup {
|
|
|
|
name: "27.0.board.ignore.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/27.0/27.0.ignore.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
|
|
|
se_filegroup {
|
|
|
|
name: "28.0.board.ignore.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/28.0/28.0.ignore.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2019-06-02 02:04:13 +02:00
|
|
|
se_filegroup {
|
|
|
|
name: "29.0.board.ignore.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/29.0/29.0.ignore.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2020-05-07 13:19:05 +02:00
|
|
|
se_filegroup {
|
|
|
|
name: "30.0.board.ignore.map",
|
|
|
|
srcs: [
|
|
|
|
"compat/30.0/30.0.ignore.cil",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2018-03-22 19:35:02 +01:00
|
|
|
se_cil_compat_map {
|
2019-10-11 01:29:40 +02:00
|
|
|
name: "plat_26.0.cil",
|
|
|
|
stem: "26.0.cil",
|
2018-09-30 02:47:10 +02:00
|
|
|
bottom_half: [":26.0.board.compat.map"],
|
2019-10-11 01:29:40 +02:00
|
|
|
top_half: "plat_27.0.cil",
|
2018-03-22 19:35:02 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
2019-10-11 01:29:40 +02:00
|
|
|
name: "plat_27.0.cil",
|
|
|
|
stem: "27.0.cil",
|
2018-09-30 02:47:10 +02:00
|
|
|
bottom_half: [":27.0.board.compat.map"],
|
2019-10-11 01:29:40 +02:00
|
|
|
top_half: "plat_28.0.cil",
|
2018-03-22 19:35:02 +01:00
|
|
|
}
|
2018-07-11 11:30:44 +02:00
|
|
|
|
|
|
|
se_cil_compat_map {
|
2019-10-11 01:29:40 +02:00
|
|
|
name: "plat_28.0.cil",
|
|
|
|
stem: "28.0.cil",
|
2018-09-30 02:47:10 +02:00
|
|
|
bottom_half: [":28.0.board.compat.map"],
|
2019-10-11 01:29:40 +02:00
|
|
|
top_half: "plat_29.0.cil",
|
2019-06-02 02:04:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
2019-10-11 01:29:40 +02:00
|
|
|
name: "plat_29.0.cil",
|
|
|
|
stem: "29.0.cil",
|
2019-06-02 02:04:13 +02:00
|
|
|
bottom_half: [":29.0.board.compat.map"],
|
2020-05-07 13:19:05 +02:00
|
|
|
top_half: "plat_30.0.cil",
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "plat_30.0.cil",
|
|
|
|
stem: "30.0.cil",
|
|
|
|
bottom_half: [":30.0.board.compat.map"],
|
|
|
|
// top_half: "plat_31.0.cil",
|
2019-10-11 01:29:40 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "system_ext_26.0.cil",
|
|
|
|
stem: "26.0.cil",
|
|
|
|
bottom_half: [":26.0.board.compat.map"],
|
|
|
|
top_half: "system_ext_27.0.cil",
|
|
|
|
system_ext_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "system_ext_27.0.cil",
|
|
|
|
stem: "27.0.cil",
|
|
|
|
bottom_half: [":27.0.board.compat.map"],
|
|
|
|
top_half: "system_ext_28.0.cil",
|
|
|
|
system_ext_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "system_ext_28.0.cil",
|
|
|
|
stem: "28.0.cil",
|
|
|
|
bottom_half: [":28.0.board.compat.map"],
|
|
|
|
top_half: "system_ext_29.0.cil",
|
|
|
|
system_ext_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "system_ext_29.0.cil",
|
|
|
|
stem: "29.0.cil",
|
|
|
|
bottom_half: [":29.0.board.compat.map"],
|
2020-05-07 13:19:05 +02:00
|
|
|
top_half: "system_ext_30.0.cil",
|
|
|
|
system_ext_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "system_ext_30.0.cil",
|
|
|
|
stem: "30.0.cil",
|
|
|
|
bottom_half: [":30.0.board.compat.map"],
|
|
|
|
// top_half: "system_ext_31.0.cil",
|
2019-10-11 01:29:40 +02:00
|
|
|
system_ext_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "product_26.0.cil",
|
|
|
|
stem: "26.0.cil",
|
|
|
|
bottom_half: [":26.0.board.compat.map"],
|
|
|
|
top_half: "product_27.0.cil",
|
|
|
|
product_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "product_27.0.cil",
|
|
|
|
stem: "27.0.cil",
|
|
|
|
bottom_half: [":27.0.board.compat.map"],
|
|
|
|
top_half: "product_28.0.cil",
|
|
|
|
product_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "product_28.0.cil",
|
|
|
|
stem: "28.0.cil",
|
|
|
|
bottom_half: [":28.0.board.compat.map"],
|
|
|
|
top_half: "product_29.0.cil",
|
|
|
|
product_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "product_29.0.cil",
|
|
|
|
stem: "29.0.cil",
|
|
|
|
bottom_half: [":29.0.board.compat.map"],
|
2020-05-07 13:19:05 +02:00
|
|
|
top_half: "product_30.0.cil",
|
|
|
|
product_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "product_30.0.cil",
|
|
|
|
stem: "30.0.cil",
|
|
|
|
bottom_half: [":30.0.board.compat.map"],
|
|
|
|
// top_half: "product_31.0.cil",
|
2019-10-11 01:29:40 +02:00
|
|
|
product_specific: true,
|
2018-09-30 02:47:10 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "26.0.ignore.cil",
|
2019-03-05 10:20:54 +01:00
|
|
|
bottom_half: [":26.0.board.ignore.map"],
|
2018-09-30 02:47:10 +02:00
|
|
|
top_half: "27.0.ignore.cil",
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "27.0.ignore.cil",
|
2019-03-05 10:20:54 +01:00
|
|
|
bottom_half: [":27.0.board.ignore.map"],
|
2018-09-30 02:47:10 +02:00
|
|
|
top_half: "28.0.ignore.cil",
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "28.0.ignore.cil",
|
2019-03-05 10:20:54 +01:00
|
|
|
bottom_half: [":28.0.board.ignore.map"],
|
2019-06-13 00:52:30 +02:00
|
|
|
top_half: "29.0.ignore.cil",
|
2018-07-11 11:30:44 +02:00
|
|
|
}
|
Build contexts files with Soong
This is to migrate sepolicy Makefiles into Soong. For the first part,
file_contexts, hwservice_contexts, property_contexts, and
service_contexts are migrated. Build-time tests for contexts files are
still in Makefile; they will also be done with Soong after porting the
module sepolicy.
The motivation of migrating is based on generating property_contexts
dynamically: if we were to amend contexts files at build time in the
future, it would be nicer to manage them in Soong. To do that, building
contexts files with Soong can be very helpful.
Bug: 127949646
Bug: 129377144
Test: 1) Build blueline-userdebug, flash, and boot.
Test: 2) Build blueline-userdebug with TARGET_FLATTEN_APEX=true, flash,
and boot.
Test: 3) Build aosp_arm-userdebug.
Change-Id: I576f6f20686f6f2121204f76657274696d652121
2019-04-15 13:10:46 +02:00
|
|
|
|
2019-06-02 02:04:13 +02:00
|
|
|
se_cil_compat_map {
|
|
|
|
name: "29.0.ignore.cil",
|
|
|
|
bottom_half: [":29.0.board.ignore.map"],
|
2020-05-07 13:19:05 +02:00
|
|
|
top_half: "30.0.ignore.cil",
|
|
|
|
}
|
|
|
|
|
|
|
|
se_cil_compat_map {
|
|
|
|
name: "30.0.ignore.cil",
|
|
|
|
bottom_half: [":30.0.board.ignore.map"],
|
|
|
|
// top_half: "31.0.ignore.cil",
|
2019-06-02 02:04:13 +02:00
|
|
|
}
|
|
|
|
|
2019-05-02 22:48:44 +02:00
|
|
|
prebuilt_etc {
|
2019-06-02 02:04:13 +02:00
|
|
|
name: "26.0.compat.cil",
|
|
|
|
src: "private/compat/26.0/26.0.compat.cil",
|
2019-05-02 22:48:44 +02:00
|
|
|
sub_dir: "selinux/mapping",
|
|
|
|
}
|
|
|
|
|
|
|
|
prebuilt_etc {
|
|
|
|
name: "27.0.compat.cil",
|
|
|
|
src: "private/compat/27.0/27.0.compat.cil",
|
|
|
|
sub_dir: "selinux/mapping",
|
|
|
|
}
|
|
|
|
|
|
|
|
prebuilt_etc {
|
2019-06-02 02:04:13 +02:00
|
|
|
name: "28.0.compat.cil",
|
|
|
|
src: "private/compat/28.0/28.0.compat.cil",
|
|
|
|
sub_dir: "selinux/mapping",
|
|
|
|
}
|
|
|
|
|
|
|
|
prebuilt_etc {
|
|
|
|
name: "29.0.compat.cil",
|
|
|
|
src: "private/compat/29.0/29.0.compat.cil",
|
2019-05-02 22:48:44 +02:00
|
|
|
sub_dir: "selinux/mapping",
|
|
|
|
}
|
|
|
|
|
2020-05-07 13:19:05 +02:00
|
|
|
prebuilt_etc {
|
|
|
|
name: "30.0.compat.cil",
|
|
|
|
src: "private/compat/30.0/30.0.compat.cil",
|
|
|
|
sub_dir: "selinux/mapping",
|
|
|
|
}
|
|
|
|
|
Build contexts files with Soong
This is to migrate sepolicy Makefiles into Soong. For the first part,
file_contexts, hwservice_contexts, property_contexts, and
service_contexts are migrated. Build-time tests for contexts files are
still in Makefile; they will also be done with Soong after porting the
module sepolicy.
The motivation of migrating is based on generating property_contexts
dynamically: if we were to amend contexts files at build time in the
future, it would be nicer to manage them in Soong. To do that, building
contexts files with Soong can be very helpful.
Bug: 127949646
Bug: 129377144
Test: 1) Build blueline-userdebug, flash, and boot.
Test: 2) Build blueline-userdebug with TARGET_FLATTEN_APEX=true, flash,
and boot.
Test: 3) Build aosp_arm-userdebug.
Change-Id: I576f6f20686f6f2121204f76657274696d652121
2019-04-15 13:10:46 +02:00
|
|
|
se_filegroup {
|
|
|
|
name: "file_contexts_files",
|
|
|
|
srcs: ["file_contexts"],
|
|
|
|
}
|
|
|
|
|
|
|
|
se_filegroup {
|
|
|
|
name: "file_contexts_asan_files",
|
|
|
|
srcs: ["file_contexts_asan"],
|
|
|
|
}
|
|
|
|
|
|
|
|
se_filegroup {
|
|
|
|
name: "file_contexts_overlayfs_files",
|
|
|
|
srcs: ["file_contexts_overlayfs"],
|
|
|
|
}
|
|
|
|
|
|
|
|
se_filegroup {
|
|
|
|
name: "hwservice_contexts_files",
|
|
|
|
srcs: ["hwservice_contexts"],
|
|
|
|
}
|
|
|
|
|
|
|
|
se_filegroup {
|
|
|
|
name: "property_contexts_files",
|
|
|
|
srcs: ["property_contexts"],
|
|
|
|
}
|
|
|
|
|
|
|
|
se_filegroup {
|
|
|
|
name: "service_contexts_files",
|
|
|
|
srcs: ["service_contexts"],
|
|
|
|
}
|
|
|
|
|
2020-07-25 22:02:29 +02:00
|
|
|
se_filegroup {
|
|
|
|
name: "keystore2_key_contexts_files",
|
|
|
|
srcs: ["keystore2_key_contexts"],
|
|
|
|
}
|
|
|
|
|
Build contexts files with Soong
This is to migrate sepolicy Makefiles into Soong. For the first part,
file_contexts, hwservice_contexts, property_contexts, and
service_contexts are migrated. Build-time tests for contexts files are
still in Makefile; they will also be done with Soong after porting the
module sepolicy.
The motivation of migrating is based on generating property_contexts
dynamically: if we were to amend contexts files at build time in the
future, it would be nicer to manage them in Soong. To do that, building
contexts files with Soong can be very helpful.
Bug: 127949646
Bug: 129377144
Test: 1) Build blueline-userdebug, flash, and boot.
Test: 2) Build blueline-userdebug with TARGET_FLATTEN_APEX=true, flash,
and boot.
Test: 3) Build aosp_arm-userdebug.
Change-Id: I576f6f20686f6f2121204f76657274696d652121
2019-04-15 13:10:46 +02:00
|
|
|
file_contexts {
|
|
|
|
name: "plat_file_contexts",
|
|
|
|
srcs: [":file_contexts_files"],
|
|
|
|
product_variables: {
|
|
|
|
address_sanitize: {
|
|
|
|
srcs: [":file_contexts_asan_files"],
|
|
|
|
},
|
|
|
|
debuggable: {
|
|
|
|
srcs: [":file_contexts_overlayfs_files"],
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
flatten_apex: {
|
|
|
|
srcs: ["apex/*-file_contexts"],
|
|
|
|
},
|
|
|
|
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
file_contexts {
|
|
|
|
name: "vendor_file_contexts",
|
|
|
|
srcs: [":file_contexts_files"],
|
|
|
|
soc_specific: true,
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
2019-09-09 16:04:06 +02:00
|
|
|
file_contexts {
|
|
|
|
name: "system_ext_file_contexts",
|
|
|
|
srcs: [":file_contexts_files"],
|
|
|
|
system_ext_specific: true,
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
Build contexts files with Soong
This is to migrate sepolicy Makefiles into Soong. For the first part,
file_contexts, hwservice_contexts, property_contexts, and
service_contexts are migrated. Build-time tests for contexts files are
still in Makefile; they will also be done with Soong after porting the
module sepolicy.
The motivation of migrating is based on generating property_contexts
dynamically: if we were to amend contexts files at build time in the
future, it would be nicer to manage them in Soong. To do that, building
contexts files with Soong can be very helpful.
Bug: 127949646
Bug: 129377144
Test: 1) Build blueline-userdebug, flash, and boot.
Test: 2) Build blueline-userdebug with TARGET_FLATTEN_APEX=true, flash,
and boot.
Test: 3) Build aosp_arm-userdebug.
Change-Id: I576f6f20686f6f2121204f76657274696d652121
2019-04-15 13:10:46 +02:00
|
|
|
file_contexts {
|
|
|
|
name: "product_file_contexts",
|
|
|
|
srcs: [":file_contexts_files"],
|
|
|
|
product_specific: true,
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
file_contexts {
|
|
|
|
name: "odm_file_contexts",
|
|
|
|
srcs: [":file_contexts_files"],
|
|
|
|
device_specific: true,
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
hwservice_contexts {
|
|
|
|
name: "plat_hwservice_contexts",
|
|
|
|
srcs: [":hwservice_contexts_files"],
|
|
|
|
}
|
|
|
|
|
2019-09-09 16:05:10 +02:00
|
|
|
hwservice_contexts {
|
|
|
|
name: "system_ext_hwservice_contexts",
|
|
|
|
srcs: [":hwservice_contexts_files"],
|
|
|
|
system_ext_specific: true,
|
|
|
|
}
|
|
|
|
|
Build contexts files with Soong
This is to migrate sepolicy Makefiles into Soong. For the first part,
file_contexts, hwservice_contexts, property_contexts, and
service_contexts are migrated. Build-time tests for contexts files are
still in Makefile; they will also be done with Soong after porting the
module sepolicy.
The motivation of migrating is based on generating property_contexts
dynamically: if we were to amend contexts files at build time in the
future, it would be nicer to manage them in Soong. To do that, building
contexts files with Soong can be very helpful.
Bug: 127949646
Bug: 129377144
Test: 1) Build blueline-userdebug, flash, and boot.
Test: 2) Build blueline-userdebug with TARGET_FLATTEN_APEX=true, flash,
and boot.
Test: 3) Build aosp_arm-userdebug.
Change-Id: I576f6f20686f6f2121204f76657274696d652121
2019-04-15 13:10:46 +02:00
|
|
|
hwservice_contexts {
|
|
|
|
name: "product_hwservice_contexts",
|
|
|
|
srcs: [":hwservice_contexts_files"],
|
|
|
|
product_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
hwservice_contexts {
|
|
|
|
name: "vendor_hwservice_contexts",
|
|
|
|
srcs: [":hwservice_contexts_files"],
|
|
|
|
reqd_mask: true,
|
|
|
|
soc_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
hwservice_contexts {
|
|
|
|
name: "odm_hwservice_contexts",
|
|
|
|
srcs: [":hwservice_contexts_files"],
|
|
|
|
device_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
property_contexts {
|
|
|
|
name: "plat_property_contexts",
|
|
|
|
srcs: [":property_contexts_files"],
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
2019-09-09 12:09:22 +02:00
|
|
|
property_contexts {
|
|
|
|
name: "system_ext_property_contexts",
|
|
|
|
srcs: [":property_contexts_files"],
|
|
|
|
system_ext_specific: true,
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
Build contexts files with Soong
This is to migrate sepolicy Makefiles into Soong. For the first part,
file_contexts, hwservice_contexts, property_contexts, and
service_contexts are migrated. Build-time tests for contexts files are
still in Makefile; they will also be done with Soong after porting the
module sepolicy.
The motivation of migrating is based on generating property_contexts
dynamically: if we were to amend contexts files at build time in the
future, it would be nicer to manage them in Soong. To do that, building
contexts files with Soong can be very helpful.
Bug: 127949646
Bug: 129377144
Test: 1) Build blueline-userdebug, flash, and boot.
Test: 2) Build blueline-userdebug with TARGET_FLATTEN_APEX=true, flash,
and boot.
Test: 3) Build aosp_arm-userdebug.
Change-Id: I576f6f20686f6f2121204f76657274696d652121
2019-04-15 13:10:46 +02:00
|
|
|
property_contexts {
|
|
|
|
name: "product_property_contexts",
|
|
|
|
srcs: [":property_contexts_files"],
|
|
|
|
product_specific: true,
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
property_contexts {
|
|
|
|
name: "vendor_property_contexts",
|
|
|
|
srcs: [":property_contexts_files"],
|
|
|
|
reqd_mask: true,
|
|
|
|
soc_specific: true,
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
property_contexts {
|
|
|
|
name: "odm_property_contexts",
|
|
|
|
srcs: [":property_contexts_files"],
|
|
|
|
device_specific: true,
|
|
|
|
recovery_available: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
service_contexts {
|
|
|
|
name: "plat_service_contexts",
|
|
|
|
srcs: [":service_contexts_files"],
|
|
|
|
}
|
|
|
|
|
2019-09-09 16:05:29 +02:00
|
|
|
service_contexts {
|
|
|
|
name: "system_ext_service_contexts",
|
|
|
|
srcs: [":service_contexts_files"],
|
|
|
|
system_ext_specific: true,
|
|
|
|
}
|
|
|
|
|
Build contexts files with Soong
This is to migrate sepolicy Makefiles into Soong. For the first part,
file_contexts, hwservice_contexts, property_contexts, and
service_contexts are migrated. Build-time tests for contexts files are
still in Makefile; they will also be done with Soong after porting the
module sepolicy.
The motivation of migrating is based on generating property_contexts
dynamically: if we were to amend contexts files at build time in the
future, it would be nicer to manage them in Soong. To do that, building
contexts files with Soong can be very helpful.
Bug: 127949646
Bug: 129377144
Test: 1) Build blueline-userdebug, flash, and boot.
Test: 2) Build blueline-userdebug with TARGET_FLATTEN_APEX=true, flash,
and boot.
Test: 3) Build aosp_arm-userdebug.
Change-Id: I576f6f20686f6f2121204f76657274696d652121
2019-04-15 13:10:46 +02:00
|
|
|
service_contexts {
|
|
|
|
name: "product_service_contexts",
|
|
|
|
srcs: [":service_contexts_files"],
|
|
|
|
product_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
service_contexts {
|
|
|
|
name: "vendor_service_contexts",
|
|
|
|
srcs: [":service_contexts_files"],
|
|
|
|
reqd_mask: true,
|
|
|
|
soc_specific: true,
|
|
|
|
}
|
2020-04-15 07:55:47 +02:00
|
|
|
|
2020-07-25 22:02:29 +02:00
|
|
|
keystore2_key_contexts {
|
|
|
|
name: "plat_keystore2_key_contexts",
|
|
|
|
srcs: [":keystore2_key_contexts_files"],
|
|
|
|
}
|
|
|
|
|
|
|
|
keystore2_key_contexts {
|
|
|
|
name: "system_keystore2_key_contexts",
|
|
|
|
srcs: [":keystore2_key_contexts_files"],
|
|
|
|
system_ext_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
keystore2_key_contexts {
|
|
|
|
name: "product_keystore2_key_contexts",
|
|
|
|
srcs: [":keystore2_key_contexts_files"],
|
|
|
|
product_specific: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
keystore2_key_contexts {
|
|
|
|
name: "vendor_keystore2_key_contexts",
|
|
|
|
srcs: [":keystore2_key_contexts_files"],
|
|
|
|
reqd_mask: true,
|
|
|
|
soc_specific: true,
|
|
|
|
}
|
|
|
|
|
2020-04-15 07:55:47 +02:00
|
|
|
// For vts_treble_sys_prop_test
|
|
|
|
filegroup {
|
|
|
|
name: "private_property_contexts",
|
|
|
|
srcs: ["private/property_contexts"],
|
|
|
|
visibility: [
|
|
|
|
"//test/vts-testcase/security/system_property",
|
|
|
|
],
|
|
|
|
}
|
2021-02-18 11:15:41 +01:00
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
se_build_files {
|
|
|
|
name: "se_build_files",
|
2021-02-18 11:15:41 +01:00
|
|
|
srcs: [
|
2021-03-22 02:26:13 +01:00
|
|
|
"security_classes",
|
|
|
|
"initial_sids",
|
|
|
|
"access_vectors",
|
|
|
|
"global_macros",
|
|
|
|
"neverallow_macros",
|
|
|
|
"mls_macros",
|
|
|
|
"mls_decl",
|
|
|
|
"mls",
|
|
|
|
"policy_capabilities",
|
|
|
|
"te_macros",
|
|
|
|
"attributes",
|
|
|
|
"ioctl_defines",
|
|
|
|
"ioctl_macros",
|
|
|
|
"*.te",
|
|
|
|
"roles_decl",
|
|
|
|
"roles",
|
|
|
|
"users",
|
|
|
|
"initial_sid_contexts",
|
|
|
|
"fs_use",
|
|
|
|
"genfs_contexts",
|
|
|
|
"port_contexts",
|
2021-02-18 11:15:41 +01:00
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
// reqd_policy_mask - a policy.conf file which contains only the bare minimum
|
|
|
|
// policy necessary to use checkpolicy.
|
|
|
|
//
|
|
|
|
// This bare-minimum policy needs to be present in all policy.conf files, but
|
|
|
|
// should not necessarily be exported as part of the public policy.
|
|
|
|
//
|
|
|
|
// The rules generated by reqd_policy_mask will allow the compilation of public
|
|
|
|
// policy and subsequent removal of CIL policy that should not be exported.
|
|
|
|
se_policy_conf {
|
|
|
|
name: "reqd_policy_mask.conf",
|
|
|
|
srcs: [":se_build_files{.reqd_mask}"],
|
|
|
|
installable: false,
|
2021-03-17 11:07:15 +01:00
|
|
|
}
|
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
se_policy_cil {
|
|
|
|
name: "reqd_policy_mask.cil",
|
|
|
|
src: ":reqd_policy_mask.conf",
|
|
|
|
secilc_check: false,
|
|
|
|
installable: false,
|
2021-03-17 11:07:15 +01:00
|
|
|
}
|
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
// pub_policy - policy that will be exported to be a part of non-platform
|
|
|
|
// policy corresponding to this platform version.
|
|
|
|
//
|
|
|
|
// This is a limited subset of policy that would not compile in checkpolicy on
|
|
|
|
// its own.
|
|
|
|
//
|
|
|
|
// To get around this limitation, add only the required files from private
|
|
|
|
// policy, which will generate CIL policy that will then be filtered out by the
|
|
|
|
// reqd_policy_mask.
|
|
|
|
//
|
|
|
|
// There are three pub_policy.cil files below:
|
|
|
|
// - pub_policy.cil: exported 'product', 'system_ext' and 'system' policy.
|
|
|
|
// - system_ext_pub_policy.cil: exported 'system_ext' and 'system' policy.
|
|
|
|
// - plat_pub_policy.cil: exported 'system' policy.
|
|
|
|
//
|
|
|
|
// Those above files will in turn be used to generate the following versioned cil files:
|
|
|
|
// - product_mapping_file: the versioned, exported 'product' policy in product partition.
|
|
|
|
// - system_ext_mapping_file: the versioned, exported 'system_ext' policy in system_ext partition.
|
|
|
|
// - plat_mapping_file: the versioned, exported 'system' policy in system partition.
|
|
|
|
// - plat_pub_versioned.cil: the versioned, exported 'product', 'system_ext' and 'system' policy
|
|
|
|
// in vendor partition.
|
|
|
|
//
|
|
|
|
se_policy_conf {
|
|
|
|
name: "pub_policy.conf",
|
|
|
|
srcs: [":se_build_files{.product_public}"], // product_ includes system and system_ext
|
|
|
|
installable: false,
|
|
|
|
}
|
2021-03-17 11:07:15 +01:00
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
se_policy_cil {
|
|
|
|
name: "pub_policy.cil",
|
|
|
|
src: ":pub_policy.conf",
|
|
|
|
filter_out: [":reqd_policy_mask.cil"],
|
|
|
|
secilc_check: false,
|
|
|
|
installable: false,
|
2021-03-17 11:07:15 +01:00
|
|
|
}
|
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
se_policy_conf {
|
|
|
|
name: "system_ext_pub_policy.conf",
|
|
|
|
srcs: [":se_build_files{.system_ext_public}"], // system_ext_public includes system
|
2021-03-17 11:07:15 +01:00
|
|
|
installable: false,
|
2021-02-18 11:15:41 +01:00
|
|
|
}
|
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
se_policy_cil {
|
|
|
|
name: "system_ext_pub_policy.cil",
|
|
|
|
src: ":system_ext_pub_policy.conf",
|
|
|
|
filter_out: [":reqd_policy_mask.cil"],
|
|
|
|
secilc_check: false,
|
|
|
|
installable: false,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_policy_conf {
|
|
|
|
name: "plat_pub_policy.conf",
|
|
|
|
srcs: [":se_build_files{.plat_public}"],
|
|
|
|
installable: false,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_policy_cil {
|
|
|
|
name: "plat_pub_policy.cil",
|
|
|
|
src: ":plat_pub_policy.conf",
|
|
|
|
filter_out: [":reqd_policy_mask.cil"],
|
|
|
|
secilc_check: false,
|
|
|
|
installable: false,
|
|
|
|
}
|
|
|
|
|
|
|
|
// plat_policy.conf - A combination of the private and public platform policy
|
|
|
|
// which will ship with the device.
|
|
|
|
//
|
|
|
|
// The platform will always reflect the most recent platform version and is not
|
|
|
|
// currently being attributized.
|
|
|
|
se_policy_conf {
|
|
|
|
name: "plat_sepolicy.conf",
|
|
|
|
srcs: [":se_build_files{.plat}"],
|
|
|
|
installable: false,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_policy_cil {
|
|
|
|
name: "plat_sepolicy.cil",
|
|
|
|
src: ":plat_sepolicy.conf",
|
|
|
|
additional_cil_files: ["private/technical_debt.cil"],
|
|
|
|
}
|
|
|
|
|
|
|
|
// system_ext_policy.conf - A combination of the private and public system_ext
|
|
|
|
// policy which will ship with the device. System_ext policy is not attributized
|
|
|
|
se_policy_conf {
|
|
|
|
name: "system_ext_sepolicy.conf",
|
|
|
|
srcs: [":se_build_files{.system_ext}"],
|
|
|
|
installable: false,
|
2021-03-17 11:07:15 +01:00
|
|
|
}
|
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
se_policy_cil {
|
|
|
|
name: "system_ext_sepolicy.cil",
|
|
|
|
src: ":system_ext_sepolicy.conf",
|
|
|
|
system_ext_specific: true,
|
|
|
|
filter_out: [":plat_sepolicy.cil"],
|
|
|
|
remove_line_marker: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
// product_policy.conf - A combination of the private and public product policy
|
|
|
|
// which will ship with the device. Product policy is not attributized
|
|
|
|
se_policy_conf {
|
|
|
|
name: "product_sepolicy.conf",
|
|
|
|
srcs: [":se_build_files{.product}"],
|
|
|
|
installable: false,
|
|
|
|
}
|
|
|
|
|
|
|
|
se_policy_cil {
|
|
|
|
name: "product_sepolicy.cil",
|
|
|
|
src: ":product_sepolicy.conf",
|
|
|
|
product_specific: true,
|
|
|
|
filter_out: [":plat_sepolicy.cil", ":system_ext_sepolicy.cil"],
|
|
|
|
remove_line_marker: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
//////////////////////////////////
|
|
|
|
// SELinux policy embedded into CTS.
|
|
|
|
// CTS checks neverallow rules of this policy against the policy of the device under test.
|
|
|
|
//////////////////////////////////
|
|
|
|
se_policy_conf {
|
|
|
|
name: "general_sepolicy.conf",
|
|
|
|
srcs: [":se_build_files{.plat}"],
|
|
|
|
build_variant: "user",
|
|
|
|
cts: true,
|
|
|
|
exclude_build_test: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
//////////////////////////////////
|
|
|
|
// modules for microdroid
|
2021-03-24 09:10:15 +01:00
|
|
|
// TODO(b/33691272): migrate Android.mk to Android.bp and remove workarounds
|
2021-03-22 02:26:13 +01:00
|
|
|
//////////////////////////////////
|
2021-02-18 11:15:41 +01:00
|
|
|
genrule {
|
|
|
|
name: "microdroid_plat_mapping_file_gen",
|
2021-03-22 02:26:13 +01:00
|
|
|
srcs: [":plat_pub_policy.cil"],
|
|
|
|
tools: ["version_policy"],
|
2021-02-18 11:15:41 +01:00
|
|
|
out: ["10000.0.cil"],
|
2021-03-22 02:26:13 +01:00
|
|
|
cmd: "$(location version_policy) -b $(location :plat_pub_policy.cil) -m -n 10000.0 -o $(out)",
|
2021-02-18 11:15:41 +01:00
|
|
|
visibility: ["//visibility:private"],
|
|
|
|
}
|
|
|
|
|
|
|
|
prebuilt_etc {
|
|
|
|
name: "microdroid_plat_mapping_file",
|
|
|
|
src: ":microdroid_plat_mapping_file_gen",
|
|
|
|
filename: "10000.0.cil",
|
|
|
|
relative_install_path: "selinux/mapping",
|
|
|
|
installable: false,
|
|
|
|
}
|
2021-03-03 15:56:43 +01:00
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
// Normally plat_pub_versioned.cil is built from pub_policy.cil (including system_ext and product).
|
|
|
|
// But microdroid only has system, so its plat_pub_versioned.cil uses plat_pub_policy.cil.
|
2021-03-03 15:56:43 +01:00
|
|
|
genrule {
|
|
|
|
name: "microdroid_plat_pub_versioned.cil_gen",
|
2021-03-22 02:26:13 +01:00
|
|
|
srcs: [":plat_pub_policy.cil"],
|
2021-03-03 15:56:43 +01:00
|
|
|
tools: ["version_policy"],
|
|
|
|
out: ["plat_pub_versioned.cil"],
|
|
|
|
cmd: "$(location version_policy) " +
|
2021-03-22 02:26:13 +01:00
|
|
|
"-b $(location :plat_pub_policy.cil) " +
|
|
|
|
"-t $(location :plat_pub_policy.cil) " +
|
2021-03-03 15:56:43 +01:00
|
|
|
"-n 10000.0 " +
|
|
|
|
"-o $(out)",
|
|
|
|
visibility: ["//visibility:private"],
|
|
|
|
}
|
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
prebuilt_etc {
|
|
|
|
name: "microdroid_plat_pub_versioned.cil",
|
|
|
|
src: ":microdroid_plat_pub_versioned.cil_gen",
|
|
|
|
filename: "plat_pub_versioned.cil",
|
|
|
|
relative_install_path: "selinux",
|
|
|
|
installable: false,
|
|
|
|
}
|
|
|
|
|
|
|
|
// policy files for microdroid vendor
|
|
|
|
// This contains a minimal set of policy files for microdroid vendor.
|
2021-03-24 09:10:15 +01:00
|
|
|
// TODO(b/33691272): update se_build_files to cover this
|
2021-03-03 15:56:43 +01:00
|
|
|
filegroup {
|
|
|
|
name: "microdroid_vendor_sepolicy_build_files",
|
|
|
|
srcs: [
|
|
|
|
"reqd_mask/security_classes",
|
|
|
|
"reqd_mask/initial_sids",
|
|
|
|
"reqd_mask/access_vectors",
|
|
|
|
"public/global_macros",
|
|
|
|
"public/neverallow_macros",
|
|
|
|
"reqd_mask/mls_macros",
|
|
|
|
"reqd_mask/mls_decl",
|
|
|
|
"reqd_mask/mls",
|
|
|
|
"public/te_macros",
|
|
|
|
"public/attributes",
|
|
|
|
"public/ioctl_defines",
|
|
|
|
"public/ioctl_macros",
|
|
|
|
"public/*.te",
|
|
|
|
"reqd_mask/*.te",
|
|
|
|
"vendor/*.te",
|
|
|
|
"reqd_mask/roles_decl",
|
|
|
|
"public/roles",
|
|
|
|
"reqd_mask/roles",
|
|
|
|
"reqd_mask/users",
|
|
|
|
"reqd_mask/initial_sid_contexts",
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
2021-03-22 02:26:13 +01:00
|
|
|
se_policy_conf {
|
|
|
|
name: "microdroid_vendor_sepolicy.conf",
|
|
|
|
srcs: [":microdroid_vendor_sepolicy_build_files"],
|
|
|
|
installable: false,
|
|
|
|
}
|
|
|
|
|
2021-03-03 15:56:43 +01:00
|
|
|
genrule {
|
|
|
|
name: "microdroid_vendor_sepolicy.cil_gen",
|
|
|
|
srcs: [
|
2021-03-22 02:26:13 +01:00
|
|
|
":microdroid_vendor_sepolicy.conf",
|
2021-03-03 15:56:43 +01:00
|
|
|
":microdroid_plat_pub_versioned.cil_gen",
|
2021-03-22 02:26:13 +01:00
|
|
|
":plat_pub_policy.cil",
|
|
|
|
":reqd_policy_mask.cil",
|
2021-03-03 15:56:43 +01:00
|
|
|
],
|
2021-03-03 15:36:42 +01:00
|
|
|
tools: [
|
|
|
|
"build_sepolicy",
|
|
|
|
"checkpolicy",
|
|
|
|
"secilc",
|
|
|
|
"version_policy",
|
|
|
|
],
|
2021-03-03 15:56:43 +01:00
|
|
|
out: ["vendor_sepolicy.cil"],
|
2021-03-22 02:26:13 +01:00
|
|
|
cmd: "$(location build_sepolicy) " +
|
2021-03-03 15:36:42 +01:00
|
|
|
"--android_host_path $$(dirname $(location build_sepolicy)) " +
|
2021-03-03 15:56:43 +01:00
|
|
|
"build_cil " +
|
2021-03-22 02:26:13 +01:00
|
|
|
"--input_policy_conf $(location :microdroid_vendor_sepolicy.conf) " +
|
2021-03-03 15:56:43 +01:00
|
|
|
"--checkpolicy_env ASAN_OPTIONS=detect_leaks=0 " +
|
2021-03-22 02:26:13 +01:00
|
|
|
"--base_policy $(location :plat_pub_policy.cil) " +
|
2021-03-03 15:56:43 +01:00
|
|
|
"--filter_out_files $(location :microdroid_plat_pub_versioned.cil_gen) " +
|
2021-03-22 02:26:13 +01:00
|
|
|
"--reqd_mask $(location :reqd_policy_mask.cil) " +
|
2021-03-03 15:56:43 +01:00
|
|
|
"--treble_sepolicy_vers 10000.0 " +
|
|
|
|
"--policy_vers 30 " +
|
|
|
|
"--output_cil $(out)",
|
|
|
|
visibility: ["//visibility:private"],
|
|
|
|
}
|
|
|
|
|
|
|
|
prebuilt_etc {
|
|
|
|
name: "microdroid_vendor_sepolicy.cil",
|
|
|
|
src: ":microdroid_vendor_sepolicy.cil_gen",
|
|
|
|
filename: "vendor_sepolicy.cil",
|
|
|
|
relative_install_path: "selinux",
|
|
|
|
installable: false,
|
|
|
|
}
|