2018-02-01 01:22:35 +01:00
|
|
|
version := $(version_under_treble_tests)
|
|
|
|
|
|
|
|
include $(CLEAR_VARS)
|
|
|
|
# For Treble builds run tests verifying that processes are properly labeled and
|
|
|
|
# permissions granted do not violate the treble model. Also ensure that treble
|
|
|
|
# compatibility guarantees are upheld between SELinux version bumps.
|
|
|
|
LOCAL_MODULE := treble_sepolicy_tests_$(version)
|
2021-02-04 08:07:40 +01:00
|
|
|
LOCAL_LICENSE_KINDS := SPDX-license-identifier-Apache-2.0 legacy_unencumbered
|
|
|
|
LOCAL_LICENSE_CONDITIONS := notice unencumbered
|
|
|
|
LOCAL_NOTICE_FILE := $(LOCAL_PATH)/NOTICE
|
2019-05-29 18:05:43 +02:00
|
|
|
LOCAL_MODULE_CLASS := FAKE
|
|
|
|
LOCAL_MODULE_TAGS := optional
|
2018-02-01 01:22:35 +01:00
|
|
|
|
|
|
|
include $(BUILD_SYSTEM)/base_rules.mk
|
|
|
|
|
|
|
|
# $(version)_plat - the platform policy shipped as part of the $(version) release. This is
|
|
|
|
# built to enable us to determine the diff between the current policy and the
|
|
|
|
# $(version) policy, which will be used in tests to make sure that compatibility has
|
|
|
|
# been maintained by our mapping files.
|
|
|
|
$(version)_PLAT_PUBLIC_POLICY := $(LOCAL_PATH)/prebuilts/api/$(version)/public
|
|
|
|
$(version)_PLAT_PRIVATE_POLICY := $(LOCAL_PATH)/prebuilts/api/$(version)/private
|
2019-06-19 19:52:50 +02:00
|
|
|
policy_files := $(call build_policy, $(sepolicy_build_files), $($(version)_PLAT_PUBLIC_POLICY) $($(version)_PLAT_PRIVATE_POLICY))
|
2018-02-01 01:22:35 +01:00
|
|
|
$(version)_plat_policy.conf := $(intermediates)/$(version)_plat_policy.conf
|
|
|
|
$($(version)_plat_policy.conf): PRIVATE_MLS_SENS := $(MLS_SENS)
|
|
|
|
$($(version)_plat_policy.conf): PRIVATE_MLS_CATS := $(MLS_CATS)
|
2018-03-23 20:40:26 +01:00
|
|
|
$($(version)_plat_policy.conf): PRIVATE_TARGET_BUILD_VARIANT := user
|
2018-02-01 01:22:35 +01:00
|
|
|
$($(version)_plat_policy.conf): PRIVATE_TGT_ARCH := $(my_target_arch)
|
|
|
|
$($(version)_plat_policy.conf): PRIVATE_TGT_WITH_ASAN := $(with_asan)
|
2019-06-14 00:05:15 +02:00
|
|
|
$($(version)_plat_policy.conf): PRIVATE_TGT_WITH_NATIVE_COVERAGE := $(with_native_coverage)
|
2018-02-01 01:22:35 +01:00
|
|
|
$($(version)_plat_policy.conf): PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS)
|
|
|
|
$($(version)_plat_policy.conf): PRIVATE_SEPOLICY_SPLIT := true
|
2019-06-19 19:52:50 +02:00
|
|
|
$($(version)_plat_policy.conf): PRIVATE_POLICY_FILES := $(policy_files)
|
|
|
|
$($(version)_plat_policy.conf): $(policy_files) $(M4)
|
2018-02-01 01:22:35 +01:00
|
|
|
$(transform-policy-to-conf)
|
|
|
|
$(hide) sed '/dontaudit/d' $@ > $@.dontaudit
|
|
|
|
|
2019-06-19 19:52:50 +02:00
|
|
|
policy_files :=
|
2018-02-01 01:22:35 +01:00
|
|
|
|
|
|
|
built_$(version)_plat_sepolicy := $(intermediates)/built_$(version)_plat_sepolicy
|
|
|
|
$(built_$(version)_plat_sepolicy): PRIVATE_ADDITIONAL_CIL_FILES := \
|
|
|
|
$(call build_policy, technical_debt.cil , $($(version)_PLAT_PRIVATE_POLICY))
|
|
|
|
$(built_$(version)_plat_sepolicy): PRIVATE_NEVERALLOW_ARG := $(NEVERALLOW_ARG)
|
|
|
|
$(built_$(version)_plat_sepolicy): $($(version)_plat_policy.conf) $(HOST_OUT_EXECUTABLES)/checkpolicy \
|
|
|
|
$(HOST_OUT_EXECUTABLES)/secilc \
|
|
|
|
$(call build_policy, technical_debt.cil, $($(version)_PLAT_PRIVATE_POLICY)) \
|
|
|
|
$(built_sepolicy_neverallows)
|
|
|
|
@mkdir -p $(dir $@)
|
|
|
|
$(hide) $(CHECKPOLICY_ASAN_OPTIONS) $(HOST_OUT_EXECUTABLES)/checkpolicy -M -C -c \
|
|
|
|
$(POLICYVERS) -o $@ $<
|
|
|
|
$(hide) cat $(PRIVATE_ADDITIONAL_CIL_FILES) >> $@
|
|
|
|
$(hide) $(HOST_OUT_EXECUTABLES)/secilc -m -M true -G -c $(POLICYVERS) $(PRIVATE_NEVERALLOW_ARG) $@ -o $@ -f /dev/null
|
|
|
|
|
|
|
|
$(version)_plat_policy.conf :=
|
|
|
|
|
|
|
|
|
|
|
|
# $(version)_compat - the current plat_sepolicy.cil built with the compatibility file
|
|
|
|
# targeting the $(version) SELinux release. This ensures that our policy will build
|
|
|
|
# when used on a device that has non-platform policy targetting the $(version) release.
|
|
|
|
$(version)_compat := $(intermediates)/$(version)_compat
|
2019-10-11 01:29:40 +02:00
|
|
|
$(version)_mapping.cil := $(call intermediates-dir-for,ETC,plat_$(version).cil)/plat_$(version).cil
|
2018-09-30 02:47:10 +02:00
|
|
|
$(version)_mapping.ignore.cil := \
|
|
|
|
$(call intermediates-dir-for,ETC,$(version).ignore.cil)/$(version).ignore.cil
|
2018-07-11 11:30:44 +02:00
|
|
|
$(version)_prebuilts_dir := $(LOCAL_PATH)/prebuilts/api/$(version)
|
|
|
|
|
|
|
|
# vendor_sepolicy.cil and plat_pub_versioned.cil are the new design to replace
|
|
|
|
# nonplat_sepolicy.cil.
|
|
|
|
$(version)_nonplat := $($(version)_prebuilts_dir)/vendor_sepolicy.cil \
|
|
|
|
$($(version)_prebuilts_dir)/plat_pub_versioned.cil
|
|
|
|
ifeq (,$(wildcard $($(version)_nonplat)))
|
|
|
|
$(version)_nonplat := $($(version)_prebuilts_dir)/nonplat_sepolicy.cil
|
|
|
|
endif
|
|
|
|
|
2018-02-01 01:22:35 +01:00
|
|
|
$($(version)_compat): PRIVATE_CIL_FILES := \
|
|
|
|
$(built_plat_cil) $($(version)_mapping.cil) $($(version)_nonplat)
|
|
|
|
$($(version)_compat): $(HOST_OUT_EXECUTABLES)/secilc \
|
|
|
|
$(built_plat_cil) $($(version)_mapping.cil) $($(version)_nonplat)
|
|
|
|
$(hide) $(HOST_OUT_EXECUTABLES)/secilc -m -M true -G -N -c $(POLICYVERS) \
|
|
|
|
$(PRIVATE_CIL_FILES) -o $@ -f /dev/null
|
|
|
|
|
|
|
|
# $(version)_mapping.combined.cil - a combination of the mapping file used when
|
|
|
|
# combining the current platform policy with nonplatform policy based on the
|
|
|
|
# $(version) policy release and also a special ignored file that exists purely for
|
|
|
|
# these tests.
|
|
|
|
$(version)_mapping.combined.cil := $(intermediates)/$(version)_mapping.combined.cil
|
|
|
|
$($(version)_mapping.combined.cil): $($(version)_mapping.cil) $($(version)_mapping.ignore.cil)
|
|
|
|
mkdir -p $(dir $@)
|
|
|
|
cat $^ > $@
|
|
|
|
|
2019-05-29 18:05:43 +02:00
|
|
|
$(LOCAL_BUILT_MODULE): ALL_FC_ARGS := $(all_fc_args)
|
|
|
|
$(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy)
|
|
|
|
$(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY_OLD := $(built_$(version)_plat_sepolicy)
|
|
|
|
$(LOCAL_BUILT_MODULE): PRIVATE_COMBINED_MAPPING := $($(version)_mapping.combined.cil)
|
|
|
|
$(LOCAL_BUILT_MODULE): PRIVATE_PLAT_SEPOLICY := $(built_plat_sepolicy)
|
|
|
|
$(LOCAL_BUILT_MODULE): PRIVATE_PLAT_PUB_SEPOLICY := $(base_plat_pub_policy.cil)
|
|
|
|
$(LOCAL_BUILT_MODULE): PRIVATE_FAKE_TREBLE :=
|
2018-02-01 01:22:35 +01:00
|
|
|
ifeq ($(PRODUCT_FULL_TREBLE_OVERRIDE),true)
|
2019-09-20 20:16:29 +02:00
|
|
|
# TODO(b/113124961): remove fake-treble
|
2019-05-29 18:05:43 +02:00
|
|
|
$(LOCAL_BUILT_MODULE): PRIVATE_FAKE_TREBLE := --fake-treble
|
2018-09-08 01:01:38 +02:00
|
|
|
endif # PRODUCT_FULL_TREBLE_OVERRIDE = true
|
2019-05-29 18:05:43 +02:00
|
|
|
$(LOCAL_BUILT_MODULE): $(HOST_OUT_EXECUTABLES)/treble_sepolicy_tests \
|
2018-02-01 01:22:35 +01:00
|
|
|
$(all_fc_files) $(built_sepolicy) $(built_plat_sepolicy) \
|
2018-09-29 02:21:08 +02:00
|
|
|
$(base_plat_pub_policy.cil) \
|
2018-02-01 01:22:35 +01:00
|
|
|
$(built_$(version)_plat_sepolicy) $($(version)_compat) $($(version)_mapping.combined.cil)
|
|
|
|
@mkdir -p $(dir $@)
|
|
|
|
$(hide) $(HOST_OUT_EXECUTABLES)/treble_sepolicy_tests -l \
|
|
|
|
$(HOST_OUT)/lib64/libsepolwrap.$(SHAREDLIB_EXT) $(ALL_FC_ARGS) \
|
|
|
|
-b $(PRIVATE_PLAT_SEPOLICY) -m $(PRIVATE_COMBINED_MAPPING) \
|
|
|
|
-o $(PRIVATE_SEPOLICY_OLD) -p $(PRIVATE_SEPOLICY) \
|
2018-09-29 02:21:08 +02:00
|
|
|
-u $(PRIVATE_PLAT_PUB_SEPOLICY) \
|
2018-02-01 01:22:35 +01:00
|
|
|
$(PRIVATE_FAKE_TREBLE)
|
|
|
|
$(hide) touch $@
|
|
|
|
|
|
|
|
$(version)_PLAT_PUBLIC_POLICY :=
|
|
|
|
$(version)_PLAT_PRIVATE_POLICY :=
|
|
|
|
$(version)_compat :=
|
|
|
|
$(version)_mapping.cil :=
|
|
|
|
$(version)_mapping.combined.cil :=
|
|
|
|
$(version)_mapping.ignore.cil :=
|
|
|
|
$(version)_nonplat :=
|
2018-07-11 11:30:44 +02:00
|
|
|
$(version)_prebuilts_dir :=
|
2018-02-01 01:22:35 +01:00
|
|
|
built_$(version)_plat_sepolicy :=
|
|
|
|
version :=
|
|
|
|
version_under_treble_tests :=
|