| LOCAL_PATH:= $(call my-dir) |
| |
| include $(CLEAR_VARS) |
| |
| # SELinux policy version. |
| # Must be <= /selinux/policyvers reported by the Android kernel. |
| # Must be within the compatibility range reported by checkpolicy -V. |
| POLICYVERS ?= 26 |
| |
| MLS_SENS=1 |
| MLS_CATS=1024 |
| |
| # Quick edge case error detection for BOARD_SEPOLICY_REPLACE. |
| # Builds the singular path for each replace file. |
| sepolicy_replace_paths := |
| $(foreach pf, $(BOARD_SEPOLICY_REPLACE), \ |
| $(if $(filter $(pf), $(BOARD_SEPOLICY_UNION)), \ |
| $(error Ambiguous request for sepolicy $(pf). Appears in both \ |
| BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION), \ |
| ) \ |
| $(eval _paths := $(filter-out $(BOARD_SEPOLICY_IGNORE), \ |
| $(wildcard $(addsuffix /$(pf), $(BOARD_SEPOLICY_DIRS))))) \ |
| $(eval _occurrences := $(words $(_paths))) \ |
| $(if $(filter 0,$(_occurrences)), \ |
| $(error No sepolicy file found for $(pf) in $(BOARD_SEPOLICY_DIRS)), \ |
| ) \ |
| $(if $(filter 1, $(_occurrences)), \ |
| $(eval sepolicy_replace_paths += $(_paths)), \ |
| $(error Multiple occurrences of replace file $(pf) in $(_paths)) \ |
| ) \ |
| $(if $(filter 0, $(words $(wildcard $(addsuffix /$(pf), $(LOCAL_PATH))))), \ |
| $(error Specified the sepolicy file $(pf) in BOARD_SEPOLICY_REPLACE, \ |
| but none found in $(LOCAL_PATH)), \ |
| ) \ |
| ) |
| |
| # Quick edge case error detection for BOARD_SEPOLICY_UNION. |
| # This ensures that a requested union file exists somewhere |
| # in one of the listed BOARD_SEPOLICY_DIRS. |
| $(foreach pf, $(BOARD_SEPOLICY_UNION), \ |
| $(if $(filter 0, $(words $(wildcard $(addsuffix /$(pf), $(BOARD_SEPOLICY_DIRS))))), \ |
| $(error No sepolicy file found for $(pf) in $(BOARD_SEPOLICY_DIRS)), \ |
| ) \ |
| ) |
| |
| # Builds paths for all requested policy files w.r.t |
| # both BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION |
| # product variables. |
| # $(1): the set of policy name paths to build |
| build_policy = $(foreach type, $(1), \ |
| $(filter-out $(BOARD_SEPOLICY_IGNORE), \ |
| $(foreach expanded_type, $(notdir $(wildcard $(addsuffix /$(type), $(LOCAL_PATH)))), \ |
| $(if $(filter $(expanded_type), $(BOARD_SEPOLICY_REPLACE)), \ |
| $(wildcard $(addsuffix $(expanded_type), $(sort $(dir $(sepolicy_replace_paths))))), \ |
| $(LOCAL_PATH)/$(expanded_type) \ |
| ) \ |
| ) \ |
| $(foreach union_policy, $(wildcard $(addsuffix /$(type), $(BOARD_SEPOLICY_DIRS))), \ |
| $(if $(filter $(notdir $(union_policy)), $(BOARD_SEPOLICY_UNION)), \ |
| $(union_policy), \ |
| ) \ |
| ) \ |
| ) \ |
| ) |
| |
| sepolicy_build_files := security_classes \ |
| initial_sids \ |
| access_vectors \ |
| global_macros \ |
| neverallow_macros \ |
| mls_macros \ |
| mls \ |
| policy_capabilities \ |
| te_macros \ |
| attributes \ |
| *.te \ |
| roles \ |
| users \ |
| initial_sid_contexts \ |
| fs_use \ |
| genfs_contexts \ |
| port_contexts |
| |
| ################################## |
| include $(CLEAR_VARS) |
| |
| LOCAL_MODULE := sepolicy |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := optional |
| LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT) |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| sepolicy_policy.conf := $(intermediates)/policy.conf |
| $(sepolicy_policy.conf): PRIVATE_MLS_SENS := $(MLS_SENS) |
| $(sepolicy_policy.conf): PRIVATE_MLS_CATS := $(MLS_CATS) |
| $(sepolicy_policy.conf) : $(call build_policy, $(sepolicy_build_files)) |
| @mkdir -p $(dir $@) |
| $(hide) m4 -D mls_num_sens=$(PRIVATE_MLS_SENS) -D mls_num_cats=$(PRIVATE_MLS_CATS) \ |
| -D target_build_variant=$(TARGET_BUILD_VARIANT) \ |
| -s $^ > $@ |
| $(hide) sed '/dontaudit/d' $@ > $@.dontaudit |
| |
| $(LOCAL_BUILT_MODULE) : $(sepolicy_policy.conf) $(HOST_OUT_EXECUTABLES)/checkpolicy |
| @mkdir -p $(dir $@) |
| $(hide) $(HOST_OUT_EXECUTABLES)/checkpolicy -M -c $(POLICYVERS) -o $@ $< |
| $(hide) $(HOST_OUT_EXECUTABLES)/checkpolicy -M -c $(POLICYVERS) -o $(dir $<)/$(notdir $@).dontaudit $<.dontaudit |
| |
| built_sepolicy := $(LOCAL_BUILT_MODULE) |
| sepolicy_policy.conf := |
| |
| ################################## |
| include $(CLEAR_VARS) |
| |
| LOCAL_MODULE := sepolicy.recovery |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := eng |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| sepolicy_policy_recovery.conf := $(intermediates)/policy_recovery.conf |
| $(sepolicy_policy_recovery.conf): PRIVATE_MLS_SENS := $(MLS_SENS) |
| $(sepolicy_policy_recovery.conf): PRIVATE_MLS_CATS := $(MLS_CATS) |
| $(sepolicy_policy_recovery.conf) : $(call build_policy, $(sepolicy_build_files)) |
| @mkdir -p $(dir $@) |
| $(hide) m4 -D mls_num_sens=$(PRIVATE_MLS_SENS) -D mls_num_cats=$(PRIVATE_MLS_CATS) \ |
| -D target_build_variant=$(TARGET_BUILD_VARIANT) \ |
| -D target_recovery=true \ |
| -s $^ > $@ |
| |
| $(LOCAL_BUILT_MODULE) : $(sepolicy_policy_recovery.conf) $(HOST_OUT_EXECUTABLES)/checkpolicy |
| @mkdir -p $(dir $@) |
| $(hide) $(HOST_OUT_EXECUTABLES)/checkpolicy -M -c $(POLICYVERS) -o $@ $< |
| |
| built_sepolicy_recovery := $(LOCAL_BUILT_MODULE) |
| sepolicy_policy_recovery.conf := |
| |
| ################################## |
| include $(CLEAR_VARS) |
| |
| LOCAL_MODULE := general_sepolicy.conf |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := tests |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| exp_sepolicy_build_files :=\ |
| $(wildcard $(addprefix $(LOCAL_PATH)/, $(sepolicy_build_files))) |
| |
| $(LOCAL_BUILT_MODULE): PRIVATE_MLS_SENS := $(MLS_SENS) |
| $(LOCAL_BUILT_MODULE): PRIVATE_MLS_CATS := $(MLS_CATS) |
| $(LOCAL_BUILT_MODULE): $(exp_sepolicy_build_files) |
| mkdir -p $(dir $@) |
| $(hide) m4 -D mls_num_sens=$(PRIVATE_MLS_SENS) -D mls_num_cats=$(PRIVATE_MLS_CATS) \ |
| -D target_build_variant=user \ |
| -s $^ > $@ |
| $(hide) sed '/dontaudit/d' $@ > $@.dontaudit |
| |
| GENERAL_SEPOLICY_POLICY.CONF = $(LOCAL_BUILT_MODULE) |
| |
| exp_sepolicy_build_files := |
| |
| ################################## |
| include $(CLEAR_VARS) |
| |
| LOCAL_MODULE := file_contexts |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := optional |
| LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT) |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| ALL_FC_FILES := $(call build_policy, file_contexts) |
| |
| $(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy) |
| $(LOCAL_BUILT_MODULE): $(ALL_FC_FILES) $(built_sepolicy) $(HOST_OUT_EXECUTABLES)/checkfc |
| @mkdir -p $(dir $@) |
| $(hide) m4 -s $(ALL_FC_FILES) > $@ |
| $(hide) $(HOST_OUT_EXECUTABLES)/checkfc $(PRIVATE_SEPOLICY) $@ |
| |
| built_fc := $(LOCAL_BUILT_MODULE) |
| |
| ################################## |
| include $(CLEAR_VARS) |
| LOCAL_MODULE := seapp_contexts |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := optional |
| LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT) |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| seapp_contexts.tmp := $(intermediates)/seapp_contexts.tmp |
| $(seapp_contexts.tmp): $(call build_policy, seapp_contexts) |
| @mkdir -p $(dir $@) |
| $(hide) m4 -s $^ > $@ |
| |
| $(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy) |
| $(LOCAL_BUILT_MODULE) : $(seapp_contexts.tmp) $(built_sepolicy) $(HOST_OUT_EXECUTABLES)/checkseapp |
| @mkdir -p $(dir $@) |
| $(HOST_OUT_EXECUTABLES)/checkseapp -p $(PRIVATE_SEPOLICY) -o $@ $< |
| |
| built_sc := $(LOCAL_BUILT_MODULE) |
| seapp_contexts.tmp := |
| |
| ################################## |
| include $(CLEAR_VARS) |
| LOCAL_MODULE := general_seapp_contexts |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := tests |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| general_seapp_contexts.tmp := $(intermediates)/general_seapp_contexts.tmp |
| $(general_seapp_contexts.tmp): $(addprefix $(LOCAL_PATH)/, seapp_contexts) |
| @mkdir -p $(dir $@) |
| $(hide) m4 -s $^ > $@ |
| |
| $(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy) |
| $(LOCAL_BUILT_MODULE) : $(general_seapp_contexts.tmp) $(built_sepolicy) $(HOST_OUT_EXECUTABLES)/checkseapp |
| @mkdir -p $(dir $@) |
| $(HOST_OUT_EXECUTABLES)/checkseapp -p $(PRIVATE_SEPOLICY) -o $@ $< |
| |
| GENERAL_SEAPP_CONTEXTS := $(LOCAL_BUILT_MODULE) |
| general_seapp_contexts.tmp := |
| |
| ################################## |
| include $(CLEAR_VARS) |
| |
| LOCAL_MODULE := property_contexts |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := optional |
| LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT) |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| ALL_PC_FILES := $(call build_policy, property_contexts) |
| |
| $(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy) |
| $(LOCAL_BUILT_MODULE): $(ALL_PC_FILES) $(built_sepolicy) $(HOST_OUT_EXECUTABLES)/checkfc |
| @mkdir -p $(dir $@) |
| $(hide) m4 -s $(ALL_PC_FILES) > $@ |
| $(hide) $(HOST_OUT_EXECUTABLES)/checkfc -p $(PRIVATE_SEPOLICY) $@ |
| |
| built_pc := $(LOCAL_BUILT_MODULE) |
| |
| ################################## |
| include $(CLEAR_VARS) |
| |
| LOCAL_MODULE := service_contexts |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := optional |
| LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT) |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| ALL_SVC_FILES := $(call build_policy, service_contexts) |
| |
| $(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy) |
| $(LOCAL_BUILT_MODULE): $(ALL_SVC_FILES) $(built_sepolicy) $(HOST_OUT_EXECUTABLES)/checkfc |
| @mkdir -p $(dir $@) |
| $(hide) m4 -s $(ALL_SVC_FILES) > $@ |
| $(hide) $(HOST_OUT_EXECUTABLES)/checkfc -p $(PRIVATE_SEPOLICY) $@ |
| |
| built_svc := $(LOCAL_BUILT_MODULE) |
| |
| ################################## |
| include $(CLEAR_VARS) |
| |
| LOCAL_MODULE := mac_permissions.xml |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := optional |
| LOCAL_MODULE_PATH := $(TARGET_OUT_ETC)/security |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| |
| # Build keys.conf |
| mac_perms_keys.tmp := $(intermediates)/keys.tmp |
| $(mac_perms_keys.tmp) : $(call build_policy, keys.conf) |
| @mkdir -p $(dir $@) |
| $(hide) m4 -s $^ > $@ |
| |
| ALL_MAC_PERMS_FILES := $(call build_policy, $(LOCAL_MODULE)) |
| |
| $(LOCAL_BUILT_MODULE) : $(mac_perms_keys.tmp) $(HOST_OUT_EXECUTABLES)/insertkeys.py $(ALL_MAC_PERMS_FILES) |
| @mkdir -p $(dir $@) |
| $(hide) DEFAULT_SYSTEM_DEV_CERTIFICATE="$(dir $(DEFAULT_SYSTEM_DEV_CERTIFICATE))" \ |
| $(HOST_OUT_EXECUTABLES)/insertkeys.py -t $(TARGET_BUILD_VARIANT) -c $(TOP) $< -o $@ $(ALL_MAC_PERMS_FILES) |
| |
| mac_perms_keys.tmp := |
| ################################## |
| include $(CLEAR_VARS) |
| |
| LOCAL_MODULE := selinux_version |
| LOCAL_MODULE_CLASS := ETC |
| LOCAL_MODULE_TAGS := optional |
| LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT) |
| |
| include $(BUILD_SYSTEM)/base_rules.mk |
| $(LOCAL_BUILT_MODULE) : $(built_sepolicy) $(built_pc) $(built_fc) $(built_sc) $(built_svc) |
| @mkdir -p $(dir $@) |
| $(hide) echo -n $(BUILD_FINGERPRINT) > $@ |
| |
| ################################## |
| |
| build_policy := |
| sepolicy_build_files := |
| sepolicy_replace_paths := |
| built_sepolicy := |
| built_sc := |
| built_fc := |
| built_pc := |
| built_svc := |
| |
| include $(call all-makefiles-under,$(LOCAL_PATH)) |