blob: fa7298dadb34431b39077bc57dd40d50f54b7a38 [file] [log] [blame]
Stephen Smalley2dd4e512012-01-04 12:33:27 -05001LOCAL_PATH:= $(call my-dir)
William Robertsf0e0a942012-08-27 15:41:15 -07002
Stephen Smalley2dd4e512012-01-04 12:33:27 -05003include $(CLEAR_VARS)
4
5# SELinux policy version.
6# Must be <= /selinux/policyvers reported by the Android kernel.
7# Must be within the compatibility range reported by checkpolicy -V.
Stephen Smalley66a3e8d2012-09-18 15:11:49 -04008POLICYVERS ?= 24
Stephen Smalley2dd4e512012-01-04 12:33:27 -05009
10MLS_SENS=1
11MLS_CATS=1024
12
William Roberts2c8a55d2012-11-30 14:59:09 -080013MAC_PERMISSION_FILE=mac_permissions.xml
14
15# Detect if someone tries to union the mac permissions policy file
16$(if $(filter $(MAC_PERMISSION_FILE), $(BOARD_SEPOLICY_UNION)), \
17 $(error Cannot specify $(MAC_PERMISSION_FILE) in BOARD_SEPOLICY_UNION) \
18)
19
rpcraig47cd3962012-10-17 21:09:52 -040020# Quick edge case error detection for BOARD_SEPOLICY_REPLACE.
21# Builds the singular path for each replace file.
22sepolicy_replace_paths :=
23$(foreach pf, $(BOARD_SEPOLICY_REPLACE), \
24 $(if $(filter $(pf), $(BOARD_SEPOLICY_UNION)), \
25 $(error Ambiguous request for sepolicy $(pf). Appears in both \
26 BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION), \
27 ) \
28 $(eval _paths := $(wildcard $(addsuffix /$(pf), $(BOARD_SEPOLICY_DIRS)))) \
29 $(eval _occurrences := $(words $(_paths))) \
30 $(if $(filter 0,$(_occurrences)), \
31 $(error No sepolicy file found for $(pf) in $(BOARD_SEPOLICY_DIRS)), \
32 ) \
33 $(if $(filter 1, $(_occurrences)), \
34 $(eval sepolicy_replace_paths += $(_paths)), \
35 $(error Multiple occurrences of replace file $(pf) in $(_paths)) \
36 ) \
37 $(if $(filter 0, $(words $(wildcard $(addsuffix /$(pf), $(LOCAL_PATH))))), \
38 $(error Specified the sepolicy file $(pf) in BOARD_SEPOLICY_REPLACE, \
39 but none found in $(LOCAL_PATH)), \
40 ) \
41)
Stephen Smalley5b340be2012-03-06 11:12:41 -050042
rpcraig47cd3962012-10-17 21:09:52 -040043# Builds paths for all requested policy files w.r.t
44# both BOARD_SEPOLICY_REPLACE and BOARD_SEPOLICY_UNION
45# product variables.
46# $(1): the set of policy name paths to build
47build_policy = $(foreach type, $(1), \
48 $(foreach expanded_type, $(notdir $(wildcard $(addsuffix /$(type), $(LOCAL_PATH)))), \
49 $(if $(filter $(expanded_type), $(BOARD_SEPOLICY_REPLACE)), \
William Roberts5a2988f2013-01-03 19:01:50 -080050 $(wildcard $(addsuffix $(expanded_type), $(sort $(dir $(sepolicy_replace_paths))))), \
rpcraig47cd3962012-10-17 21:09:52 -040051 $(LOCAL_PATH)/$(expanded_type) \
52 ) \
53 ) \
54 $(foreach union_policy, $(wildcard $(addsuffix /$(type), $(BOARD_SEPOLICY_DIRS))), \
55 $(if $(filter $(notdir $(union_policy)), $(BOARD_SEPOLICY_UNION)), \
56 $(union_policy), \
57 ) \
58 ) \
59)
Stephen Smalley5b340be2012-03-06 11:12:41 -050060
Ying Wang02fb5f32012-01-17 17:51:09 -080061##################################
62include $(CLEAR_VARS)
Stephen Smalley2dd4e512012-01-04 12:33:27 -050063
Ying Wang02fb5f32012-01-17 17:51:09 -080064LOCAL_MODULE := sepolicy
65LOCAL_MODULE_CLASS := ETC
66LOCAL_MODULE_TAGS := optional
Ying Wang02fb5f32012-01-17 17:51:09 -080067LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT)
Stephen Smalley2dd4e512012-01-04 12:33:27 -050068
Ying Wang02fb5f32012-01-17 17:51:09 -080069include $(BUILD_SYSTEM)/base_rules.mk
Stephen Smalley2dd4e512012-01-04 12:33:27 -050070
Ying Wang02fb5f32012-01-17 17:51:09 -080071sepolicy_policy.conf := $(intermediates)/policy.conf
72$(sepolicy_policy.conf): PRIVATE_MLS_SENS := $(MLS_SENS)
73$(sepolicy_policy.conf): PRIVATE_MLS_CATS := $(MLS_CATS)
Kenny Root9ceb47b2012-11-01 13:17:29 -070074$(sepolicy_policy.conf) : $(call build_policy, security_classes initial_sids access_vectors global_macros mls_macros mls policy_capabilities te_macros attributes *.te roles users initial_sid_contexts fs_use genfs_contexts port_contexts)
Ying Wang02fb5f32012-01-17 17:51:09 -080075 @mkdir -p $(dir $@)
Kenny Root9ceb47b2012-11-01 13:17:29 -070076 $(hide) m4 -D mls_num_sens=$(PRIVATE_MLS_SENS) -D mls_num_cats=$(PRIVATE_MLS_CATS) -s $^ > $@
Stephen Smalley2dd4e512012-01-04 12:33:27 -050077
Stephen Smalley2b826fc2012-01-24 08:46:13 -050078$(LOCAL_BUILT_MODULE) : $(sepolicy_policy.conf) $(HOST_OUT_EXECUTABLES)/checkpolicy
Ying Wang02fb5f32012-01-17 17:51:09 -080079 @mkdir -p $(dir $@)
Ying Wangf4ea5b22012-04-09 15:31:03 -070080 $(hide) $(HOST_OUT_EXECUTABLES)/checkpolicy -M -c $(POLICYVERS) -o $@ $<
Ying Wang02fb5f32012-01-17 17:51:09 -080081
Ying Wangd8b122c2012-10-25 19:01:31 -070082built_sepolicy := $(LOCAL_BUILT_MODULE)
Ying Wang02fb5f32012-01-17 17:51:09 -080083sepolicy_policy.conf :=
Stephen Smalley01a58af2012-10-02 12:46:37 -040084
85###################################
86include $(CLEAR_VARS)
87
Ying Wang02fb5f32012-01-17 17:51:09 -080088LOCAL_MODULE := file_contexts
Ying Wang02fb5f32012-01-17 17:51:09 -080089LOCAL_MODULE_CLASS := ETC
90LOCAL_MODULE_TAGS := optional
91LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT)
92
Stephen Smalley5b340be2012-03-06 11:12:41 -050093include $(BUILD_SYSTEM)/base_rules.mk
Ying Wang02fb5f32012-01-17 17:51:09 -080094
rpcraig47cd3962012-10-17 21:09:52 -040095ALL_FC_FILES := $(call build_policy, file_contexts)
Stephen Smalley01a58af2012-10-02 12:46:37 -040096
Ying Wangd8b122c2012-10-25 19:01:31 -070097$(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy)
98$(LOCAL_BUILT_MODULE): $(ALL_FC_FILES) $(built_sepolicy) $(HOST_OUT_EXECUTABLES)/checkfc
Stephen Smalley5b340be2012-03-06 11:12:41 -050099 @mkdir -p $(dir $@)
Stephen Smalley01a58af2012-10-02 12:46:37 -0400100 $(hide) m4 -s $(ALL_FC_FILES) > $@
Ying Wangd8b122c2012-10-25 19:01:31 -0700101 $(hide) $(HOST_OUT_EXECUTABLES)/checkfc $(PRIVATE_SEPOLICY) $@
Stephen Smalley5b340be2012-03-06 11:12:41 -0500102
103file_contexts :=
William Roberts171a0622012-08-16 10:55:05 -0700104
Ying Wang02fb5f32012-01-17 17:51:09 -0800105##################################
106include $(CLEAR_VARS)
Ying Wang02fb5f32012-01-17 17:51:09 -0800107LOCAL_MODULE := seapp_contexts
Ying Wang02fb5f32012-01-17 17:51:09 -0800108LOCAL_MODULE_CLASS := ETC
109LOCAL_MODULE_TAGS := optional
110LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT)
111
William Roberts171a0622012-08-16 10:55:05 -0700112include $(BUILD_SYSTEM)/base_rules.mk
Ying Wang02fb5f32012-01-17 17:51:09 -0800113
William Roberts98ed3922012-09-05 11:19:07 -0700114seapp_contexts.tmp := $(intermediates)/seapp_contexts.tmp
rpcraig47cd3962012-10-17 21:09:52 -0400115$(seapp_contexts.tmp): $(call build_policy, seapp_contexts)
William Roberts171a0622012-08-16 10:55:05 -0700116 @mkdir -p $(dir $@)
117 $(hide) m4 -s $^ > $@
118
Ying Wangd8b122c2012-10-25 19:01:31 -0700119$(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy)
120$(LOCAL_BUILT_MODULE) : $(seapp_contexts.tmp) $(built_sepolicy) $(HOST_OUT_EXECUTABLES)/checkseapp
William Robertsf0e0a942012-08-27 15:41:15 -0700121 @mkdir -p $(dir $@)
Ying Wangd8b122c2012-10-25 19:01:31 -0700122 $(HOST_OUT_EXECUTABLES)/checkseapp -p $(PRIVATE_SEPOLICY) -o $@ $<
Ying Wang02fb5f32012-01-17 17:51:09 -0800123
William Roberts98ed3922012-09-05 11:19:07 -0700124seapp_contexts.tmp :=
Ying Wang02fb5f32012-01-17 17:51:09 -0800125##################################
Stephen Smalley124720a2012-04-04 10:11:16 -0400126include $(CLEAR_VARS)
127
128LOCAL_MODULE := property_contexts
129LOCAL_MODULE_CLASS := ETC
130LOCAL_MODULE_TAGS := optional
131LOCAL_MODULE_PATH := $(TARGET_ROOT_OUT)
132
133include $(BUILD_SYSTEM)/base_rules.mk
134
Robert Craigd98d26e2013-01-23 14:04:50 -0500135ALL_PC_FILES := $(call build_policy, property_contexts)
136
137$(LOCAL_BUILT_MODULE): PRIVATE_SEPOLICY := $(built_sepolicy)
138$(LOCAL_BUILT_MODULE): $(ALL_PC_FILES) $(built_sepolicy) $(HOST_OUT_EXECUTABLES)/checkfc
Stephen Smalley124720a2012-04-04 10:11:16 -0400139 @mkdir -p $(dir $@)
Robert Craigd98d26e2013-01-23 14:04:50 -0500140 $(hide) m4 -s $(ALL_PC_FILES) > $@
141 $(hide) $(HOST_OUT_EXECUTABLES)/checkfc -p $(PRIVATE_SEPOLICY) $@
Stephen Smalley124720a2012-04-04 10:11:16 -0400142
143property_contexts :=
Robert Craigd98d26e2013-01-23 14:04:50 -0500144built_sepolicy :=
Stephen Smalley124720a2012-04-04 10:11:16 -0400145##################################
Stephen Smalley7e8cf242012-02-02 13:28:28 -0500146
Joshua Brindle70d4fc22012-06-20 11:58:01 -0400147##################################
148include $(CLEAR_VARS)
149
150LOCAL_MODULE := selinux-network.sh
151LOCAL_SRC_FILES := $(LOCAL_MODULE)
152LOCAL_MODULE_CLASS := EXECUTABLES
153LOCAL_MODULE_TAGS := optional
154LOCAL_MODULE_PATH := $(TARGET_OUT_EXECUTABLES)
155
156include $(BUILD_PREBUILT)
157
158##################################
rpcraigb19665c2012-07-30 09:33:03 -0400159include $(CLEAR_VARS)
160
William Roberts2c8a55d2012-11-30 14:59:09 -0800161LOCAL_MODULE := $(MAC_PERMISSION_FILE)
rpcraigb19665c2012-07-30 09:33:03 -0400162LOCAL_MODULE_CLASS := ETC
163LOCAL_MODULE_TAGS := optional
164LOCAL_MODULE_PATH := $(TARGET_OUT_ETC)/security
165
William Roberts2c8a55d2012-11-30 14:59:09 -0800166include $(BUILD_SYSTEM)/base_rules.mk
rpcraigb19665c2012-07-30 09:33:03 -0400167
William Roberts22fc0412012-12-06 05:45:15 +0900168# Build keys.conf
169mac_perms_keys.tmp := $(intermediates)/keys.tmp
170$(mac_perms_keys.tmp) : $(call build_policy, keys.conf)
171 @mkdir -p $(dir $@)
172 $(hide) m4 -s $^ > $@
173
174# Build mac_permissions.xml
175$(MAC_PERMISSION_FILE).tmp := $(intermediates)/$(MAC_PERMISSION_FILE).tmp
176$($(MAC_PERMISSION_FILE).tmp) : $(call build_policy, $(MAC_PERMISSION_FILE))
William Roberts2c8a55d2012-11-30 14:59:09 -0800177 @mkdir -p $(dir $@)
178 $(hide) cp $^ $@
rpcraigb19665c2012-07-30 09:33:03 -0400179
William Roberts22fc0412012-12-06 05:45:15 +0900180$(LOCAL_BUILT_MODULE) : $($(MAC_PERMISSION_FILE).tmp) $(mac_perms_keys.tmp) $(HOST_OUT_EXECUTABLES)/insertkeys.py
181 @mkdir -p $(dir $@)
182 $(HOST_OUT_EXECUTABLES)/insertkeys.py -t $(TARGET_BUILD_VARIANT) -c $(ANDROID_BUILD_TOP) $(mac_perms_keys.tmp) -o $@ $<
183
184$(MAC_PERMISSION_FILE).tmp :=
rpcraigb19665c2012-07-30 09:33:03 -0400185##################################
rpcraig47cd3962012-10-17 21:09:52 -0400186
187build_policy :=
188sepolicy_replace_paths :=
Alice Chucdfb06f2012-11-01 11:33:04 -0700189
190include $(call all-makefiles-under,$(LOCAL_PATH))