mirror of
https://github.com/AetherDroid/android_kernel_samsung_on5xelte.git
synced 2025-09-08 01:08:03 -04:00
Fixed MTP to work with TWRP
This commit is contained in:
commit
f6dfaef42e
50820 changed files with 20846062 additions and 0 deletions
2
scripts/selinux/Makefile
Normal file
2
scripts/selinux/Makefile
Normal file
|
@ -0,0 +1,2 @@
|
|||
subdir-y := mdp genheaders
|
||||
subdir- += mdp genheaders
|
2
scripts/selinux/README
Normal file
2
scripts/selinux/README
Normal file
|
@ -0,0 +1,2 @@
|
|||
Please see Documentation/security/SELinux.txt for information on
|
||||
installing a dummy SELinux policy.
|
4
scripts/selinux/genheaders/Makefile
Normal file
4
scripts/selinux/genheaders/Makefile
Normal file
|
@ -0,0 +1,4 @@
|
|||
hostprogs-y := genheaders
|
||||
HOST_EXTRACFLAGS += -Isecurity/selinux/include
|
||||
|
||||
always := $(hostprogs-y)
|
138
scripts/selinux/genheaders/genheaders.c
Normal file
138
scripts/selinux/genheaders/genheaders.c
Normal file
|
@ -0,0 +1,138 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
#include <errno.h>
|
||||
#include <ctype.h>
|
||||
|
||||
struct security_class_mapping {
|
||||
const char *name;
|
||||
const char *perms[sizeof(unsigned) * 8 + 1];
|
||||
};
|
||||
|
||||
#include "classmap.h"
|
||||
#include "initial_sid_to_string.h"
|
||||
|
||||
#define max(x, y) (((int)(x) > (int)(y)) ? x : y)
|
||||
|
||||
const char *progname;
|
||||
|
||||
static void usage(void)
|
||||
{
|
||||
printf("usage: %s flask.h av_permissions.h\n", progname);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
static char *stoupperx(const char *s)
|
||||
{
|
||||
char *s2 = strdup(s);
|
||||
char *p;
|
||||
|
||||
if (!s2) {
|
||||
fprintf(stderr, "%s: out of memory\n", progname);
|
||||
exit(3);
|
||||
}
|
||||
|
||||
for (p = s2; *p; p++)
|
||||
*p = toupper(*p);
|
||||
return s2;
|
||||
}
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
int i, j, k;
|
||||
int isids_len;
|
||||
FILE *fout;
|
||||
const char *needle = "SOCKET";
|
||||
char *substr;
|
||||
|
||||
progname = argv[0];
|
||||
|
||||
if (argc < 3)
|
||||
usage();
|
||||
|
||||
fout = fopen(argv[1], "w");
|
||||
if (!fout) {
|
||||
fprintf(stderr, "Could not open %s for writing: %s\n",
|
||||
argv[1], strerror(errno));
|
||||
exit(2);
|
||||
}
|
||||
|
||||
for (i = 0; secclass_map[i].name; i++) {
|
||||
struct security_class_mapping *map = &secclass_map[i];
|
||||
map->name = stoupperx(map->name);
|
||||
for (j = 0; map->perms[j]; j++)
|
||||
map->perms[j] = stoupperx(map->perms[j]);
|
||||
}
|
||||
|
||||
isids_len = sizeof(initial_sid_to_string) / sizeof (char *);
|
||||
for (i = 1; i < isids_len; i++)
|
||||
initial_sid_to_string[i] = stoupperx(initial_sid_to_string[i]);
|
||||
|
||||
fprintf(fout, "/* This file is automatically generated. Do not edit. */\n");
|
||||
fprintf(fout, "#ifndef _SELINUX_FLASK_H_\n#define _SELINUX_FLASK_H_\n\n");
|
||||
|
||||
for (i = 0; secclass_map[i].name; i++) {
|
||||
struct security_class_mapping *map = &secclass_map[i];
|
||||
fprintf(fout, "#define SECCLASS_%s", map->name);
|
||||
for (j = 0; j < max(1, 40 - strlen(map->name)); j++)
|
||||
fprintf(fout, " ");
|
||||
fprintf(fout, "%2d\n", i+1);
|
||||
}
|
||||
|
||||
fprintf(fout, "\n");
|
||||
|
||||
for (i = 1; i < isids_len; i++) {
|
||||
const char *s = initial_sid_to_string[i];
|
||||
fprintf(fout, "#define SECINITSID_%s", s);
|
||||
for (j = 0; j < max(1, 40 - strlen(s)); j++)
|
||||
fprintf(fout, " ");
|
||||
fprintf(fout, "%2d\n", i);
|
||||
}
|
||||
fprintf(fout, "\n#define SECINITSID_NUM %d\n", i-1);
|
||||
fprintf(fout, "\nstatic inline bool security_is_socket_class(u16 kern_tclass)\n");
|
||||
fprintf(fout, "{\n");
|
||||
fprintf(fout, "\tbool sock = false;\n\n");
|
||||
fprintf(fout, "\tswitch (kern_tclass) {\n");
|
||||
for (i = 0; secclass_map[i].name; i++) {
|
||||
struct security_class_mapping *map = &secclass_map[i];
|
||||
substr = strstr(map->name, needle);
|
||||
if (substr && strcmp(substr, needle) == 0)
|
||||
fprintf(fout, "\tcase SECCLASS_%s:\n", map->name);
|
||||
}
|
||||
fprintf(fout, "\t\tsock = true;\n");
|
||||
fprintf(fout, "\t\tbreak;\n");
|
||||
fprintf(fout, "\tdefault:\n");
|
||||
fprintf(fout, "\t\tbreak;\n");
|
||||
fprintf(fout, "\t}\n\n");
|
||||
fprintf(fout, "\treturn sock;\n");
|
||||
fprintf(fout, "}\n");
|
||||
|
||||
fprintf(fout, "\n#endif\n");
|
||||
fclose(fout);
|
||||
|
||||
fout = fopen(argv[2], "w");
|
||||
if (!fout) {
|
||||
fprintf(stderr, "Could not open %s for writing: %s\n",
|
||||
argv[2], strerror(errno));
|
||||
exit(4);
|
||||
}
|
||||
|
||||
fprintf(fout, "/* This file is automatically generated. Do not edit. */\n");
|
||||
fprintf(fout, "#ifndef _SELINUX_AV_PERMISSIONS_H_\n#define _SELINUX_AV_PERMISSIONS_H_\n\n");
|
||||
|
||||
for (i = 0; secclass_map[i].name; i++) {
|
||||
struct security_class_mapping *map = &secclass_map[i];
|
||||
for (j = 0; map->perms[j]; j++) {
|
||||
fprintf(fout, "#define %s__%s", map->name,
|
||||
map->perms[j]);
|
||||
for (k = 0; k < max(1, 40 - strlen(map->name) - strlen(map->perms[j])); k++)
|
||||
fprintf(fout, " ");
|
||||
fprintf(fout, "0x%08xUL\n", (1<<j));
|
||||
}
|
||||
}
|
||||
|
||||
fprintf(fout, "\n#endif\n");
|
||||
fclose(fout);
|
||||
exit(0);
|
||||
}
|
68
scripts/selinux/install_policy.sh
Executable file
68
scripts/selinux/install_policy.sh
Executable file
|
@ -0,0 +1,68 @@
|
|||
#!/bin/sh
|
||||
if [ `id -u` -ne 0 ]; then
|
||||
echo "$0: must be root to install the selinux policy"
|
||||
exit 1
|
||||
fi
|
||||
SF=`which setfiles`
|
||||
if [ $? -eq 1 ]; then
|
||||
if [ -f /sbin/setfiles ]; then
|
||||
SF="/usr/setfiles"
|
||||
else
|
||||
echo "no selinux tools installed: setfiles"
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
cd mdp
|
||||
|
||||
CP=`which checkpolicy`
|
||||
VERS=`$CP -V | awk '{print $1}'`
|
||||
|
||||
./mdp policy.conf file_contexts
|
||||
$CP -o policy.$VERS policy.conf
|
||||
|
||||
mkdir -p /etc/selinux/dummy/policy
|
||||
mkdir -p /etc/selinux/dummy/contexts/files
|
||||
|
||||
cp file_contexts /etc/selinux/dummy/contexts/files
|
||||
cp dbus_contexts /etc/selinux/dummy/contexts
|
||||
cp policy.$VERS /etc/selinux/dummy/policy
|
||||
FC_FILE=/etc/selinux/dummy/contexts/files/file_contexts
|
||||
|
||||
if [ ! -d /etc/selinux ]; then
|
||||
mkdir -p /etc/selinux
|
||||
fi
|
||||
if [ ! -f /etc/selinux/config ]; then
|
||||
cat > /etc/selinux/config << EOF
|
||||
SELINUX=enforcing
|
||||
SELINUXTYPE=dummy
|
||||
EOF
|
||||
else
|
||||
TYPE=`cat /etc/selinux/config | grep "^SELINUXTYPE" | tail -1 | awk -F= '{ print $2 '}`
|
||||
if [ "eq$TYPE" != "eqdummy" ]; then
|
||||
selinuxenabled
|
||||
if [ $? -eq 0 ]; then
|
||||
echo "SELinux already enabled with a non-dummy policy."
|
||||
echo "Exiting. Please install policy by hand if that"
|
||||
echo "is what you REALLY want."
|
||||
exit 1
|
||||
fi
|
||||
mv /etc/selinux/config /etc/selinux/config.mdpbak
|
||||
grep -v "^SELINUXTYPE" /etc/selinux/config.mdpbak >> /etc/selinux/config
|
||||
echo "SELINUXTYPE=dummy" >> /etc/selinux/config
|
||||
fi
|
||||
fi
|
||||
|
||||
cd /etc/selinux/dummy/contexts/files
|
||||
$SF file_contexts /
|
||||
|
||||
mounts=`cat /proc/$$/mounts | egrep "ext2|ext3|xfs|jfs|ext4|ext4dev|gfs2" | awk '{ print $2 '}`
|
||||
$SF file_contexts $mounts
|
||||
|
||||
|
||||
dodev=`cat /proc/$$/mounts | grep "/dev "`
|
||||
if [ "eq$dodev" != "eq" ]; then
|
||||
mount --move /dev /mnt
|
||||
$SF file_contexts /dev
|
||||
mount --move /mnt /dev
|
||||
fi
|
5
scripts/selinux/mdp/Makefile
Normal file
5
scripts/selinux/mdp/Makefile
Normal file
|
@ -0,0 +1,5 @@
|
|||
hostprogs-y := mdp
|
||||
HOST_EXTRACFLAGS += -Isecurity/selinux/include
|
||||
|
||||
always := $(hostprogs-y)
|
||||
clean-files := policy.* file_contexts
|
6
scripts/selinux/mdp/dbus_contexts
Normal file
6
scripts/selinux/mdp/dbus_contexts
Normal file
|
@ -0,0 +1,6 @@
|
|||
<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN"
|
||||
"http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd">
|
||||
<busconfig>
|
||||
<selinux>
|
||||
</selinux>
|
||||
</busconfig>
|
147
scripts/selinux/mdp/mdp.c
Normal file
147
scripts/selinux/mdp/mdp.c
Normal file
|
@ -0,0 +1,147 @@
|
|||
/*
|
||||
*
|
||||
* mdp - make dummy policy
|
||||
*
|
||||
* When pointed at a kernel tree, builds a dummy policy for that kernel
|
||||
* with exactly one type with full rights to itself.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
||||
*
|
||||
* Copyright (C) IBM Corporation, 2006
|
||||
*
|
||||
* Authors: Serge E. Hallyn <serue@us.ibm.com>
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <unistd.h>
|
||||
#include <string.h>
|
||||
|
||||
static void usage(char *name)
|
||||
{
|
||||
printf("usage: %s [-m] policy_file context_file\n", name);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
/* Class/perm mapping support */
|
||||
struct security_class_mapping {
|
||||
const char *name;
|
||||
const char *perms[sizeof(unsigned) * 8 + 1];
|
||||
};
|
||||
|
||||
#include "classmap.h"
|
||||
#include "initial_sid_to_string.h"
|
||||
|
||||
int main(int argc, char *argv[])
|
||||
{
|
||||
int i, j, mls = 0;
|
||||
int initial_sid_to_string_len;
|
||||
char **arg, *polout, *ctxout;
|
||||
|
||||
FILE *fout;
|
||||
|
||||
if (argc < 3)
|
||||
usage(argv[0]);
|
||||
arg = argv+1;
|
||||
if (argc==4 && strcmp(argv[1], "-m") == 0) {
|
||||
mls = 1;
|
||||
arg++;
|
||||
}
|
||||
polout = *arg++;
|
||||
ctxout = *arg;
|
||||
|
||||
fout = fopen(polout, "w");
|
||||
if (!fout) {
|
||||
printf("Could not open %s for writing\n", polout);
|
||||
usage(argv[0]);
|
||||
}
|
||||
|
||||
/* print out the classes */
|
||||
for (i = 0; secclass_map[i].name; i++)
|
||||
fprintf(fout, "class %s\n", secclass_map[i].name);
|
||||
fprintf(fout, "\n");
|
||||
|
||||
initial_sid_to_string_len = sizeof(initial_sid_to_string) / sizeof (char *);
|
||||
/* print out the sids */
|
||||
for (i = 1; i < initial_sid_to_string_len; i++)
|
||||
fprintf(fout, "sid %s\n", initial_sid_to_string[i]);
|
||||
fprintf(fout, "\n");
|
||||
|
||||
/* print out the class permissions */
|
||||
for (i = 0; secclass_map[i].name; i++) {
|
||||
struct security_class_mapping *map = &secclass_map[i];
|
||||
fprintf(fout, "class %s\n", map->name);
|
||||
fprintf(fout, "{\n");
|
||||
for (j = 0; map->perms[j]; j++)
|
||||
fprintf(fout, "\t%s\n", map->perms[j]);
|
||||
fprintf(fout, "}\n\n");
|
||||
}
|
||||
fprintf(fout, "\n");
|
||||
|
||||
/* NOW PRINT OUT MLS STUFF */
|
||||
if (mls) {
|
||||
printf("MLS not yet implemented\n");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
/* types, roles, and allows */
|
||||
fprintf(fout, "type base_t;\n");
|
||||
fprintf(fout, "role base_r types { base_t };\n");
|
||||
for (i = 0; secclass_map[i].name; i++)
|
||||
fprintf(fout, "allow base_t base_t:%s *;\n",
|
||||
secclass_map[i].name);
|
||||
fprintf(fout, "user user_u roles { base_r };\n");
|
||||
fprintf(fout, "\n");
|
||||
|
||||
/* default sids */
|
||||
for (i = 1; i < initial_sid_to_string_len; i++)
|
||||
fprintf(fout, "sid %s user_u:base_r:base_t\n", initial_sid_to_string[i]);
|
||||
fprintf(fout, "\n");
|
||||
|
||||
fprintf(fout, "fs_use_xattr ext2 user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_xattr ext3 user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_xattr ext4 user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_xattr jfs user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_xattr xfs user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_xattr reiserfs user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_xattr jffs2 user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_xattr gfs2 user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_xattr lustre user_u:base_r:base_t;\n");
|
||||
|
||||
fprintf(fout, "fs_use_task eventpollfs user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_task pipefs user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_task sockfs user_u:base_r:base_t;\n");
|
||||
|
||||
fprintf(fout, "fs_use_trans mqueue user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_trans devpts user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_trans hugetlbfs user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_trans tmpfs user_u:base_r:base_t;\n");
|
||||
fprintf(fout, "fs_use_trans shm user_u:base_r:base_t;\n");
|
||||
|
||||
fprintf(fout, "genfscon proc / user_u:base_r:base_t\n");
|
||||
|
||||
fclose(fout);
|
||||
|
||||
fout = fopen(ctxout, "w");
|
||||
if (!fout) {
|
||||
printf("Wrote policy, but cannot open %s for writing\n", ctxout);
|
||||
usage(argv[0]);
|
||||
}
|
||||
fprintf(fout, "/ user_u:base_r:base_t\n");
|
||||
fprintf(fout, "/.* user_u:base_r:base_t\n");
|
||||
fclose(fout);
|
||||
|
||||
return 0;
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue