2016-08-04 05:31:37 +02:00
|
|
|
# update_engine payload application permissions. These are shared between the
|
|
|
|
# background daemon and the recovery tool to sideload an update.
|
|
|
|
|
|
|
|
# Allow update_engine to reach block devices in /dev/block.
|
|
|
|
allow update_engine_common block_device:dir search;
|
|
|
|
|
|
|
|
# Allow read/write on system and boot partitions.
|
|
|
|
allow update_engine_common boot_block_device:blk_file rw_file_perms;
|
|
|
|
allow update_engine_common system_block_device:blk_file rw_file_perms;
|
2018-10-23 20:57:54 +02:00
|
|
|
|
|
|
|
# Where ioctls are granted via standard allow rules to block devices,
|
2018-10-23 21:28:40 +02:00
|
|
|
# automatically allow common ioctls that are generally needed by
|
|
|
|
# update_engine.
|
|
|
|
allowxperm update_engine_common dev_type:blk_file ioctl {
|
|
|
|
BLKDISCARD
|
|
|
|
BLKDISCARDZEROES
|
|
|
|
BLKROGET
|
|
|
|
BLKROSET
|
|
|
|
BLKSECDISCARD
|
|
|
|
BLKZEROOUT
|
|
|
|
};
|
2016-08-04 05:31:37 +02:00
|
|
|
|
|
|
|
# Allow to set recovery options in the BCB. Used to trigger factory reset when
|
|
|
|
# the update to an older version (channel change) or incompatible version
|
|
|
|
# requires it.
|
|
|
|
allow update_engine_common misc_block_device:blk_file rw_file_perms;
|
|
|
|
|
2017-07-11 05:39:50 +02:00
|
|
|
# read fstab
|
|
|
|
allow update_engine_common rootfs:dir getattr;
|
|
|
|
allow update_engine_common rootfs:file r_file_perms;
|
|
|
|
|
2016-08-04 05:31:37 +02:00
|
|
|
# Allow update_engine_common to mount on the /postinstall directory and reset the
|
|
|
|
# labels on the mounted filesystem to postinstall_file.
|
2017-06-24 00:48:42 +02:00
|
|
|
allow update_engine_common postinstall_mnt_dir:dir { mounton getattr search };
|
2016-08-04 05:31:37 +02:00
|
|
|
allow update_engine_common postinstall_file:filesystem { mount unmount relabelfrom relabelto };
|
|
|
|
allow update_engine_common labeledfs:filesystem relabelfrom;
|
|
|
|
|
|
|
|
# Allow update_engine_common to read and execute postinstall_file.
|
|
|
|
allow update_engine_common postinstall_file:file rx_file_perms;
|
|
|
|
allow update_engine_common postinstall_file:lnk_file r_file_perms;
|
|
|
|
allow update_engine_common postinstall_file:dir r_dir_perms;
|
|
|
|
|
2017-07-10 01:43:55 +02:00
|
|
|
# install update.zip from cache
|
|
|
|
r_dir_file(update_engine_common, cache_file)
|
2016-08-04 05:31:37 +02:00
|
|
|
|
|
|
|
# A postinstall program is typically a shell script (with a #!), so we allow
|
|
|
|
# to execute those.
|
|
|
|
allow update_engine_common shell_exec:file rx_file_perms;
|
|
|
|
|
|
|
|
# Allow update_engine_common to suspend, resume and kill the postinstall program.
|
2017-03-23 05:01:08 +01:00
|
|
|
allow update_engine_common postinstall:process { signal sigstop sigkill };
|
/proc, /sys access from uncrypt, update_engine, postinstall_dexopt
New types:
1. proc_random
2. sysfs_dt_firmware_android
Labeled:
1. /proc/sys/kernel/random as proc_random.
2. /sys/firmware/devicetree/base/firmware/android/{compatible, fstab,
vbmeta} as sysfs_dt_firmware_android.
Changed access:
1. uncrypt, update_engine, postinstall_dexopt have access to generic proc
and sysfs labels removed.
2. appropriate permissions were added to uncrypt, update_engine,
update_engine_common, postinstall_dexopt.
Bug: 67416435
Bug: 67416336
Test: fake ota go/manual-ab-ota runs without denials
Test: adb sideload runs without denials to new types
Change-Id: Id31310ceb151a18652fcbb58037a0b90c1f6505a
2017-10-04 19:34:11 +02:00
|
|
|
|
2017-11-20 20:02:03 +01:00
|
|
|
# access /proc/cmdline
|
/proc, /sys access from uncrypt, update_engine, postinstall_dexopt
New types:
1. proc_random
2. sysfs_dt_firmware_android
Labeled:
1. /proc/sys/kernel/random as proc_random.
2. /sys/firmware/devicetree/base/firmware/android/{compatible, fstab,
vbmeta} as sysfs_dt_firmware_android.
Changed access:
1. uncrypt, update_engine, postinstall_dexopt have access to generic proc
and sysfs labels removed.
2. appropriate permissions were added to uncrypt, update_engine,
update_engine_common, postinstall_dexopt.
Bug: 67416435
Bug: 67416336
Test: fake ota go/manual-ab-ota runs without denials
Test: adb sideload runs without denials to new types
Change-Id: Id31310ceb151a18652fcbb58037a0b90c1f6505a
2017-10-04 19:34:11 +02:00
|
|
|
allow update_engine_common proc_cmdline:file r_file_perms;
|
|
|
|
|
|
|
|
# Read files in /sys/firmware/devicetree/base/firmware/android/
|
|
|
|
r_dir_file(update_engine_common, sysfs_dt_firmware_android)
|
2018-08-24 00:01:56 +02:00
|
|
|
|
2019-06-22 00:50:07 +02:00
|
|
|
# Needed because libdm reads sysfs to validate when a dm path is ready.
|
|
|
|
r_dir_file(update_engine_common, sysfs_dm)
|
|
|
|
|
2018-08-24 00:01:56 +02:00
|
|
|
# read / write on /dev/device-mapper to map / unmap devices
|
|
|
|
allow update_engine_common dm_device:chr_file rw_file_perms;
|
|
|
|
|
|
|
|
# apply / verify updates on devices mapped via device mapper
|
|
|
|
allow update_engine_common dm_device:blk_file rw_file_perms;
|
|
|
|
|
|
|
|
# read / write metadata on super device to resize partitions
|
2019-03-22 21:55:13 +01:00
|
|
|
allow update_engine_common super_block_device_type:blk_file rw_file_perms;
|
2018-11-14 01:23:38 +01:00
|
|
|
|
|
|
|
# ioctl on super device to get block device alignment and alignment offset
|
2019-03-22 21:55:13 +01:00
|
|
|
allowxperm update_engine_common super_block_device_type:blk_file ioctl { BLKIOMIN BLKALIGNOFF };
|
2018-11-14 01:23:38 +01:00
|
|
|
|
|
|
|
# get physical block device to map logical partitions on device mapper
|
|
|
|
allow update_engine_common block_device:dir r_dir_perms;
|
2018-12-07 09:14:17 +01:00
|
|
|
|
|
|
|
# Allow update_engine_common to write to statsd socket.
|
|
|
|
unix_socket_send(update_engine_common, statsdw, statsd)
|
2019-07-25 22:28:19 +02:00
|
|
|
|
|
|
|
# Allow to read Virtual A/B feature flags.
|
|
|
|
get_prop(update_engine_common, virtual_ab_prop)
|
2019-08-07 22:01:15 +02:00
|
|
|
|
|
|
|
# Allow to read/write/create OTA metadata files for snapshot status and COW file status.
|
|
|
|
allow update_engine_common ota_metadata_file:dir rw_dir_perms;
|
|
|
|
allow update_engine_common ota_metadata_file:file create_file_perms;
|