Skip to content
Snippets Groups Projects
  1. Jan 24, 2017
    • Steven Moreland's avatar
      update_verifier: read dir perms · bafa38e0
      Steven Moreland authored
      Allow update_verifier to load the boot_control_hal in passthrough mode.
      
      Test: update_verifier works, no denials
      Bug: 34656553
      Change-Id: I5c20ce67c8f1fd195f2429dae497221514ed95a8
      bafa38e0
  2. Nov 21, 2016
    • Connor O'Brien's avatar
      Add permissions for hal_boot · 12443b7a
      Connor O'Brien authored
      
      The service running the boot control HAL needs the permissions
      provided by the boot_control_hal attribute. update_engine and
      update_verifier still also need these permissions in order
      to successfully call the new HAL in pass-through mode, but also
      need permission to call the new service.
      
      Bug: 31864052
      Test: Built and confirmed no permission denials.
      Change-Id: I2a6fdd5cf79b9e461d7cc14bd5b7abd6481ed911
      Signed-off-by: default avatarConnor O'Brien <connoro@google.com>
      12443b7a
  3. Nov 18, 2016
  4. Nov 15, 2016
    • Alex Deymo's avatar
      Move boot_control_hal attribute to hal_boot domain · 1f329465
      Alex Deymo authored
      Grant boot_control_hal permissions to the hal_boot service;
      update_engine and update_verifier can call that service rather
      than using those permissions themselves.
      
      Bug: 31864052
      Test: `bootctl set-active-boot-slot 1`
      Change-Id: I5188bc32e7933d4a0f5135b3246df119d3523d69
      1f329465
  5. Nov 09, 2016
  6. Oct 06, 2016
    • dcashman's avatar
      Split general policy into public and private components. · cc39f637
      dcashman authored
      Divide policy into public and private components.  This is the first
      step in splitting the policy creation for platform and non-platform
      policies.  The policy in the public directory will be exported for use
      in non-platform policy creation.  Backwards compatibility with it will
      be achieved by converting the exported policy into attribute-based
      policy when included as part of the non-platform policy and a mapping
      file will be maintained to be included with the platform policy that
      maps exported attributes of previous versions to the current platform
      version.
      
      Eventually we would like to create a clear interface between the
      platform and non-platform device components so that the exported policy,
      and the need for attributes is minimal.  For now, almost all types and
      avrules are left in public.
      
      Test: Tested by building policy and running on device.
      
      Change-Id: Idef796c9ec169259787c3f9d8f423edf4ce27f8c
      cc39f637
  7. Sep 14, 2016
    • Tianjie Xu's avatar
      Add sepolicy for update_verifier · 59379d8b
      Tianjie Xu authored
      (cherry picked from commit 5d8d2dc9)
      
      Grant update_verifier the permissions to read /data/ota_package/
      and the blocks on system partition.
      
      The denial messages:
      update_verifier: type=1400 audit(0.0:29): avc: denied { read }
      scontext=u:r:update_verifier:s0 tcontext=u:object_r:ota_package_file:s0 tclass=file permissive=1
      
      update_verifier: type=1400 audit(0.0:30): avc: denied { open }
      scontext=u:r:update_verifier:s0 tcontext=u:object_r:ota_package_file:s0 tclass=file permissive=1
      
      update_verifier: type=1400 audit(0.0:31): avc: denied { read } dev="tmpfs"
      scontext=u:r:update_verifier:s0 tcontext=u:object_r:system_block_device:s0 tclass=blk_file permissive=1
      
      update_verifier: type=1400 audit(0.0:32): avc: denied { open } dev="tmpfs"
      scontext=u:r:update_verifier:s0 tcontext=u:object_r:system_block_device:s0 tclass=blk_file permissive=1
      
      Test: On device, update_verifier reads the blocks successfully during boot time.
      Bug: 30020920
      
      Change-Id: I10777c1e6ba649b82c4a73171124742edeb05997
      59379d8b
    • Tao Bao's avatar
      update_verifier: Allow searching /dev/block. · 1e17dafc
      Tao Bao authored
      update_verifier calls bootcontrol HAL to mark the currently booting slot
      as successfully booted.
      
      avc: denied { search } for name="block" dev="tmpfs" scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
      avc: denied { search } for name="block" dev="tmpfs" scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
      
      Bug: 29569601
      Test: Device boots up with no update_verifier denials and 'bootctl is-slot-marked-successful 0' returns 0.
      Change-Id: I1baa7819bc829e3c4b83d7168008a5b06b01cc9f
      1e17dafc
  8. Jul 13, 2016
    • Tianjie Xu's avatar
      Add sepolicy for update_verifier · 5d8d2dc9
      Tianjie Xu authored
      Grant update_verifier the permissions to read /data/ota_package/
      and the blocks on system partition.
      
      The denial messages:
      update_verifier: type=1400 audit(0.0:29): avc: denied { read } for name="care_map.txt" dev="sda35"
      ino=1368066 scontext=u:r:update_verifier:s0 tcontext=u:object_r:ota_package_file:s0 tclass=file permissive=1
      
      update_verifier: type=1400 audit(0.0:30): avc: denied { open } for path="/data/ota_package/care_map.txt" dev="sda35"
      ino=1368066 scontext=u:r:update_verifier:s0 tcontext=u:object_r:ota_package_file:s0 tclass=file permissive=1
      
      update_verifier: type=1400 audit(0.0:31): avc: denied { read } for name="sda33" dev="tmpfs" ino=5613
      scontext=u:r:update_verifier:s0 tcontext=u:object_r:system_block_device:s0 tclass=blk_file permissive=1
      
      update_verifier: type=1400 audit(0.0:32): avc: denied { open } for path="/dev/block/sda33" dev="tmpfs" ino=5613
      scontext=u:r:update_verifier:s0 tcontext=u:object_r:system_block_device:s0 tclass=blk_file permissive=1
      
      Test: On sailfish, update_verifier reads the blocks successfully during boot time.
      Bug: 30020920
      
      Change-Id: I10777c1e6ba649b82c4a73171124742edeb05997
      5d8d2dc9
  9. Jun 22, 2016
    • Tao Bao's avatar
      update_verifier: Allow searching /dev/block. · 6a9c4d4c
      Tao Bao authored
      update_verifier calls bootcontrol HAL to mark the currently booting slot
      as successfully booted.
      
      avc: denied { search } for name="block" dev="tmpfs" ino=15510 scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
      avc: denied { search } for name="block" dev="tmpfs" ino=15510 scontext=u:r:update_verifier:s0 tcontext=u:object_r:block_device:s0 tclass=dir permissive=0
      
      Bug: 29569601
      Test: Marlin boots up with no update_verifier denials and 'bootctl is-slot-marked-successful 0' returns 0.
      Change-Id: I1baa7819bc829e3c4b83d7168008a5b06b01cc9f
      6a9c4d4c
  10. Apr 22, 2016
    • Alex Deymo's avatar
      Move boot_control HAL permissions to an attribute. · 7b8413db
      Alex Deymo authored
      The boot_control HAL is library loaded by our daemons (like
      update_engine and update_verifier) that interacts with the bootloader.
      The actual implementation of this library is provided by the vendor and
      its runtime permissions are tied to this implementation which varies a
      lot based on how the bootloader and the partitions it uses are
      structured.
      
      This patch moves these permissions to an attribute so the attribute can
      be expanded on each device without the need to repeat that on each one
      of our daemons using the boot_control HAL.
      
      Bug: 27107517
      
      (cherry picked from commit 0f8d9261)
      
      Change-Id: Icb2653cb89812c0de81381ef48280e4ad1e9535c
      7b8413db
    • Alex Deymo's avatar
      Move boot_control HAL permissions to an attribute. · 0f8d9261
      Alex Deymo authored
      The boot_control HAL is library loaded by our daemons (like
      update_engine and update_verifier) that interacts with the bootloader.
      The actual implementation of this library is provided by the vendor and
      its runtime permissions are tied to this implementation which varies a
      lot based on how the bootloader and the partitions it uses are
      structured.
      
      This patch moves these permissions to an attribute so the attribute can
      be expanded on each device without the need to repeat that on each one
      of our daemons using the boot_control HAL.
      
      Bug: 27107517
      Change-Id: Idfe6a208720b49802b03f70fee4a3e73030dae2e
      0f8d9261
  11. Dec 08, 2015
Loading