update_verifier.te 1.3 KB

123456789101112131415161718192021222324252627282930313233343536
  1. # update_verifier
  2. type update_verifier, domain;
  3. type update_verifier_exec, system_file_type, exec_type, file_type;
  4. # Allow update_verifier to reach block devices in /dev/block.
  5. allow update_verifier block_device:dir search;
  6. # Read care map in /data/ota_package/.
  7. allow update_verifier ota_package_file:dir r_dir_perms;
  8. allow update_verifier ota_package_file:file r_file_perms;
  9. # Read /sys/block to find all the DM directories like (/sys/block/dm-X).
  10. allow update_verifier sysfs:dir r_dir_perms;
  11. # Read /sys/block/dm-X/dm/name (which is a symlink to
  12. # /sys/devices/virtual/block/dm-X/dm/name) to identify the mapping between
  13. # dm-X and system/vendor partitions.
  14. allow update_verifier sysfs_dm:dir r_dir_perms;
  15. allow update_verifier sysfs_dm:file r_file_perms;
  16. # Read all blocks in DM wrapped system partition.
  17. allow update_verifier dm_device:blk_file r_file_perms;
  18. # Write to kernel message.
  19. allow update_verifier kmsg_device:chr_file { getattr w_file_perms };
  20. # Allow update_verifier to reboot the device.
  21. set_prop(update_verifier, powerctl_prop)
  22. # Use Boot Control HAL
  23. hal_client_domain(update_verifier, hal_bootctl)
  24. # Access Checkpoint commands over binder
  25. allow update_verifier vold_service:service_manager find;
  26. binder_call(update_verifier, servicemanager)
  27. binder_call(update_verifier, vold)