Skip to content

Commit 331e3bd

Browse files
allightTreehugger Robot
authored and
Treehugger Robot
committed
Allow /postinstall files to have custom contexts
We were mounting /postinstall with a 'context=...' option. This forces all files within /postinstall to have a single selinux context, limiting the possible granularity of our policies. Here we change it to simply default to the 'postinstall_file' context for the 'system' partition but allow individual files to have their own custom contexts defined by /system/sepolicy. Other partitions retain the single 'postinstall_file' context. The sample_images were updated to manually add a selinux label for testing FS contexts. Test: Manual OTA of blueline Test: atest update_engine_unittests Bug: 181182967 Change-Id: I0b8c2b2228fa08afecb64da9c276737eb9ae3631 Merged-In: I0b8c2b2228fa08afecb64da9c276737eb9ae3631
1 parent 4f28a6c commit 331e3bd

14 files changed

+79
-14
lines changed

aosp/hardware_android.cc

+26
Original file line numberDiff line numberDiff line change
@@ -346,4 +346,30 @@ ErrorCode HardwareAndroid::IsPartitionUpdateValid(
346346
return error_code;
347347
}
348348

349+
// Mount options for non-system partitions. This option causes selinux treat
350+
// every file in the mounted filesystem as having the 'postinstall_file'
351+
// context, regardless of what the filesystem itself records. See "SELinux
352+
// User's and Administrator's Guide" for more information on this option.
353+
constexpr const char* kDefaultPostinstallMountOptions =
354+
"context=u:object_r:postinstall_file:s0";
355+
356+
// Mount options for system partitions. This option causes selinux to use the
357+
// 'postinstall_file' context as a fallback if there are no other selinux
358+
// contexts associated with the file in the mounted partition. See "SELinux
359+
// User's and Administrator's Guide" for more information on this option.
360+
constexpr const char* kSystemPostinstallMountOptions =
361+
"defcontext=u:object_r:postinstall_file:s0";
362+
363+
// Name of the system-partition
364+
constexpr std::string_view kSystemPartitionName = "system";
365+
366+
const char* HardwareAndroid::GetPartitionMountOptions(
367+
const std::string& partition_name) const {
368+
if (partition_name == kSystemPartitionName) {
369+
return kSystemPostinstallMountOptions;
370+
} else {
371+
return kDefaultPostinstallMountOptions;
372+
}
373+
}
374+
349375
} // namespace chromeos_update_engine

aosp/hardware_android.h

+2
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ class HardwareAndroid : public HardwareInterface {
6464
[[nodiscard]] ErrorCode IsPartitionUpdateValid(
6565
const std::string& partition_name,
6666
const std::string& new_version) const override;
67+
[[nodiscard]] const char* GetPartitionMountOptions(
68+
const std::string& partition_name) const override;
6769

6870
private:
6971
DISALLOW_COPY_AND_ASSIGN(HardwareAndroid);

aosp/platform_constants_android.cc

-2
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,6 @@ const char kCACertificatesPath[] = "/system/etc/security/cacerts_google";
3131
// No deadline file API support on Android.
3232
const char kOmahaResponseDeadlineFile[] = "";
3333
const char kNonVolatileDirectory[] = "/data/misc/update_engine";
34-
const char kPostinstallMountOptions[] =
35-
"context=u:object_r:postinstall_file:s0";
3634

3735
} // namespace constants
3836
} // namespace chromeos_update_engine

common/fake_hardware.h

+11
Original file line numberDiff line numberDiff line change
@@ -216,6 +216,17 @@ class FakeHardware : public HardwareInterface {
216216
return utils::IsTimestampNewer(old_version, new_version);
217217
}
218218

219+
const char* GetPartitionMountOptions(
220+
const std::string& partition_name) const override {
221+
#ifdef __ANDROID__
222+
// TODO(b/181182967): This matches the declaration in hardware_android.cc
223+
// but ideally shouldn't be duplicated.
224+
return "defcontext=u:object_r:postinstall_file:s0";
225+
#else
226+
return "";
227+
#endif
228+
}
229+
219230
private:
220231
bool is_official_build_{true};
221232
bool is_normal_boot_mode_{true};

common/hardware_interface.h

+3
Original file line numberDiff line numberDiff line change
@@ -160,6 +160,9 @@ class HardwareInterface {
160160
virtual ErrorCode IsPartitionUpdateValid(
161161
const std::string& partition_name,
162162
const std::string& new_version) const = 0;
163+
164+
virtual const char* GetPartitionMountOptions(
165+
const std::string& partition_name) const = 0;
163166
};
164167

165168
} // namespace chromeos_update_engine

common/platform_constants.h

-4
Original file line numberDiff line numberDiff line change
@@ -54,10 +54,6 @@ extern const char kOmahaResponseDeadlineFile[];
5454
// The stateful directory used by update_engine.
5555
extern const char kNonVolatileDirectory[];
5656

57-
// Options passed to the filesystem when mounting the new partition during
58-
// postinstall.
59-
extern const char kPostinstallMountOptions[];
60-
6157
#ifdef __ANDROID_RECOVERY__
6258
constexpr bool kIsRecovery = true;
6359
#else

cros/hardware_chromeos.cc

+5
Original file line numberDiff line numberDiff line change
@@ -363,4 +363,9 @@ ErrorCode HardwareChromeOS::IsPartitionUpdateValid(
363363
return ErrorCode::kSuccess;
364364
}
365365

366+
const char* HardwareChromeOS::GetPartitionMountOptions(
367+
const std::string& partition_name) const {
368+
return "";
369+
}
370+
366371
} // namespace chromeos_update_engine

cros/hardware_chromeos.h

+2
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,8 @@ class HardwareChromeOS final : public HardwareInterface {
6868
ErrorCode IsPartitionUpdateValid(
6969
const std::string& partition_name,
7070
const std::string& new_version) const override;
71+
const char* GetPartitionMountOptions(
72+
const std::string& partition_name) const override;
7173

7274
private:
7375
friend class HardwareChromeOSTest;

cros/platform_constants_chromeos.cc

-1
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,6 @@ const char kCACertificatesPath[] = "/usr/share/chromeos-ca-certificates";
3232
const char kOmahaResponseDeadlineFile[] = "/tmp/update-check-response-deadline";
3333
// This directory is wiped during powerwash.
3434
const char kNonVolatileDirectory[] = "/var/lib/update_engine";
35-
const char kPostinstallMountOptions[] = "";
3635

3736
} // namespace constants
3837
} // namespace chromeos_update_engine

payload_consumer/postinstall_runner_action.cc

+6-5
Original file line numberDiff line numberDiff line change
@@ -191,11 +191,12 @@ void PostinstallRunnerAction::PerformPartitionPostinstall() {
191191
}
192192
#endif // __ANDROID__
193193

194-
if (!utils::MountFilesystem(mountable_device,
195-
fs_mount_dir_,
196-
MS_RDONLY,
197-
partition.filesystem_type,
198-
constants::kPostinstallMountOptions)) {
194+
if (!utils::MountFilesystem(
195+
mountable_device,
196+
fs_mount_dir_,
197+
MS_RDONLY,
198+
partition.filesystem_type,
199+
hardware_->GetPartitionMountOptions(partition.name))) {
199200
return CompletePartitionPostinstall(
200201
1, "Error mounting the device " + mountable_device);
201202
}

payload_consumer/postinstall_runner_action_unittest.cc

+10-1
Original file line numberDiff line numberDiff line change
@@ -403,14 +403,23 @@ TEST_F(PostinstallRunnerActionTest, RunAsRootAbsolutePathNotAllowedTest) {
403403
}
404404

405405
#ifdef __ANDROID__
406-
// Check that the postinstall file is relabeled to the postinstall label.
406+
// Check that the postinstall file is labeled to the postinstall_exec label.
407407
// SElinux labels are only set on Android.
408408
TEST_F(PostinstallRunnerActionTest, RunAsRootCheckFileContextsTest) {
409409
ScopedLoopbackDeviceBinder loop(postinstall_image_, false, nullptr);
410410
RunPostinstallAction(
411411
loop.dev(), "bin/self_check_context", false, false, false);
412412
EXPECT_EQ(ErrorCode::kSuccess, processor_delegate_.code_);
413413
}
414+
415+
// Check that the postinstall file is relabeled to the default postinstall
416+
// label. SElinux labels are only set on Android.
417+
TEST_F(PostinstallRunnerActionTest, RunAsRootCheckDefaultFileContextsTest) {
418+
ScopedLoopbackDeviceBinder loop(postinstall_image_, false, nullptr);
419+
RunPostinstallAction(
420+
loop.dev(), "bin/self_check_default_context", false, false, false);
421+
EXPECT_EQ(ErrorCode::kSuccess, processor_delegate_.code_);
422+
}
414423
#endif // __ANDROID__
415424

416425
// Check that you can suspend/resume postinstall actions.

sample_images/generate_images.sh

+14-1
Original file line numberDiff line numberDiff line change
@@ -184,16 +184,29 @@ echo global_progress 0.25 >&3
184184
echo global_progress 0.5 >&3
185185
echo global_progress 1.0 >&3
186186
exit 0
187+
EOF
188+
189+
# An unlabeled postinstall bash program.
190+
sudo tee "${mntdir}"/bin/self_check_default_context >/dev/null <<EOF
191+
#!/etc/../bin/sh
192+
echo "This is my context:"
193+
ls -lZ "\$0"
194+
ls -lZ "\$0" | grep -F ' u:object_r:postinstall_file:s0 ' || exit 5
195+
exit 0
187196
EOF
188197

189198
# A postinstall bash program.
190199
sudo tee "${mntdir}"/bin/self_check_context >/dev/null <<EOF
191200
#!/etc/../bin/sh
192201
echo "This is my context:"
193-
ls -lZ "\$0" | grep -F ' u:object_r:postinstall_file:s0 ' || exit 5
202+
ls -lZ "\$0"
203+
ls -lZ "\$0" | grep -F ' u:object_r:postinstall_exec:s0 ' || exit 5
194204
exit 0
195205
EOF
196206

207+
# Give the test function the context we expect the postinstall-executable to have.
208+
sudo setfattr -n security.selinux -v u:object_r:postinstall_exec:s0 "${mntdir}"/bin/self_check_context
209+
197210
sudo tee "${mntdir}"/postinst >/dev/null <<EOF
198211
#!/etc/../bin/sh
199212
echo "postinst"

sample_images/sample_images.tar.bz2

-827 Bytes
Binary file not shown.

sample_images/sample_payloads.tar.xz

-200 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)