Preliminary policy for hal_keymaster (TREBLE)
am: e8acd7695b
Change-Id: I24a7a10a4658f6db968ba13e556172659b859795
This commit is contained in:
commit
02ce635b35
6 changed files with 21 additions and 0 deletions
|
@ -253,6 +253,7 @@
|
|||
/system/bin/hw/android\.hardware\.graphics\.composer@2\.1-service u:object_r:hal_graphics_composer_default_exec:s0
|
||||
/system/bin/hw/android\.hardware\.health@1\.0-service u:object_r:hal_health_default_exec:s0
|
||||
/system/bin/hw/android\.hardware\.ir@1\.0-service u:object_r:hal_ir_default_exec:s0
|
||||
/system/bin/hw/android\.hardware\.keymaster@3\.0-service u:object_r:hal_keymaster_default_exec:s0
|
||||
/system/bin/hw/android\.hardware\.light@2\.0-service u:object_r:hal_light_default_exec:s0
|
||||
/system/bin/hw/android\.hardware\.memtrack@1\.0-service u:object_r:hal_memtrack_default_exec:s0
|
||||
/system/bin/hw/android\.hardware\.nfc@1\.0-service u:object_r:hal_nfc_default_exec:s0
|
||||
|
|
5
private/hal_keymaster.te
Normal file
5
private/hal_keymaster.te
Normal file
|
@ -0,0 +1,5 @@
|
|||
type hal_keymaster_default, domain;
|
||||
hal_impl_domain(hal_keymaster_default, hal_keymaster)
|
||||
|
||||
type hal_keymaster_default_exec, exec_type, file_type;
|
||||
init_daemon_domain(hal_keymaster_default)
|
|
@ -131,6 +131,7 @@ attribute hal_graphics_allocator;
|
|||
attribute hal_graphics_composer;
|
||||
attribute hal_health;
|
||||
attribute hal_ir;
|
||||
attribute hal_keymaster;
|
||||
attribute hal_light;
|
||||
attribute hal_memtrack;
|
||||
attribute hal_nfc;
|
||||
|
|
7
public/hal_keymaster.te
Normal file
7
public/hal_keymaster.te
Normal file
|
@ -0,0 +1,7 @@
|
|||
# hwbinder access
|
||||
hwbinder_use(hal_keymaster)
|
||||
|
||||
allow hal_keymaster tee_device:chr_file rw_file_perms;
|
||||
allow hal_keymaster tee:unix_stream_socket connectto;
|
||||
|
||||
allow hal_keymaster ion_device:chr_file r_file_perms;
|
|
@ -6,6 +6,11 @@ typeattribute keystore mlstrustedsubject;
|
|||
binder_use(keystore)
|
||||
binder_service(keystore)
|
||||
binder_call(keystore, system_server)
|
||||
|
||||
# talk to keymaster
|
||||
binder_call(keystore, hwservicemanager)
|
||||
binder_call(keystore, hal_keymaster)
|
||||
|
||||
allow keystore keystore_data_file:dir create_dir_perms;
|
||||
allow keystore keystore_data_file:notdevfile_class_set create_file_perms;
|
||||
allow keystore keystore_exec:file { getattr };
|
||||
|
|
|
@ -130,6 +130,8 @@ binder_use(vold)
|
|||
binder_call(vold, healthd)
|
||||
|
||||
# talk to keymaster
|
||||
binder_call(vold, hwservicemanager)
|
||||
binder_call(vold, hal_keymaster)
|
||||
allow vold tee_device:chr_file rw_file_perms;
|
||||
|
||||
# Access userdata block device.
|
||||
|
|
Loading…
Reference in a new issue