summaryrefslogtreecommitdiff
authorMingyen Hung <mingyen.hung@amlogic.com>2019-10-02 07:15:57 (GMT)
committer Liang Ji <liang.ji@amlogic.com>2019-10-14 07:23:24 (GMT)
commit9fe66bdfef602d9cb42639386a1f0b9f8773c15b (patch)
tree38fca5ab94ba24daca7ce6fc3cea9e478363007d
parent5524715587def6047a20cf8554477be374d799fd (diff)
downloadcommon-9fe66bdfef602d9cb42639386a1f0b9f8773c15b.zip
common-9fe66bdfef602d9cb42639386a1f0b9f8773c15b.tar.gz
common-9fe66bdfef602d9cb42639386a1f0b9f8773c15b.tar.bz2
keymaster3: Port verified boot to P [2/2]
PD#SWPL-14654 Bug=141483018 Problem: Permission denied when reading some properties in keymaster HAL. Solution: 1. Add some selinux rules to allow properties read in keymaster HAL. Verify: 1. Android P + Franklin 2. run modified VtsHalKeymasterV3_0TargetTest attached in SWPL-14654 Change-Id: Iff3e1fa321ea93ceea2fc2c4cc95ca4af948c1e7 Signed-off-by: Mingyen Hung <mingyen.hung@amlogic.com>
Diffstat
-rwxr-xr-xsepolicy/hal_keymaster_default.te1
-rwxr-xr-xsepolicy/property_contexts4
2 files changed, 5 insertions, 0 deletions
diff --git a/sepolicy/hal_keymaster_default.te b/sepolicy/hal_keymaster_default.te
index 2428584..be067a4 100755
--- a/sepolicy/hal_keymaster_default.te
+++ b/sepolicy/hal_keymaster_default.te
@@ -1 +1,2 @@
allow hal_keymaster_default drm_device:chr_file { read open write ioctl };
+allow hal_keymaster_default exported2_default_prop:file { read getattr };
diff --git a/sepolicy/property_contexts b/sepolicy/property_contexts
index 90d4f83..197004d 100755
--- a/sepolicy/property_contexts
+++ b/sepolicy/property_contexts
@@ -28,3 +28,7 @@ ro.vendor.app u:object_r:vendor_app_prop:s0
atv. u:object_r:atv_prop:s0
ro.net.pppoe u:object_r:net_pppoe_prop:s0
persist.miracast.hdcp2 u:object_r:miracast_prop:s0
+
+ro.boot.vbmeta.bootkey_hash u:object_r:exported2_default_prop:s0
+ro.boot.vbmeta.device_state u:object_r:exported2_default_prop:s0
+ro.boot.vbmeta.digest u:object_r:exported2_default_prop:s0