Skip to content
Snippets Groups Projects
Commit 6cb56cc4 authored by Alex Klyubin's avatar Alex Klyubin Committed by android-build-merger
Browse files

Merge "Switch Keymaster HAL policy to _client/_server"

am: 38dc1e22

Change-Id: If47397bdc5dc7e488b6e6e1dcac059a6e6389f29
parents 4afe2e28 38dc1e22
No related branches found
No related tags found
No related merge requests found
...@@ -150,6 +150,8 @@ attribute hal_graphics_composer; ...@@ -150,6 +150,8 @@ attribute hal_graphics_composer;
attribute hal_health; attribute hal_health;
attribute hal_ir; attribute hal_ir;
attribute hal_keymaster; attribute hal_keymaster;
attribute hal_keymaster_client;
attribute hal_keymaster_server;
attribute hal_light; attribute hal_light;
attribute hal_memtrack; attribute hal_memtrack;
attribute hal_nfc; attribute hal_nfc;
......
# hwbinder access # HwBinder IPC from client to server
hwbinder_use(hal_keymaster) binder_call(hal_keymaster_client, hal_keymaster_server)
allow hal_keymaster tee_device:chr_file rw_file_perms; allow hal_keymaster tee_device:chr_file rw_file_perms;
allow hal_keymaster tee:unix_stream_socket connectto; allow hal_keymaster tee:unix_stream_socket connectto;
......
...@@ -8,14 +8,11 @@ binder_service(keystore) ...@@ -8,14 +8,11 @@ binder_service(keystore)
binder_call(keystore, system_server) binder_call(keystore, system_server)
# talk to keymaster # talk to keymaster
binder_call(keystore, hwservicemanager) hal_client_domain(keystore, hal_keymaster)
binder_call(keystore, hal_keymaster)
allow keystore keystore_data_file:dir create_dir_perms; allow keystore keystore_data_file:dir create_dir_perms;
allow keystore keystore_data_file:notdevfile_class_set create_file_perms; allow keystore keystore_data_file:notdevfile_class_set create_file_perms;
allow keystore keystore_exec:file { getattr }; allow keystore keystore_exec:file { getattr };
allow keystore tee_device:chr_file rw_file_perms;
allow keystore tee:unix_stream_socket connectto;
add_service(keystore, keystore_service) add_service(keystore, keystore_service)
allow keystore sec_key_att_app_id_provider_service:service_manager find; allow keystore sec_key_att_app_id_provider_service:service_manager find;
...@@ -23,9 +20,7 @@ allow keystore sec_key_att_app_id_provider_service:service_manager find; ...@@ -23,9 +20,7 @@ allow keystore sec_key_att_app_id_provider_service:service_manager find;
# Check SELinux permissions. # Check SELinux permissions.
selinux_check_access(keystore) selinux_check_access(keystore)
allow keystore ion_device:chr_file r_file_perms;
r_dir_file(keystore, cgroup) r_dir_file(keystore, cgroup)
allow keystore system_file:dir r_dir_perms;
### ###
### Neverallow rules ### Neverallow rules
......
...@@ -27,7 +27,6 @@ allow vold shell_exec:file rx_file_perms; ...@@ -27,7 +27,6 @@ allow vold shell_exec:file rx_file_perms;
typeattribute vold mlstrustedsubject; typeattribute vold mlstrustedsubject;
allow vold self:process setfscreate; allow vold self:process setfscreate;
allow vold system_file:dir r_dir_perms;
allow vold system_file:file x_file_perms; allow vold system_file:file x_file_perms;
allow vold block_device:dir create_dir_perms; allow vold block_device:dir create_dir_perms;
allow vold device:dir write; allow vold device:dir write;
...@@ -87,8 +86,6 @@ allow vold fsck_exec:file { r_file_perms execute }; ...@@ -87,8 +86,6 @@ allow vold fsck_exec:file { r_file_perms execute };
allow vold fscklogs:dir rw_dir_perms; allow vold fscklogs:dir rw_dir_perms;
allow vold fscklogs:file create_file_perms; allow vold fscklogs:file create_file_perms;
allow vold ion_device:chr_file r_file_perms;
# #
# Rules to support encrypted fs support. # Rules to support encrypted fs support.
# #
...@@ -131,9 +128,7 @@ binder_use(vold) ...@@ -131,9 +128,7 @@ binder_use(vold)
binder_call(vold, healthd) binder_call(vold, healthd)
# talk to keymaster # talk to keymaster
binder_call(vold, hwservicemanager) hal_client_domain(vold, hal_keymaster)
binder_call(vold, hal_keymaster)
allow vold tee_device:chr_file rw_file_perms;
# Access userdata block device. # Access userdata block device.
allow vold userdata_block_device:blk_file rw_file_perms; allow vold userdata_block_device:blk_file rw_file_perms;
......
type hal_keymaster_default, domain; type hal_keymaster_default, domain;
hal_impl_domain(hal_keymaster_default, hal_keymaster) hal_server_domain(hal_keymaster_default, hal_keymaster)
type hal_keymaster_default_exec, exec_type, file_type; type hal_keymaster_default_exec, exec_type, file_type;
init_daemon_domain(hal_keymaster_default) init_daemon_domain(hal_keymaster_default)
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment