Add sepolicy rule to access persistent partition MTK-Commit-Id: 526949cb99c2297d01f156ffb6ed6946deff348a Change-Id: Ic9143dc14bbbac7db410f8450c34df54609d01dd CR-Id: ALPS03852714 Feature: Trustonic TEE (Trusted Execution Environment)
18 lines
749 B
Plaintext
18 lines
749 B
Plaintext
type hal_keymaster_attestation, domain;
|
|
hal_server_domain(hal_keymaster_attestation, mtk_hal_keyattestation)
|
|
|
|
type hal_keymaster_attestation_exec, exec_type, vendor_file_type, file_type;
|
|
init_daemon_domain(hal_keymaster_attestation)
|
|
|
|
hwbinder_use(hal_keymaster_attestation);
|
|
|
|
#============= hal_keymaster_attestation ==============
|
|
allow hal_keymaster_attestation tee_device:chr_file { read write open ioctl };
|
|
|
|
# Date : WK17.42 2017/10/19
|
|
# Operation: Keymaster 3.0
|
|
# Purpose: Access attestation key in persist partition
|
|
allow hal_keymaster_attestation mnt_vendor_file:dir search;
|
|
allow hal_keymaster_attestation persist_data_file:dir { write search add_name };
|
|
allow hal_keymaster_attestation persist_data_file:file { write create open getattr };
|