Aayush Gupta 5c601a9ada non_plat: Label /dev/ut_keymaster and allow relevant permissions to sources
/dev/ut_keymaster is used by keymaster. Label it and allow relevant permissions
which domains using it (vold, tee and keymaster) requires.

Denial observed without this change:
[   46.666247] .(2)[399:logd.auditd]type=1400 audit(1609128921.744:392): avc: denied { ioctl } for comm="keymaster@3.0-s" path="/dev/ut_keymaster" dev="tmpfs" ino=17464 ioctlcmd=0x5402 scontext=u:r:hal_keymaster_default:s0 tcontext=u:object_r:device:s0 tclass=chr_file permissive=1

Test: Boot and notice that denial no longer appears

Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com>
Change-Id: Iee0126d637a139397db8857d8a780277c3ea4576
2020-12-30 16:14:46 +05:30
2020-01-18 10:10:42 +08:00

SELinux policy for MediaTek devices

Don't recurse into the platform makefiles. We don't care about them, and we don't want to force a reset of BOARD_SEPOLICY_DIRS.

If you want to use these policies, add a

include device/mediatek/sepolicy/sepolicy.mk

to your device's BoardConfig. It is highly recommended that in case you have your own BOARD_SEPOLICY_DIRS declaration, the inclusion happens before those lines

Repository Details

This repository uses device/mediatek/wembley-sepolicy as base till 4769fb0d973bf079934054c6c5423ca06d67010a. After that Google's device-specific changes starts.

Till 4769fb0d973bf079934054c6c5423ca06d67010a, this repository is similar to the basic sepolicy repository provided by MediaTek to the OEMs.

Description
No description provided
Readme 1.4 MiB
Languages
Makefile 100%