summaryrefslogtreecommitdiff
path: root/sepolicy
diff options
context:
space:
mode:
authorMatthew Maurer <mmaurer@google.com>2019-03-07 17:01:23 -0800
committerMatthew Maurer <mmaurer@google.com>2019-04-02 16:49:21 -0700
commit3a99f0fba1dd93dc733d5e9c14c32fa436c0cefe (patch)
tree15394dd6516f07deedc823963f880ad0bddcd617 /sepolicy
parente815a66c4df85c3e040fdd1f1087ab345933c801 (diff)
downloadtrusty-3a99f0fba1dd93dc733d5e9c14c32fa436c0cefe.tar.gz
Enable Trusty Gatekeeper 1.0 and Keymaster 3.0
Activates both services, and installs VTS to allow for testing them. Fails one subtest of keymaster@3.0 VTS at the moment, but so does the default emulator, so this is either a bug in system/keymaster or VTS. Bug: 127700127 Test: VTS for gatekeeper@1.0, VTS for keymaster@3.0 Change-Id: I53a901c090dd5cbaddab0d430e28f9b7de8dda89
Diffstat (limited to 'sepolicy')
-rw-r--r--sepolicy/file_contexts2
1 files changed, 2 insertions, 0 deletions
diff --git a/sepolicy/file_contexts b/sepolicy/file_contexts
index 42e1b50..94f5594 100644
--- a/sepolicy/file_contexts
+++ b/sepolicy/file_contexts
@@ -4,3 +4,5 @@
/vendor/bin/storageproxyd u:object_r:tee_exec:s0
/data/vendor/var/run(/.*)? u:object_r:varrun_file:s0
/data/vendor/ss(/.*)? u:object_r:tee_data_file:s0
+/vendor/bin/hw/android.hardware.gatekeeper@1.0-service.trusty u:object_r:hal_gatekeeper_default_exec:s0
+/vendor/bin/hw/android.hardware.keymaster@3.0-service.trusty u:object_r:hal_keymaster_default_exec:s0