Nick Kralevich 84e9766a10 sdm660-common: sepolicy: Allow MMC_IOC_CMD
system/sepolicy commit 4c8eaba75ac980805e0ab844afff5c062359d7ad ("start
enforcing ioctl restrictions on blk_file",
https://android-review.googlesource.com/c/platform/system/sepolicy/+/793958)
required that all SELinux domains be explicit about the ioctls they are
using on block devices. Update the tee.te policy to be explicit about
its use of the MMC_IOC_CMD ioctl.

Fixes a bug with fingerprint functionality.

Addresses the following denial:

qseecomd: type=1400 audit(0.0:183): avc: denied { ioctl } for path="/dev/block/mmcblk0rpmb" dev="tmpfs" ino=22157 ioctlcmd=0xb300 scontext=u:r:tee:s0 tcontext=u:object_r:rpmb_device:s0 tclass=blk_file permissive=0

STEPS TO REPRODUCE:
1.flash to the os version Bonito/Sargo_QP1A.190123.001
2.completed the SUW
3. use command adb root > adb shell setenforce 0
4.go to setting->security
5.set pixel imprint(fingerprint)+pin, functions can work without setting AP crash
6. Devices can unlock screen with pin code and fingerprint

Change-Id: I6620a5bd9e07f40655fb92f5079d481373deb04f
Fixes: 122999825
Test: Compiles. I am unable to test further without a testing device.
2019-10-24 20:11:55 +02:00
2019-10-14 22:06:45 +00:00
2019-10-14 22:06:45 +00:00

Common Tree for Nokia SDM660 Based Devices
Description
No description provided
Readme 2.1 MiB
Languages
Shell 74.2%
C++ 16.8%
Makefile 7.6%
Forth 0.9%
Python 0.5%