From b9beafc9fa61b89dd00bdc2b51163e7870d34dac Mon Sep 17 00:00:00 2001 From: Stephen Crane Date: Tue, 14 Dec 2021 14:33:56 -0800 Subject: [PATCH] Allow TEE storageproxyd permissions needed for DSU handling Allows the vendor TEE access to GSI metadata files (which are publicly readable). Storageproxyd needs access to this metadata to determine if a GSI image is currently booted. Also allows the TEE domain to make new directories in its data path. Includes the fixed directory creation permission change from Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a. Test: access /metadata/gsi/dsu/booted from storageproxyd Bug: 203719297 Merged-In: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b Merged-In: Ifcc3e5f82b68a506ff99469d2f3df6ab1440b42a Change-Id: I86055dd5601f8c2899d28f29bdfcb4dcb9b90d1b (cherry picked from commit b69ac35ff006cccbeee26f299826c32104fe1934) --- whitechapel/vendor/google/storageproxyd.te | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/whitechapel/vendor/google/storageproxyd.te b/whitechapel/vendor/google/storageproxyd.te index d6acb458..f9222712 100644 --- a/whitechapel/vendor/google/storageproxyd.te +++ b/whitechapel/vendor/google/storageproxyd.te @@ -8,6 +8,10 @@ allow tee persist_ss_file:file create_file_perms; allow tee persist_ss_file:dir create_dir_perms; allow tee persist_file:dir r_dir_perms; allow tee mnt_vendor_file:dir r_dir_perms; +allow tee tee_data_file:dir create_dir_perms; allow tee tee_data_file:lnk_file r_file_perms; allow tee sg_device:chr_file rw_file_perms; allow tee self:capability { setgid setuid }; + +# Allow storageproxyd access to gsi_public_metadata_file +read_fstab(tee)