android_device_samsung_msm8.../sepolicy/tee.te
Deokgyu Yang 6d630439d2 gts3l-common: sepolicy: Address some denials
This includes crash_dump, gmscore_app, and so on.

Signed-off-by: Deokgyu Yang <secugyu@gmail.com>
Change-Id: I97496ba8aa380d45c8374e52eba2050a757ec27d
2022-02-20 14:33:24 +09:00

48 lines
1.4 KiB
Text

hwbinder_use(tee)
vndbinder_use(tee)
binder_call(tee, appdomain)
binder_call(tee, hal_graphics_allocator_default)
binder_call(tee, hal_graphics_composer_default)
allow tee self:netlink_generic_socket create_socket_perms_no_ioctl;
allow tee self:netlink_socket create_socket_perms_no_ioctl;
allow tee hal_graphics_mapper_hwservice:hwservice_manager find;
allow tee graphics_device:blk_file rw_file_perms;
allow tee kmsg_device:blk_file rw_file_perms;
allow tee properties_device:blk_file rw_file_perms;
allow tee persist_file:lnk_file r_file_perms;
allow tee proc:file r_file_perms;
allow tee proc_stat:file r_file_perms;
allow tee proc_sysrq:file w_file_perms;
allow tee rootfs:dir r_dir_perms;
allow tee rootfs:file r_file_perms;
allow tee rootfs:lnk_file r_file_perms;
allow tee efs_file:dir create_dir_perms;
allow tee efs_file:file create_file_perms;
allow tee prov_efs_file:dir create_dir_perms;
allow tee prov_efs_file:file create_file_perms;
allow tee sec_poc_file:dir create_dir_perms;
allow tee sec_poc_file:file create_file_perms;
allow tee vaultkeeper_efs_file:dir rw_dir_perms;
allow tee vaultkeeper_efs_file:file rw_file_perms;
allow tee vendor_data_file:dir create_dir_perms;
allow tee vendor_data_file:file create_file_perms;
allow tee gatekeeper_data_file:dir { read open };
allow tee gatekeeper_data_file:file { getattr open read write };
get_prop(tee, hwservicemanager_prop)
set_prop(tee, vendor_qseecomd_prop)