blob: 48489ad1bea6b819872eafd3b4f7ffef91dd5d05 [file] [log] [blame]
Dinesh K Garge5bafbf2014-10-22 00:13:49 -07001# tee starts as root, and drops privileges
Avijit Kanti Das441bad42015-05-12 14:07:41 -07002allow tee self:capability {
3 setuid
4 setgid
5 sys_admin
6 chown
7 dac_override
8 sys_rawio
9};
Dinesh K Garge5bafbf2014-10-22 00:13:49 -070010
Dinesh K Garg09a2f192014-10-31 16:28:22 -070011# Need to directly manipulate certain block devices
Dinesh K Garge5bafbf2014-10-22 00:13:49 -070012# for anti-rollback protection
13allow tee block_device:dir r_dir_perms;
Dinesh K Garge5bafbf2014-10-22 00:13:49 -070014allow tee rpmb_device:blk_file rw_file_perms;
15
Krishna Kondad27bc3f2015-01-16 10:53:35 -080016# Need to figure out how many scsi generic devices are preset
17# before being able to identify which one is rpmb device
18allow tee device:dir r_dir_perms;
19allow tee sg_device:chr_file { rw_file_perms setattr };
Dinesh K Garg09a2f192014-10-31 16:28:22 -070020
21# Allow qseecom to qsee folder so that listeners can create
22# respective directories
23allow tee data_qsee_file:dir create_dir_perms;
24allow tee data_qsee_file:file create_file_perms;
Dinesh K Garge5bafbf2014-10-22 00:13:49 -070025allow tee system_data_file:dir r_dir_perms;
26
27allow tee persist_file:dir r_dir_perms;
28r_dir_file(tee, persist_data_file)
Avijit Kanti Das441bad42015-05-12 14:07:41 -070029
Dinesh K Garge5bafbf2014-10-22 00:13:49 -070030# Write to drm related pieces of persist partition
31allow tee persist_drm_file:dir create_dir_perms;
32allow tee persist_drm_file:file create_file_perms;
33
Zhen Kongb5c2e622017-09-19 12:18:24 -070034# Allow SFS to write to data partition
Zhen Kong21e053d2017-10-11 12:02:29 -070035allow tee data_tzstorage_file:dir create_dir_perms;
36allow tee data_tzstorage_file:file create_file_perms;
Zhen Kongb5c2e622017-09-19 12:18:24 -070037
Dinesh K Garge5bafbf2014-10-22 00:13:49 -070038# Provide tee access to ssd partition for HW FDE
39allow tee ssd_device:blk_file rw_file_perms;
40
41# allow tee to operate tee device
42allow tee tee_device:chr_file rw_file_perms;
43
44# allow tee to load firmware images
Avijit Kanti Das441bad42015-05-12 14:07:41 -070045r_dir_file(tee, firmware_file)
Dinesh K Garge5bafbf2014-10-22 00:13:49 -070046
47# allow qseecom access to time domain
48allow tee time_daemon:unix_stream_socket connectto;
Dinesh K Garg09a2f192014-10-31 16:28:22 -070049
50# allow tee access for secure UI to work
Dinesh K Garg09a2f192014-10-31 16:28:22 -070051allow tee graphics_device:dir r_dir_perms;
Avijit Kanti Das441bad42015-05-12 14:07:41 -070052allow tee graphics_device:chr_file r_file_perms;
Dinesh K Garg09a2f192014-10-31 16:28:22 -070053
Dany Rybnikovce077162016-03-14 14:22:47 +020054#allow tee access for secure touch to work
55allow tee sysfs_securetouch:file rw_file_perms;
56
Ravi Kumar Siddojigaric7def122017-06-13 00:49:19 +053057#allow tee surfaceflinger_service : service_manager find;
Arun Kumar K.R804eccd2015-08-26 16:35:06 -070058
Dinesh K Garg09a2f192014-10-31 16:28:22 -070059binder_call(tee, surfaceflinger)
Ravi Kumar Siddojigaric7def122017-06-13 00:49:19 +053060#binder_use(tee)
Dinesh K Garg09a2f192014-10-31 16:28:22 -070061
sahil madekaa3608c92017-05-12 15:41:40 -070062set_prop(tee, system_prop);
63
Avijit Kanti Das441bad42015-05-12 14:07:41 -070064
Dinesh K Garg09a2f192014-10-31 16:28:22 -070065userdebug_or_eng(`
66 allow tee su:unix_dgram_socket sendto;
David Ng14a42d62016-03-07 15:35:02 -080067 #allow tee shell_data_file:file rw_file_perms;
68 #allow tee shell_data_file:dir search;
Dinesh K Garg09a2f192014-10-31 16:28:22 -070069')
Biswajit Paul28439f92015-07-15 13:28:27 -070070
Biswajit Paul28439f92015-07-15 13:28:27 -070071
72#allow access to qfp-daemon
73allow tee qfp-daemon_data_file:dir create_dir_perms;
74allow tee qfp-daemon_data_file:file create_file_perms;
Abir Ghosh2cd6e6e2017-02-08 15:08:55 +053075allow tee persist_qti_fp_file:dir create_dir_perms;
76allow tee persist_qti_fp_file:file create_file_perms;
Biswajit Paul28439f92015-07-15 13:28:27 -070077
Abir Ghosh2cb34392017-06-21 15:26:04 -070078# Provide access to Q VoicePrint
79allow tee qvop-daemon_data_file:dir create_dir_perms;
80allow tee qvop-daemon_data_file:file create_file_perms;
81
Amir Samuelov33976ed2016-09-09 07:24:00 +030082# Allow access to qsee_ipc_irq_spss device
83allow tee qsee_ipc_irq_spss_device:chr_file rw_file_perms;
84
Avijit Kanti Das8469d2c2015-09-18 07:55:17 -070085#allow access to fingerprintd data file
86allow tee fingerprintd_data_file:dir create_dir_perms;
87allow tee fingerprintd_data_file:file create_file_perms;
Brahmaji Kfab62712017-08-24 15:09:40 +053088
89#secureUI
90hal_client_domain(tee, hal_tui_comm);
91hal_client_domain(tee, hal_qdutils_disp);
92hal_client_domain(tee, hal_graphics_allocator);
Brahmaji K13d470b2017-10-31 18:09:51 +053093vndbinder_use(tee);
94allow tee qdisplay_service:service_manager find;
95hal_client_domain(tee, hal_display_config);
96binder_call(tee, hal_graphics_composer_default);