xref: /aosp_15_r20/system/sepolicy/vendor/tee.te (revision e4a36f4174b17bbab9dc043f4a65dc8d87377290)
1*e4a36f41SAndroid Build Coastguard Worker##
2*e4a36f41SAndroid Build Coastguard Worker# trusted execution environment (tee) daemon
3*e4a36f41SAndroid Build Coastguard Worker#
4*e4a36f41SAndroid Build Coastguard Workertype tee_exec, exec_type, vendor_file_type, file_type;
5*e4a36f41SAndroid Build Coastguard Workerinit_daemon_domain(tee)
6*e4a36f41SAndroid Build Coastguard Worker
7*e4a36f41SAndroid Build Coastguard Workerallow tee self:global_capability_class_set { dac_override };
8*e4a36f41SAndroid Build Coastguard Workerallow tee tee_device:chr_file rw_file_perms;
9*e4a36f41SAndroid Build Coastguard Workerallow tee tee_data_file:dir create_dir_perms;
10*e4a36f41SAndroid Build Coastguard Workerallow tee tee_data_file:file create_file_perms;
11*e4a36f41SAndroid Build Coastguard Workerallow tee self:netlink_socket create_socket_perms_no_ioctl;
12*e4a36f41SAndroid Build Coastguard Workerallow tee self:netlink_generic_socket create_socket_perms_no_ioctl;
13*e4a36f41SAndroid Build Coastguard Workerallow tee ion_device:chr_file r_file_perms;
14*e4a36f41SAndroid Build Coastguard Workerr_dir_file(tee, sysfs_type)
15*e4a36f41SAndroid Build Coastguard Worker
16*e4a36f41SAndroid Build Coastguard Workerallow tee system_data_file:file { getattr read };
17*e4a36f41SAndroid Build Coastguard Workerallow tee system_data_file:lnk_file { getattr read };
18