Tested on dream2lte.
Change-Id: I6a9c001f22728eb68743e0833e97e6b4d09bf0d9
BOARD_SEPOLICY_DIRS += \
device/samsung_slsi/sepolicy/tee/teegris/vendor
+else ifeq ($(BOARD_SEPOLICY_TEE_FLAVOR),mobicore)
+BOARD_SEPOLICY_DIRS += \
+ device/samsung_slsi/sepolicy/tee/mobicore
endif
--- /dev/null
+type mobicore_vendor_data_file, file_type, data_file_type;
+type mobicore_data_file, file_type, core_data_file_type, data_file_type;
--- /dev/null
+/dev/mobicore u:object_r:tee_device:s0
+/dev/mobicore-user u:object_r:tee_device:s0
+/dev/t-base-tui u:object_r:tee_device:s0
--- /dev/null
+# /dev/mobicore-user
+allow hal_fingerprint_default tee_device:chr_file rw_file_perms;
--- /dev/null
+# /dev/mobicore-user
+allow hal_gatekeeper_default tee_device:chr_file rw_file_perms;
--- /dev/null
+get_prop(hal_keymaster_default, tee_prop)
--- /dev/null
+# /dev/mobicore, /dev/t-base-tui
+allow init tee_device:chr_file rw_file_perms;
--- /dev/null
+type tee_prop, property_type;
--- /dev/null
+sys.mobicoredaemon.enable u:object_r:tee_prop:s0
--- /dev/null
+allow tee efs_file:dir { search getattr };
+allow tee efs_file:file r_file_perms;
+allow tee gatekeeper_efs_file:dir r_dir_perms;
+allow tee gatekeeper_efs_file:file r_file_perms;
+allow tee init:unix_stream_socket connectto;
+allow tee property_socket:sock_file write;
+allow tee prov_efs_file:dir search;
+allow tee system_prop:property_service set;
+allow tee tee_prop:property_service set;
+
+# /dev/t-base-tui
+allow tee tee_device:chr_file r_file_perms;
+
+allow tee mobicore_vendor_data_file:dir r_dir_perms;
+allow tee mobicore_vendor_data_file:file rw_file_perms;
--- /dev/null
+allow vendor_init mobicore_data_file:dir setattr;