Skip to content
Snippets Groups Projects
Select Git revision
  • 0eb23a1e37b28d372f975ad360f863e17193df8b
  • master default protected
  • android-7.1.2_r28_klist
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
41 results

drmserver.te

Blame
  • tee.te 449 B
    ##
    # trusted execution environment (tee) daemon
    #
    type tee, domain;
    type tee_exec, exec_type, file_type;
    type tee_device, dev_type;
    type tee_data_file, file_type, data_file_type;
    
    init_daemon_domain(tee)
    allow tee self:capability { dac_override };
    allow tee tee_device:chr_file rw_file_perms;
    allow tee tee_data_file:dir { getattr write add_name };
    allow tee tee_data_file:file create_file_perms;
    allow tee self:netlink_socket { create bind read };