Skip to content
Snippets Groups Projects
Select Git revision
  • android-7.1.2_r28_klist
  • master default protected
  • pie-cts-release
  • pie-vts-release
  • pie-cts-dev
  • oreo-mr1-iot-release
  • sdk-release
  • oreo-m6-s4-release
  • oreo-m4-s12-release
  • pie-release
  • pie-r2-release
  • pie-r2-s1-release
  • oreo-vts-release
  • oreo-cts-release
  • oreo-dev
  • oreo-mr1-dev
  • pie-gsi
  • pie-platform-release
  • pie-dev
  • oreo-cts-dev
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
  • android-9.0.0_r3
40 results

private

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Alex Klyubin authored
    As a result, Keymaster and DRM HALs are permitted to talk to tee domain
    over sockets. Unfortunately, the tee domain needs to remain on the
    exemptions list because drmserver, mediaserver, and surfaceflinger are
    currently permitted to talk to this domain over sockets.
    
    We need to figure out why global policy even defines a TEE domain...
    
    Test: mmm system/sepolicy
    Bug: 36601092
    Bug: 36601602
    Bug: 36714625
    Bug: 36715266
    Change-Id: I0b95e23361204bd046ae5ad22f9f953c810c1895
    0f6c047d
    History
    Name Last commit Last update
    ..