/dev/tee* are accessed by domains that interact with TEE and thus require access to them too. Test: Boot and observe that denials are not visible in logs anymore Signed-off-by: Aayush Gupta <aayushgupta219@gmail.com> Change-Id: I7b0944a1063da8561d2928e4110674ce4845ecea
12 lines
412 B
Plaintext
12 lines
412 B
Plaintext
allow tee ut_keymaster_device:chr_file rw_file_perms;
|
|
|
|
allow tee teei_rpmb_device:chr_file rw_file_perms;
|
|
allow tee teei_rpmb_device:blk_file { read write ioctl open };
|
|
|
|
allow tee teei_vfs_device:chr_file rw_file_perms;
|
|
|
|
allow tee vendor_teei_data_file:dir create_dir_perms;
|
|
allow tee vendor_teei_data_file:file create_file_perms;
|
|
|
|
allow tee teei_client_device:chr_file { create setattr unlink rw_file_perms };;
|