1e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraig## 2e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraig# trusted execution environment (tee) daemon 3e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraig# 4e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraigtype tee, domain; 5e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraigtype tee_exec, exec_type, file_type; 6e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraigtype tee_device, dev_type; 7e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraigtype tee_data_file, file_type, data_file_type; 8e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraig 9e07b8a56b9ce87733024797018543c7faf7e6aa2rpcraiginit_daemon_domain(tee) 1072a4745919f8eb2fae998450935ed1f1d0e3bb2aStephen Smalleyallow tee self:capability { dac_override }; 1172a4745919f8eb2fae998450935ed1f1d0e3bb2aStephen Smalleyallow tee tee_device:chr_file rw_file_perms; 1272a4745919f8eb2fae998450935ed1f1d0e3bb2aStephen Smalleyallow tee tee_data_file:dir rw_dir_perms; 1372a4745919f8eb2fae998450935ed1f1d0e3bb2aStephen Smalleyallow tee tee_data_file:file create_file_perms; 141601132086b054adc70e7f8f38ed24574c90bc37Stephen Smalleyallow tee self:netlink_socket create_socket_perms; 15