Files
device_google_wahoo/sepolicy/vold.te
Max Bires 2238a616bc Fixing boot blocking selinux policy.
Following denials were blocking boot:

denied { read } for pid=589 comm="vold"
name="u:object_r:tee_listener_prop:s0" dev="tmpfs" ino=17236
scontext=u:r:vold:s0 tcontext=u:object_r:tee_listener_prop:s0
tclass=file

denied { read } for pid=555 comm="android.hardwar"
name="u:object_r:tee_listener_prop:s0" dev="tmpfs" ino=17236
scontext=u:r:hal_keymaster_qti:s0
tcontext=u:object_r:tee_listener_prop:s0 tclass=file

denied { read } for pid=555 comm="android.hardwar"
name="u:object_r:tee_listener_prop:s0" dev="tmpfs" ino=17236
scontext=u:r:vold:s0
tcontext=u:object_r:tee_listener_prop:s0 tclass=file

Bug: 37633957
Test: Device boots
Change-Id: I6be2bafde9a6f1d14802cfa39b170c55858a4d36
2017-04-24 21:54:01 +00:00

5 lines
146 B
Plaintext

# TODO: (b/35810138) the keymaster HAL must be binderized.
passthrough_hal_client_domain(vold, hal_keymaster);
get_prop(vold, tee_listener_prop)