diff options
author | Demon Singur <demonsingur@gmail.com> | 2018-09-18 07:05:52 +0000 |
---|---|---|
committer | Davide Garberi <dade.garberi@gmail.com> | 2018-09-25 15:22:21 +0200 |
commit | 429f58cea5db932114a5a0282b7b98a78a784ab5 (patch) | |
tree | fa8c597690bdc40cbe696d65250b40fbfda5e35a /sepolicy/property_contexts | |
parent | ac0f5d4c3ff21e141f36b9fc005b20c924ea6104 (diff) |
msm8996-common: sepolicy: label old qseecomd ready prop
CAF renamed this prop to vendor.sys.listeners.registered, but our blobs
still use the old one, making enforcing boot to stall. Label it.
selinux: avc: denied { set } for property=sys.listeners.registered pid=568 uid=1000 gid=1000 scontext=u:r:tee:s0 tcontext=u:object_r:system_prop:s0 tclass=property_service permissive=0
init: Unable to set property 'sys.listeners.registered' to 'true' from uid:1000 gid:1000 pid:568: SELinux permission check failed
Change-Id: I43407d89df024b557dd4c06a4ac9d0ec8f37581e
Diffstat (limited to 'sepolicy/property_contexts')
-rw-r--r-- | sepolicy/property_contexts | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/sepolicy/property_contexts b/sepolicy/property_contexts new file mode 100644 index 0000000..cb9e1f9 --- /dev/null +++ b/sepolicy/property_contexts @@ -0,0 +1,2 @@ +# Qseecomd +sys.listeners.registered u:object_r:vendor_tee_listener_prop:s0 |