device_lenovo_sdm710-common/sepolicy/private
Mukul Dhir e2fe741e9b
sdm710-common: sepolicy: Allow init to write to proc
01-01 02:13:02.803   344   344 I hwservicemanager: Since android.hardware.keymaster@3.0::IKeymasterDevice/default is not registered, trying to start it as a lazy HAL.
01-01 02:13:02.804   371   371 I HidlServiceManagement: getService: Trying again for android.hardware.keymaster@3.0::IKeymasterDevice/default...
01-01 02:13:02.930     1     1 I init    : type=1400 audit(0.0:37): avc: denied { write } for name="dirty_background_bytes" dev="proc" ino=12937 scontext=u:r:init:s0 tcontext=u:object_r:proc:s0 tclass=file permissive=1
01-01 02:13:02.953     1     1 I init    : type=1400 audit(0.0:38): avc: denied { write } for name="discard_max_bytes" dev="sysfs" ino=20778 scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1
01-01 02:13:02.953     1     1 I init    : type=1400 audit(0.0:39): avc: denied { open } for path="/sys/devices/soc.0/f9824900.sdhci/mmc_host/mmc0/mmc0:0001/block/mmcblk0/queue/discard_max_bytes" dev="sysfs" ino=20778 scontext=u:r:init:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1

Change-Id: I0283d0744619d82867318879152cd6fbfca094aa
2023-11-13 23:05:34 +02:00
..
adbd.te sdm710-common: sepolicy: Give adbd sys_admin access 2023-06-17 17:03:44 +03:00
init.te sdm710-common: sepolicy: Allow init to write to proc 2023-11-13 23:05:34 +02:00
linkerconfig.te sdm710-common: sepolicy: Fix avc denials related to linkerconfig 2023-06-26 22:57:36 +03:00
network_stack.te sdm710-common: sepolicy: Allow network_stack to read net psched 2023-06-26 22:56:30 +03:00
permissioncontroller_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
system_server.te sdm710-common: sepolicy: allow system_server to get app_zygote pgid 2021-11-12 16:17:06 +01:00
untrusted_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00