device_lenovo_sdm710-common/sepolicy/private
CakesTwix 6b9dbfe85a
Revert "sdm710-common: sepolicy: Add SELinux policy for flags_health_check"
Output:
neverallow check failed at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_ven>
  (neverallow domain property_type (file (ioctl lock)))
    <root>
    allow at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_vendor.cil:33193
      (allow flags_health_check aac_drc_prop (file (ioctl read getattr lock map open watch watch_reads)))
    <root>
    allow at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_vendor.cil:33194
      (allow flags_health_check ab_update_gki_prop (file (ioctl read getattr lock map open watch watch_reads)))
    <root>
    allow at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_vendor.cil:33195
      (allow flags_health_check adbd_config_prop (file (ioctl read getattr lock map open watch watch_reads)))
    <root>
    allow at out/soong/.intermediates/system/sepolicy/plat_policy_for_vendor.cil/android_common/plat_policy_for_vendor.cil:33196
This reverts commit c7fb8c20d2.
2023-11-25 22:17:59 +02:00
..
adbd.te sdm710-common: sepolicy: Give adbd sys_admin access 2023-06-17 17:03:44 +03:00
linkerconfig.te sdm710-common: sepolicy: Fix avc denials related to linkerconfig 2023-06-26 22:57:36 +03:00
network_stack.te sdm710-common: sepolicy: Allow network_stack to read net psched 2023-06-26 22:56:30 +03:00
odrefresh.te sdm710-common: sepolicy: Add SELinux policy for odrefresh 2023-11-21 20:39:52 +02:00
permissioncontroller_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
system_server.te sdm710-common: sepolicy: allow system_server to get app_zygote pgid 2021-11-12 16:17:06 +01:00
untrusted_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00