device_lenovo_sdm710-common/sepolicy/vendor
baunilla 96c04024e2
sdm710-common: sepolicy: ueventd: Address debugfs denials
avc:  denied  { open } for  pid=412 comm="ueventd" path="/sys/kernel/debug" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { read } for  pid=412 comm="ueventd" name="/" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { relabelfrom } for  pid=412 comm="ueventd" name="ipc_logging" dev="debugfs" ino=3 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=1

avc:  denied  { getattr } for  pid=412 comm="ueventd" path="/sys/kernel/debug/show_mem_notifier" dev="debugfs" ino=17459 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=1

avc:  denied  { getattr } for  pid=412 comm="ueventd" path="/sys/kernel/debug/wakeup_sources" dev="debugfs" ino=1048 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs_wakeup_sources:s0 tclass=file permissive=1

avc: denied  { relabelto } for  pid=411 comm="ueventd" name="ipc_logging" dev="debugfs" ino=3 scontext=u:r:ueventd:s0 tcontext=u:object_r:qti_debugfs:s0 tclass=dir permissive=1
Change-Id: Id2f04cc9d65dcc5a47fd5f14379d2630736efc0e
Signed-off-by: NFS86 <jarbull86@gmail.com>
2023-11-14 21:45:43 +02:00
..
adsprpcd.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
app.te sdm710-common: sepolicy: specify the owner of vendor props 2021-10-30 12:58:35 +02:00
appdomain.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
device.te sdm710-common: Setup Retrofit Dynamic Partitions 2023-10-27 22:30:18 +03:00
dontaudit.te sepolicy: gmscore_app: suppress denials on firmware 2021-07-16 18:44:07 +02:00
file.te sdm710-common: Drop KProfiles 2023-11-02 11:21:05 +02:00
file_contexts sdm710-common: Setup Retrofit Dynamic Partitions 2023-10-27 22:30:18 +03:00
genfs_contexts sdm710-common: Drop KProfiles 2023-11-02 11:21:05 +02:00
hal_audio_default.te kunlun2: Address some initial denials 2021-07-17 18:11:00 +02:00
hal_bluetooth_qti.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_camera_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_fingerprint_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_gnss_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_graphics_composer_default.te sdm710-common: sepolicy: Fix avc denial related to hal_graphics_composer_default 2023-06-24 15:13:20 +03:00
hal_power_default.te sdm710-common: sepolicy: Fix up libperfmgr crash on logs 2023-06-17 17:03:33 +03:00
hal_power_stats_default.te fixup: sdm710-common: update power sepolicy from xiaomi-sdm845 2022-11-12 15:09:34 +01:00
hal_sensors_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_wifi_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hwservice_contexts sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
init.te sdm710-common: sepolicy: Allow init to relabelto logdump_partition 2023-11-12 10:37:06 +02:00
platform_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
priv_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
property.te sdm710-common: sepolicy: specify the owner of vendor props 2021-10-30 12:58:35 +02:00
property_contexts sdm710-common: Build and enable fastbootd mode 2023-11-12 10:42:15 +02:00
qtidataservices_app.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
radio.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
recovery.te sdm710-common: sepolicy: Allow recovery to access pstore 2023-06-24 15:13:20 +03:00
remosaic_daemon.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
rild.te sepolicy: rild: file->dir 2021-07-16 18:34:31 +02:00
shell.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
system_app.te sdm710-common: Drop KProfiles 2023-11-02 11:21:05 +02:00
system_server.te sdm710-common: sepolicy: Allow system_server to get app_zygote pgid 2023-06-28 20:07:01 +03:00
tee.te sdm710-common: sepolicy: Give QCOM TEE directory access to tmpfs 2023-06-17 17:03:39 +03:00
thermal-engine.te sepolicy: Add thermal-engine rules 2021-07-16 23:25:14 +02:00
time_daemon.te kunlun2: sepolicy: Address time_daemon denials 2021-07-16 18:44:05 +02:00
timeservice_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
traceur_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
ueventd.te sdm710-common: sepolicy: ueventd: Address debugfs denials 2023-11-14 21:45:43 +02:00
untrusted_app.te sdm710-common: sepolicy: Extend untrusted_app access to battery/power supply sysfs 2023-06-24 15:13:20 +03:00
untrusted_app_27.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
untrusted_app_29.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
untrusted_app_30.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
vendor_init.te sdm710-common: sepolicy: allow vendor_init to read persist_debug_prop 2021-10-20 22:42:05 +02:00
vndservice.te fixup: sdm710-common: update power sepolicy from xiaomi-sdm845 2022-11-12 15:09:34 +01:00
vndservice_contexts fixup: sdm710-common: update power sepolicy from xiaomi-sdm845 2022-11-12 15:09:34 +01:00
vold.te kunlun2: Address some initial denials 2021-07-17 18:11:00 +02:00
wcnss_service.te sdm710-common: Allow wcnss_service to run shell 2023-06-17 17:04:00 +03:00