device_lenovo_sdm710-common/sepolicy/vendor
iusmac b77a2922a2
sdm710-common: sepolicy: Address ueventd denials
W ueventd : type=1400 audit(0.0:9): avc: denied { read } for name="/" dev="debugfs" ino=1 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=dir permissive=0
W ueventd : type=1400 audit(0.0:6): avc: denied { getattr } for path="/sys/kernel/debug/show_mem_notifier" dev="debugfs" ino=2235 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:7): avc: denied { getattr } for path="/sys/kernel/debug/fault_around_bytes" dev="debugfs" ino=2234 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:8): avc: denied { getattr } for path="/sys/kernel/debug/sleep_time" dev="debugfs" ino=13337 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:9): avc: denied { getattr } for path="/sys/kernel/debug/suspend_stats" dev="debugfs" ino=13336 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:10): avc: denied { getattr } for path="/sys/kernel/debug/sched_features" dev="debugfs" ino=12438 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs_sched_features:s0 tclass=file permissive=0
W ueventd : type=1400 audit(0.0:11): avc: denied { getattr } for path="/sys/kernel/debug/msm_apr_debug" dev="debugfs" ino=13320 scontext=u:r:ueventd:s0 tcontext=u:object_r:debugfs:s0 tclass=file permissive=0

Change-Id: I11ad4ebd0d2d290c5bc601309aad4509d8bd7bc1
Signed-off-by: iusmac <iusico.maxim@libero.it>
2023-11-21 19:31:01 +02:00
..
adsprpcd.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
app.te sdm710-common: sepolicy: specify the owner of vendor props 2021-10-30 12:58:35 +02:00
appdomain.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
device.te sdm710-common: Setup Retrofit Dynamic Partitions 2023-10-27 22:30:18 +03:00
dontaudit.te sepolicy: gmscore_app: suppress denials on firmware 2021-07-16 18:44:07 +02:00
file.te sdm710-common: Drop KProfiles 2023-11-02 11:21:05 +02:00
file_contexts sdm710-common: Setup Retrofit Dynamic Partitions 2023-10-27 22:30:18 +03:00
genfs_contexts sdm710-common: Drop KProfiles 2023-11-02 11:21:05 +02:00
hal_audio_default.te kunlun2: Address some initial denials 2021-07-17 18:11:00 +02:00
hal_bluetooth_qti.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_camera_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_fingerprint_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_gnss_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_graphics_composer_default.te sdm710-common: sepolicy: Fix avc denial related to hal_graphics_composer_default 2023-06-24 15:13:20 +03:00
hal_power_default.te sdm710-common: sepolicy: Fix up libperfmgr crash on logs 2023-06-17 17:03:33 +03:00
hal_power_stats_default.te fixup: sdm710-common: update power sepolicy from xiaomi-sdm845 2022-11-12 15:09:34 +01:00
hal_sensors_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hal_wifi_default.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
hwservice_contexts sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
init.te sdm710-common: sepolicy: Allow init to relabelto logdump_partition 2023-11-12 10:37:06 +02:00
platform_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
priv_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
property.te sdm710-common: sepolicy: specify the owner of vendor props 2021-10-30 12:58:35 +02:00
property_contexts sdm710-common: Build and enable fastbootd mode 2023-11-12 10:42:15 +02:00
qtidataservices_app.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
radio.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
recovery.te sdm710-common: sepolicy: Allow recovery to access pstore 2023-06-24 15:13:20 +03:00
remosaic_daemon.te sdm710-common: Go enforcing 2021-08-11 22:41:19 +02:00
rild.te sepolicy: rild: file->dir 2021-07-16 18:34:31 +02:00
shell.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
system_app.te sdm710-common: Drop KProfiles 2023-11-02 11:21:05 +02:00
system_server.te sdm710-common: sepolicy: Allow system_server to get app_zygote pgid 2023-06-28 20:07:01 +03:00
tee.te sdm710-common: sepolicy: Give QCOM TEE directory access to tmpfs 2023-06-17 17:03:39 +03:00
thermal-engine.te sepolicy: Add thermal-engine rules 2021-07-16 23:25:14 +02:00
time_daemon.te kunlun2: sepolicy: Address time_daemon denials 2021-07-16 18:44:05 +02:00
timeservice_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
traceur_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
ueventd.te sdm710-common: sepolicy: Address ueventd denials 2023-11-21 19:31:01 +02:00
untrusted_app.te sdm710-common: sepolicy: Extend untrusted_app access to battery/power supply sysfs 2023-06-24 15:13:20 +03:00
untrusted_app_27.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
untrusted_app_29.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
untrusted_app_30.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
vendor_init.te sdm710-common: sepolicy: allow vendor_init to read persist_debug_prop 2021-10-20 22:42:05 +02:00
vndservice.te fixup: sdm710-common: update power sepolicy from xiaomi-sdm845 2022-11-12 15:09:34 +01:00
vndservice_contexts fixup: sdm710-common: update power sepolicy from xiaomi-sdm845 2022-11-12 15:09:34 +01:00
vold.te kunlun2: Address some initial denials 2021-07-17 18:11:00 +02:00
wcnss_service.te sdm710-common: Allow wcnss_service to run shell 2023-06-17 17:04:00 +03:00