device_lenovo_sdm710-common/sepolicy/private
asmallbit 51b24b16b4
sdm710-common: sepolicy: Add SELinux policy for odrefresh
odrefresh: type=1400 audit(0.0:192095): avc: denied { open } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

avc: denied { getattr } for path=/dev/__properties__/u:object_r:aac_drc_prop:s0 dev=tmpfs ino=14629 scontext=u:r:odrefresh:s0 tcontext=u:object_r:aac_drc_prop:s0 tclass=file permissive=1

Signed-off-by: Mikazuuu07 <irfn4566@gmail.com>
Signed-off-by: wulan17 <galihgustip@gmail.com>

Change-Id: I51eb0f55430673cce7e87882765aa335096c687d
2023-11-21 20:39:52 +02:00
..
adbd.te sdm710-common: sepolicy: Give adbd sys_admin access 2023-06-17 17:03:44 +03:00
flags_health_check.te sdm710-common: sepolicy: Add SELinux policy for flags_health_check 2023-11-21 19:57:23 +02:00
linkerconfig.te sdm710-common: sepolicy: Fix avc denials related to linkerconfig 2023-06-26 22:57:36 +03:00
network_stack.te sdm710-common: sepolicy: Allow network_stack to read net psched 2023-06-26 22:56:30 +03:00
odrefresh.te sdm710-common: sepolicy: Add SELinux policy for odrefresh 2023-11-21 20:39:52 +02:00
permissioncontroller_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00
system_server.te sdm710-common: sepolicy: allow system_server to get app_zygote pgid 2021-11-12 16:17:06 +01:00
untrusted_app.te sdm710-common: sepolicy: Adress IORap usap_pool denial 2023-06-26 23:37:59 +03:00